2021
DOI: 10.4018/ijsssp.2021070102
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks

Abstract: Ad hoc networks are used in heterogeneous environments like tactical military applications, where no centrally coordinated infrastructure is available. The network is required to perform self-configuration, dynamic topology management, and ensure the self-sustainability of the network. Security is hence of paramount importance. Anomaly-based intrusion detection system (IDS) is a distributed activity carried out by all nodes of the network in a cooperative manner along with other related network activities like… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…They are available for different types of networks with several attacks incorporated within the log. Details of some of the most prevalent data sets are discussed in [6]. Some specific characteristics of these datasets are shown in 1. Study concludes that the datasets of DARPA series and KDDCup99 are created using primitive traffic and do not offer better estimates of the modern network traffic.…”
Section: Datasetsmentioning
confidence: 99%
“…They are available for different types of networks with several attacks incorporated within the log. Details of some of the most prevalent data sets are discussed in [6]. Some specific characteristics of these datasets are shown in 1. Study concludes that the datasets of DARPA series and KDDCup99 are created using primitive traffic and do not offer better estimates of the modern network traffic.…”
Section: Datasetsmentioning
confidence: 99%
“…Participating nodes need to update their routing tables frequently, resulting in flooding control packets in the network which consume precious network resources. As a result, in ad hoc networks, it is hard to construct and maintain routes [26].…”
Section: Introductionmentioning
confidence: 99%
“…The attacker does not G. Madhu 2 interfere with the network's functionality but instead seeks out important information in passive attacks. Active attacks produced varying degrees of network damage depending on the sort of attack [4]. As a result, several researchers focused on providing security agencies in MANETs, even though security is the most important factor in MANET application acceptance.…”
Section: Introductionmentioning
confidence: 99%