Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks: : A Practical Comprehension

Published: 01 July 2021 Publication History

Abstract

Ad hoc networks are used in heterogeneous environments like tactical military applications, where no centrally coordinated infrastructure is available. The network is required to perform self-configuration, dynamic topology management, and ensure the self-sustainability of the network. Security is hence of paramount importance. Anomaly-based intrusion detection system (IDS) is a distributed activity carried out by all nodes of the network in a cooperative manner along with other related network activities like routing, etc. Machine learning and its advances have found a promising place in anomaly detection. This paper describes the journey of defining the most suitable routing protocol for implementing IDS for tactical applications, along with the selection of the related suitable data set. The paper also reviews the latest machine learning techniques, implementation capabilities, and limitations.

References

[1]
Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks . Ad Hoc Networks, 2(1), 1–22.
[2]
Ahlashkari. (2021, March 7). CICFlowMeter. https://github.com/ahlashkari/CICFlowMeter
[3]
AhmadS.AwanI.WaqqasA.AhmadB. (2008). Performance Analysis of DSR Extended DSR Protocols. In 2008 Second Asia International Conference on Modelling Simulation (AMS) (pp. 191-196). 10.1109/AMS.2008.72
[4]
Ahmed, M., Mahmood, A., & Hu, J. (2015). A Survey of Network Anomaly Detection Techniques . Journal of Network and Computer Applications, 60, 19–31.
[5]
Akyazi, U., & Etaner-Uyar, A. (2008). Distributed intrusion detection using mobile agents against DDoS attacks. In 2008 23rd International Symposium on Computer and Information Sciences (pp. 1 - 6). 10.1109/ISCIS.2008.4717920
[6]
Alamsyah, A., Setijadi, E., Purnama, I., & Pumomo, M. (2018). Performance Comparative of AODV, AOMDV and DSDV Routing Protocols in MANET Using NS2. In 2018 International Seminar on Application for Technology of Information and Communication, (pp. 286-289). Academic Press.
[7]
AlqahtaniS.JohnR. (2017). A comparative analysis of different classification techniques for cloud intrusion detection systems’ alerts and fuzzy classifiers. In 2017 Computing Conference, (pp. 406-415). 10.1109/SAI.2017.8252132
[8]
AlqahtarniS.JohnR. (2016). A Comparative Study of Different Fuzzy Classifiers for Cloud Intrusion Detection Systems’ Alerts. In 2016 IEEE Symposium Series on Computational Intelligence (SSCI), (pp. 1–9). IEEE.
[9]
Ambusaidi, M., He, X., Nanda, P., & Tan, Z. (2016). Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm . IEEE Transactions on Computers, 65(10), 2986–2998.
[10]
Anandapriya, M., & Lakshmanan, B. (2015). Anomaly Based Host Intrusion Detection System using semantic based system call patterns. In 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-4). 10.1109/ISCO.2015.7282244
[11]
AravindM. A. M.KalaiselviV. K. G. (2017). Design of an intrusion detection system based on distance feature using ensemble classifier. In 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), (pp. 1–6). 10.1109/ICSCN.2017.8085661
[12]
AZSecure-Data. (n.d.). Other Data (ADFA-IDS). https://www.azsecure-data.org/other-data.html
[13]
Azwar, H., Murtaz, M., Siddique, M., & Rehman, S. (2018). Intrusion detection in secure network for cybersecurity systems using machine learning and data mining. In 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), (pp.1–9). 10.1109/ICETAS.2018.8629197
[14]
Basagni, S., Chlamtac, I., Syrotiuk, V. R., & Woodward, B. A. (1998). A distance routing effect algorithm for mobility (dream). In Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, (pp. 76–84). ACM.
[15]
Beijar, N. (2002). Zone routing protocol (zrp) (Vol. 9). Networking Laboratory, Helsinki University of Technology.
[16]
Bekmezci, I., Sahingoz, O. K., & Temel, S. (2013). Flying ad-hoc networks (fanets): A survey. Ad Hoc Networks, 11(3), 1254–1270.
[17]
Beraldi, R., & Baldoni, R. (2003). A caching scheme for routing in mobile ad hoc networks and its application to zrp. IEEE Transactions on Computers, 52(8), 1051–1062.
[18]
Berkeley Lab. (n.d.). Power Data Portal. https://powerdata.lbl.gov/download
[19]
Bhuyan, M., Bhattacharyya, D., & Kalita, J. (2014). Network Anomaly Detection: Methods, Systems and Tools . IEEE Communications Surveys and Tutorials, 16(1), 303–336.
[20]
Bhuyan, M., Bhattacharyya, D., & Kalita, J. (2017). Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools. Springer.
[21]
Bowitz, A. G. (2011). Simulation of a secure ad hoc network routing protocol (Master’s thesis). Institute for Telematikk.
[22]
Caida. (n.d.). Data Collection, Curation and Sharing. https://www.caida.org/data/
[23]
Chadha, K., & Jain, S. (2015). Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks. Advances in Intelligent Systems and Computing, 321, 185–198.
[24]
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly Detection: A Survey . ACM Computing Surveys, 41.
[25]
Colorado State University. (2016, July 24). DARPA 2009 Intrusion Detection Dataset. http://www.darpa2009.netsec.colostate.edu/
[26]
Conti, M., Gangwal, A., & Gaur, M. (2017). A Comprehensive and Effective Mechanism for DDoS Detection in SDN. In 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 1-8). 10.1109/WiMOB.2017.8115796
[27]
Corona, I., Giacinto, G., & Roli, F. (2013). Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues . Information Sciences, 239, 201–225.
[28]
Denning, D., & Neumann, P. G. (1985). Requirements and model for IDES-a real-time intrusion-detection expert system. SRI International.
[29]
Dhanabal, L., & Shantharajah, S. P. (2015). A study on nsl-kdd dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4(6), 446–452.
[30]
DonkalG.VermaG. (2018). Securing Big Data Ecosystem with NSGA-II and Gradient Boosted Trees Based NIDS Using Spark. In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), (pp. 146-151). 10.1109/ICCONS.2018.8663120
[31]
Dua, S., & Du, V. (2016). Data mining and machine learning in cybersecurity. Auerbach Publications.
[32]
Duffield, N., Haffner, P., Krishnamurthy, B., & Ringberg, H. A. (2017). Systems and methods for rule-based anomaly detection on IP network flow. US Patent 9,680,877.
[33]
Gandhi, S., Chaubey, N., Shah, P., & Sadhwani, M. (2012). Performance evaluation of DSR, OLSR and ZRP protocols in MANETs. Computer Communication and Informatics (ICCCI), 2012 International Conference on, 1–5.
[34]
Ghawy, Z., & Al-Sanabani, M. (2017). Application and Performance Analysis of DSDV Routing Protocol in ad-hoc Wireless Sensor Network with Help of NS2 Knowledge. Global Journal of Computer Science and Technology. Retrieved from https://computerresearch.org/index.php/computer/article/view/1511
[35]
GhoshA.SchwartzbardA.SchatzM. (1999). Learning program behavior profiles for intrusion detection. Workshop on Intrusion Detection and Network Monitoring, 51462, 1–13.
[36]
Gogoi, P., Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2012). Packet and Flow Based Network Intrusion Dataset. In Contemporary Computing - 5th International Conference, IC3 2012, Noida, India, August 6-8, 2012. Proceedings (pp. 322–334). Springer. 10.1007/978-3-642-32129-0_34
[37]
Gulp. (n.d.). Gulp. https://gulpjs.com/
[38]
Guruprasad, S., & D’Souza, R. (2016). Development of an Evolutionary Framework for Autonomous Rule Creation for Intrusion Detection. In 2016 IEEE 6th International Conference on Advanced Computing (IACC), (pp. 534-538). 10.1109/IACC.2016.105
[39]
Haas, Z.J, Pearlman, M.R, & Samar, P. (2002). The zone routing protocol(zrp) for ad hoc networks. Academic Press.
[40]
Haddadi, F., Khanchi, S., Shetabi, M., & Derhami, V. (2010). Intrusion Detection and Attack Classification Using Feed-Forward Neural Network. Computer and Network Technology, International Conference on, 0, 262-266.
[41]
Haider, W., Hu, J., Slay, J., Turnbull, B., & Xie, Y. (2017). Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling . Journal of Network and Computer Applications, 87, 185–192.
[42]
HainesJ.RosseyL.LippmannR.CunninghamR. (2001). Extending the DARPA off-line intrusion detection evaluations. Proceedings DARPA Information Survivability Conference and Exposition II, 35-45. 10.1109/DISCEX.2001.932190
[43]
Hamma, T., Katoh, T., Bista, B., & Takata, T. (2006). An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks. In Database and Expert Systems Applications, 2006. DEXA’06. 17th International Workshop on, (pp. 66 - 70). 10.1109/DEXA.2006.24
[44]
Hartenstein, H., & Laberteaux, K. (2009). VANET: Vehicular Applications and Inter-Networking Technologies. John Wiley & Sons.
[45]
Hassnawi, L., Ahmad, R., Yahya, A., Aljunid, S., & Elshaikh, M. (2012). Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras’ Network . International Journal of Computer Science Issues, 9, 7.
[46]
He, G. (2002). Destination-Sequenced Distance Vector (DSDV) Protocol. Networking Laboratory, Helsinki University of Technology.
[47]
Horng, S. J., Su, M. Y., Chen, Y. H., Kao, T.-W., Chen, R.-J., Lai, J.-L., & Perkasa, C. D. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines . Expert Systems with Applications, 38(1), 306–313.
[48]
Islam, M. S., Khan, R. H., & Dewan, M. B. (2010). A hierarchical intrusion detection system in wireless sensor networks. Computer Science and Network Security, 10(8), 21–26.
[49]
Jia, Y., Wang, M., & Wang, Y. (2018). An Network Intrusion Detection Algorithm Based on New Deep Neural Network . IET Information Security, 13(1), 48–53.
[50]
Joa-Ng, M., & Lu, I. T. (1999). Peer-to-peer zone-based two-level link state routing for mobile ad hoc networks . IEEE Journal on Selected Areas in Communications, 17(8), 1415–1425.
[51]
Johnson, D., Ntlatlapa, N., & Aichele, C.(2008). Simple pragmatic approach to mesh routing using batman. Academic Press.
[52]
Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153–181). Springer.
[53]
Kang, I., Jeong, M., & Kong, D. (2012). A differentiated one-class classification method with applications to intrusion detection . Expert Systems with Applications, 39(4), 3899–3905.
[54]
Kumar, G., Reddyr, Y., & Dr, M. (2010). Current research work on routing protocols for MANET: A literature survey . International Journal on Computer Science and Engineering, 2, 706–713.
[55]
KumarK.MohanV. (2014). Adaptive Fuzzy Neural Network Model for intrusion detection. Proceedings of 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014, 987-991. 10.1109/IC3I.2014.7019811
[56]
Kyoto University. (n.d.). Traffic Data from Kyoto University’s Honeypots. http://www.takakura.com/Kyoto_data/
[57]
LudwigS. (2017). Intrusion detection of multiple attack classes using a deep neural net ensemble. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1-7). 10.1109/SSCI.2017.8280825
[58]
LuntT.JagannathanR. (1988). A prototype real-time intrusion-detection expert system. IEEE Symposium on Security and Privacy, 59-66.
[59]
Mancini, L., & Pietro, R. (2008). Intrusion Detection Systems (Vol. 38). Springer Science & Business Media.
[60]
MaskeS. A.ParvatT. J. (2016). Advanced anomaly intrusion detection technique for host based system using system call patterns. In 2016 International Conference on Inventive Computation Technologies (ICICT) (pp. 1-4). 10.1109/INVENTIVE.2016.7824846
[61]
Mathappan, N., & Thangaraj, P. (2018). A Framework of Novel Feature Set Extraction based Intrusion Detection System for Internet of Things using Hybrid Machine Learning Algorithms. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 44-49). Academic Press.
[62]
Moustafa, N., Adi, E., Turnbull, B., & Hu, J. (2018). A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems. IEEE Access, 32910–32924.
[63]
MoustafaN.CreechG.SitnikovaE.KeshkM. (2017). Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing. 2017 Military Communications and Information Systems Conference (MilCIS), 1-6.
[64]
Moustafa, N., Creech, G., & Slay, J. (2017). Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models. Academic Press.
[65]
Moustafa, N., Creech, G., & Slay, J. (2018). Flow Aggregator Module for Analysing Network Traffic. Academic Press.
[66]
Moustafa, N., Hu, J., & Slay, J. (2019). A holistic review of Network Anomaly Detection Systems: A comprehensive survey . Journal of Network and Computer Applications, 128, 33–55.
[67]
Moustafa, N., & Slay, J. (2016). The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Information Security Journal: A Global Perspective, 25(1-3),18– 31.
[68]
MoustafaN.SlayJ. (2018). A network forensic scheme using correntropy variation for attack detection. In IFIP International Conference on Digital Forensics. Springer.
[69]
Moustafa, N., Slay, J., & Creech, G. (2017). Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks. IEEE Transactions on Big Data.
[70]
Mouttaqi, T., Rachidi, T., & Assem, N. (2017). Re-evaluation of combined Markov-Bayes models for host intrusion detection on the ADFA dataset. In 2017 Intelligent Systems Conference (IntelliSys), (pp. 1044-1052). Academic Press.
[71]
MukkamalaS.JanoskiG.SungA. (2002). Intrusion detection using neural networks and support vector machines. Proceedings of the 2002 International Joint Conference on, 1702 - 1707.
[72]
NadiammaiG.HemalathaM. (2012). An evaluation of clustering technique over intrusion detection system. Proceedings of the International Conference on Advances in Computing, Communications and Informatics, 1054–1060.
[73]
Netresec. (n.d.). Publicly available PCAP files. https://www.netresec.com/?page=PcapFiles
[74]
Neumann, A., Aichele, C., Lindner, M., & Wunderlich, S. (2008). Better approach to mobile ad-hoc networking (BATMAN). IETF draft, 1-24.
[75]
Palaniammal, M., & Lalli, M. (2014). Comparative study of routing protocols for MANETs. International Journal of Computer Science and Mobile Applications, 2(2), 118–127.
[76]
Pei, G., Gerla, M., & Chen, T. (2000). Fisheye state routing: A routing scheme for ad hoc wireless networks. In Communications, 2000. ICC 2000. 2000 IEEE International Conference on, (pp. 70–74). IEEE.
[77]
Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. Technical report.
[78]
Perkins, C., & Bhagwat, P. (1994). Highly Dynamic Destination-sequenced Distance-vector Routing (DSDV) for Mobile Computers. ACM SIGCOMM'94, 24, 234-244.
[79]
PoornachandranP.PraveenS.NairA.KrishnanM.KpS. (2017). Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Springer.
[80]
Rahman, J., Hasan, M., & Islam, M. (2012). Comparative analysis the performance of AODV, DSDV and DSR routing protocols in wireless sensor network. In Electrical & Computer Engineering (ICECE), 2012 7th International Conference on, (pp. 283-286). Academic Press.
[81]
Raju, S., Runkana, K., & Mungara, J. (2010). Performance measurement and analysis of ZRP for MANETs using network simulator-QualNet. In Wireless Information Technology and Systems (ICWITS), 2010 IEEE International Conference on, (pp. 1 - 4). IEEE.
[82]
Ramanathan, R., & Redi, J. (2002). A brief overview of ad hoc networks: Challenges and directions. Communications Magazine, IEEE, 40, 20–22.
[83]
Sambasivam, P., Rashmi, R., & Anand, M. (2018). IDS Based Network Security Architecture with TCP/IP Parameters using Machine Learning. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 111-114). Academic Press.
[84]
Shahid, N., Naqvi, I., & Qaisar, S. (2015). Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: A survey . Artificial Intelligence Review, 43, 198–228.
[85]
Sharafaldin, I., Habibi Lashkari, A., & Ghorbani, A. (2018). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. ICISSP, 108-116.
[86]
Singh, D., Maurya, A., & Sarje, A. (2011). Comparative performance analysis of LANMAR, LAR1, DYMO and ZRP routing protocols in MANET using Random Waypoint Mobility Model. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on, (pp. 62-66). Academic Press.
[87]
Singh, M., & Sharma, J. (2014). Performance analysis of secure & efficient AODV (SE-AODV) with AODV routing protocol using NS2. In Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2014 3rd International Conference on, (pp. 1–6). Academic Press.
[88]
Singh, S., Singh, M., & Singh, D. (2010). A survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks . International Journal of Advanced Networking and Application, 2, 570–580.
[89]
Soheily-Khah, S., Marteau, P. F., & Béchet, N. (2018). Intrusion Detection in Network Systems Through Hybrid Supervised and Unsupervised Machine Learning Process: A Case Study on the ISCX Dataset. In 2018 1st International Conference on Data Intelligence and Security (ICDIS) (pp. 219-226). Academic Press.
[90]
Song, W. C., & Lutfiyya, H. (2009). Delivery-Guaranteed Geocast in MANETs by Using ZHLS. Computer Sciences and Convergence Information Technology, 2009. ICCIT’09. Fourth International Conference on, 86-90.
[91]
SouleA.SalamatianK.TaftN. (2005). Combining filtering and statistical methods for anomaly detection. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 31–31.
[92]
Stratosphere Lab. (n.d.). The CTU-13 Dataset. A Labeled Dataset with Botnet, Normal and Background traffic. https://www.stratosphereips.org/datasets-ctu13
[93]
Tan, S., & Kim, K. (2013) Secure route discovery for preventing black hole attacks on aodv-based manets. High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC EUC), 2013 IEEE 10th International Conference on, 1159–1164.
[94]
Tcpdump. (n.d.). TCPDUMP & LIBCAP. https://www.tcpdump.org/
[95]
TechnologiesK. (n.d.). PerfectStrom. https://www.ixiacom.com/products/perfectstorm
[96]
Toh, C. k. (1997). Associativity-Based Routing For Ad-Hoc Mobile Networks. Wireless Personal Communications, 4, 103–139.
[97]
Ullah, I., & Mahmoud, Q. (2017). A filter-based feature selection model for anomaly-based intrusion detection systems. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 2151-2159). IEEE.
[98]
Ullah, I., & Mahmoud, Q. (2019). A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks. In 2019 16th IEEE Annual Consumer Communications & Networking Conference. CCNC.
[99]
Università degli Studi di Brescia. (2011, July 11). UNIBS: Data sharing. http://netweb.ing.unibs.it/~ntw/tools/traces/
[100]
University of California Irvine. (1999, October 28). KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
[101]
University of New Brunswick. (n.d.). Datasets. www.unb.ca/research/iscx/dataset/iscx-IDS-dataset.html
[102]
University of New Brunswick. (n.d.). Datasets. https://www.unb.ca/cic/datasets/nsl.html
[103]
University of New South Wales’ Canberra. (n.d.). UNSW NB15 Dataset. https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/
[104]
Ustebay, S., Turgut, Z., & Aydin, M. (2018). Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier. In 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) (pp. 71-76). Academic Press.
[105]
Vasudevan, A., Harshini, E., & Selvakumar, S. (2011). SSENet-2011: A Network Intrusion Detection System dataset and its comparison with KDD CUP 99 dataset. 2011 Second Asian Himalayas International Conference on Internet (AH-ICI), 1-5.
[106]
Wagner, C., François, J., State, R., & Engel, T. (2011). Machine Learning Approach for IP-Flow Record Anomaly Detection. In International Conference on Research in Networking, (pp. 28-39). Academic Press.
[107]
Wang, L., Peng, D., & Zhang, T. (2015). Design of Smart Home System Based on WiFi Smart Plug . International Journal of Smart Home, 9, 173–182.
[108]
Wang, S., Chen, Y., & Tian, H. (2016). An intrusion detection algorithm based on chaos theory for selecting the detection window size. In 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), (pp. 556-560). IEEE.
[109]
Welsh, M., Moulton, S., Fulford-Jones, T., & Malan, D. (2004). CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care. International workshop on wearable and implantable body sensor networks.
[110]
Westpoint. (n.d.). Data Sets. https://www.westpoint.edu/centers-and-research/cyber-research-center/data-sets
[111]
Woo, J. h., Song, J. Y., & Choi, Y. J. (2019). Performance Enhancement of Deep Neural Network Using Feature Selection and Preprocessing for Intrusion Detection. In 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) (pp. 415-417). Academic Press.
[112]
Xie, M., & Hu, J. (2013). Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD. In 2013 6th International Congress on Image and Signal Processing (CISP) (pp. 1711-1716). Academic Press.
[113]
ZhaoW.AmmarM.ZeguraE. (2004). A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks. In Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing (pp. 187-198). ACM.
[114]
Zhou, L., & Zygmunt, H. (1999). Securing Ad Hoc Networks . IEEE Network, 13, 24–30.

Index Terms

  1. Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks: A Practical Comprehension
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image International Journal of Systems and Software Security and Protection
            International Journal of Systems and Software Security and Protection  Volume 12, Issue 2
            Jul 2021
            85 pages
            ISSN:2640-4265
            EISSN:2640-4273
            Issue’s Table of Contents

            Publisher

            IGI Global

            United States

            Publication History

            Published: 01 July 2021

            Author Tags

            1. Ad hoc Networks
            2. Anomaly Detection
            3. Intrusion Detection System
            4. Security in Ad hoc Networks

            Qualifiers

            • Article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 0
              Total Downloads
            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 04 Oct 2024

            Other Metrics

            Citations

            View Options

            View options

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media