Ubiquitous Convergence Technology
DOI: 10.1007/978-3-540-71789-8_26
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Cooperative Distributed Intrusion Detection System for AODV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…In , Minh and Kong proposed an IDS for AODV by employing the mechanism of with the basic assumption that malicious node does not contain IDS agent. In this approach, every normal node is equipped with IDS agent in the network.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…In , Minh and Kong proposed an IDS for AODV by employing the mechanism of with the basic assumption that malicious node does not contain IDS agent. In this approach, every normal node is equipped with IDS agent in the network.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…But, they cannot respond to MAC, physical, or transport layer anomalies. It has been observed that some schemes are using threshold mechanism in order to detect routing layer anomalies. However, it is very difficult to determine the accurate threshold values in order to minimize the false positive and false negative rates, because threshold selection is application dependent and difficult to maintain for the dynamically changed environment.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation