Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks: : A Practical Comprehension
Abstract
References
Index Terms
- Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks: A Practical Comprehension
Recommendations
Node-disjointness-based multipath routing for mobile ad hoc networks
PE-WASUN '04: Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networksMobile ad hoc networks are characterized by the use of wireless links with limited bandwidth, dynamically varying network topology and multi-hop connectivity. AODV and DSR are the two most widely studied on-demand ad hoc routing protocols. Previous work ...
On intrusion detection in opportunistic networks
PCI '13: Proceedings of the 17th Panhellenic Conference on InformaticsOpportunistic networks (oppnets) can be deployed in an ad hoc manner in order to cover large geographical areas. The main challenges in oppnets are interoperability, security and privacy issues. In this paper we concentrate on security issues and ...
Distributed Court System for intrusion detection in mobile ad hoc networks
Securing routing layer functions in mobile ad hoc networks is an important issue, which includes many challenges like how to enhance detection accuracy when facing the highly dynamic characteristic of such networks, and how to distinguish malicious ...
Comments
Information & Contributors
Information
Published In
Publisher
IGI Global
United States
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in