2006
DOI: 10.1007/11856214_13
|View full text |Cite
|
Sign up to set email alerts
|

DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0
1

Year Published

2009
2009
2016
2016

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(23 citation statements)
references
References 10 publications
0
22
0
1
Order By: Relevance
“…In most cases these metrics reflect the number of attacks detected, but sometimes they show the number of attackers detected [13]. The detection delay is not usually taken into account, but there are a few exceptions [16,17,13]. There are approaches that quantify the impact of the detectors, such as network overhead or the CPU speed-up [18], or data delivery ratio to evaluate the impact of attack response [13].…”
Section: Related Workmentioning
confidence: 99%
“…In most cases these metrics reflect the number of attacks detected, but sometimes they show the number of attackers detected [13]. The detection delay is not usually taken into account, but there are a few exceptions [16,17,13]. There are approaches that quantify the impact of the detectors, such as network overhead or the CPU speed-up [18], or data delivery ratio to evaluate the impact of attack response [13].…”
Section: Related Workmentioning
confidence: 99%
“…A MANET is formed when a group of mobile nodes cooperatively communicate with each other without a pre-established infrastructure. According to Tseng et al [10], a MANET is inherently trustall-peers by design and therein lies its problem. A malicious node can corrupt other trusting nodes by forging incorrect data packets to evade detection.…”
Section: Other Applicationsmentioning
confidence: 99%
“…[8] detects violations in the protocol specification based on an extended finite state automation (EFSA) of AODV. Distributed Evidence-Driven Message Exchange Intrusion Detection Model (DEMEM) [13] detects inconsistency among the routing messages in OLSR. [6] models the attacks on AODV protocol using attack tree and identify the damages.…”
Section: Related Workmentioning
confidence: 99%