2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
DOI: 10.1109/saintw.2003.1210188
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in intrusion detection for wireless ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0
1

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 113 publications
(68 citation statements)
references
References 10 publications
0
67
0
1
Order By: Relevance
“…Local and co-operative detection [20] Sink hole Genetic Programming [21] DOS, Unauthorized access Soft computing [22] Probing Table 2: Anomaly Based IDS Mechanisms.…”
Section: Ids Mechanisms Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Local and co-operative detection [20] Sink hole Genetic Programming [21] DOS, Unauthorized access Soft computing [22] Probing Table 2: Anomaly Based IDS Mechanisms.…”
Section: Ids Mechanisms Attacksmentioning
confidence: 99%
“…Cluster based [22] Periodic route hole attack, sink hole attack Support Vector [23] Black hole attacks…”
Section: Ids Mechanisms Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of works [15,[23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39] specify the usage of intrusion detection within the field of ad-hoc networks. This field is, as expected, more compact and specific, as general networking techniques and computing power is no longer as applicable as in the traditional static-networkbased IDS scheme.…”
Section: Componentmentioning
confidence: 99%
“…IDS Model proposed by Brutch and Ko is a statistical anomaly detection algorithm [54]. It works by first assuming that the audit trail generated from a host has been converted to a canonical audit trail (CAT) format.…”
Section: Review Of Manet Intrusion Detection Security Approachesmentioning
confidence: 99%