2008
DOI: 10.1016/j.comcom.2008.04.012
|View full text |Cite
|
Sign up to set email alerts
|

FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 44 publications
(15 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…Ramachandran et al . presented a two‐tier, multi‐agent‐based IDS called FORK that uses Ant‐Miner algorithm with aim to reduce battery consumption while running the intrusion detection process. Figure represents the operational structure of FORK.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Ramachandran et al . presented a two‐tier, multi‐agent‐based IDS called FORK that uses Ant‐Miner algorithm with aim to reduce battery consumption while running the intrusion detection process. Figure represents the operational structure of FORK.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…The first challenge in specification‐based IDS is to transform the functioning of sophisticated system into a formal model accurately in order to minimize the false alarms, and second challenge is to design a scheme (language/UML) for expressing the formal model. Multi‐dimensional trust: Using multi‐dimensional trust for intrusion detection is relatively unexplored in designing IDS for MANETs but requires much attention because it increases the dataset to an IDS. A preliminary work presented in threw light on how to apply multi‐dimensional trust to intrusion detection for MANET. Computational complexity: Most of the proposed systems cause high computational costs inherent to the design of their detection mechanism. So, IDSs should take into account the availability of limited resources in MANETs.…”
Section: Open Issues and Challengesmentioning
confidence: 99%
“…Our scheme is fully distributed and in this scheme, each node individually detects the behavior of the other nodes based on the observation history. Similarly, many other misbehavior detection schemes exist for mobile ad hoc networks [4][5][6][7][8], which detect routing misbehavior and mitigate them. However, these works are not suitable for OMNs due to the existence of strong intermittent inter-node connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…The results show that the proposed system is better at detecting and classifying DoS and U2R attacks than the three layer hierarchy of SOMs. Ramachandran C et al [25] has proposed a FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks. Proposed method is effect ive in terms of the accuracy of rules fo rmed and the simp licity in the content of the rules.…”
Section: Powers S T Et Al [24]mentioning
confidence: 99%