SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 586
ANALYTICAL SURVEY OF ACTIVE INTRUSION DETECTION
TECHNIQUES IN MOBILE AD HOC NETWORKS
R.M.Chamundeeswari1
, P Sumathi2
1
Assistant Professor, Department Of Computer Application, Asan Memorial College of Arts & Science, Chennai
2
Assistant Professor, PG and Research Department of Computer Science, Govt Arts College, Coimbatore
Abstract
The mobile ad hoc network (MANET) is an infrastructure less system, comprises of mobile devices connected by wireless medium.
MANET data communication undergoes various violation and prohibition issues by its mobile nodes, due to different access and
information flow requirement across the network. In addition intermittent connectivity of wireless network and mobile device failures
cause security lapses in the MANET communication, further leads to intruder’s generating multiple attacks.. Intrusion detection gets
more significant in current MANET security research works.
Furthermore due the open forum of MANET may change the system topology by suspecting attacks like inactive eavesdropping,
dynamic impersonation and denial of services. To avoid all the problems created by an intruder, a successful MANET is implemented
based on its security. The security research in MANET has been paying attention on key managing, routing protocol and intrusion
detection techniques. The rating on intrusion detection and supportive layer in MANET has provided with a resolution to extend it to
the real world applications. The active intrusion detection system aims to revise the various intrusion detections and prevention
systems predicted for Mobile Ad hoc Networks (MANETs) and also compare the latest techniques of Intrusion Detection dependent on
their architecture and data gathering techniques.
Keywords: MANET, Intrusion Detection –AID, HIDS, NIDS, Topology, Attacks
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Mobile ad hoc networks (MANETs) consist of collection of
movable nodes, which move freely in the network. The mobile
nodes change their structure and form a random topology
networks as it deprived of a fixed infrastructure. The design of
dynamic routing protocols with high-quality performance and a
smaller amount of overhead is the main demand of mobile ah
hoc networks. The Intrusion detection, which has been
effectively used in wired networks to identify attacks, can offer a
second line of defense. In particular, intrusion detection and
response ability is extremely significant, as many real ad hoc
networks. The system determines to be organized in aggressive
environments in which genuine nodes can be captured and used
by adversaries. There are two methods of to detecting the
intrusion such as
 Misuse based intrusion detection
 Anomaly based intrusion detection.
The misuse detection also called as knowledge-based detection
and anomaly based intrusion detection as behavior-based
detection. Fig 1.represent the intrusion detection structures of
mobile ad hoc network system The Misuse intrusion detection
refers to the detection of intrusions which are accurately crucial
and further on time by watching for the incidence.
Simulation Analysis Notification
Fig 1 Architecture of IDS
If there is a misuse of a component, the majority. The statistical
techniques alone are not adequate to detect all types of
intrusions.
Anomaly detection is the detection of items, actions or
annotations which are based on a predictable pattern or other
items in a dataset.. It stands against anomaly detection technique
which utilizes the reverse technique of misuse intrusion
detection. The anomaly detection takes first step defining usual
system behavior than defining all other behavior as irregular.
The aspiration suitable data dissemination approach is essential
in mobile ad hoc networks (MANET) due to the repeated
topology changes. There are two main methods which affect the
data dissemination.
 Dynamic topology control,
 Resource constraint topology control
Preven
tion
Intrusion
Monitor
Intrusion
detection
Response
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 587
The Supportive communication has been remarkable attention
for mobile ad hoc network networks. The available mechanism
on supportive infrastructure is paying attention on link level
corporeal layer issues. Accordingly, the impacts of the
supportive infrastructure on network level upper layer issues,
such as topology control, map-reading and network capacity are
ignored. Fig 2.Represent the intrusion detection methods in
agent based intruder in MANET Communication
NeighboringIDSAgent Sys.callactivities&
Communicationactivities
Fig2 IDS Agent Model
The author used some topology control related protocol to
develop the topology and manage the scheme to improve the
network capability in MANETs. By uncooperative behavior in
intellect of both upper layer systems capacity and physical layer,
the communications are compensated. The planned topology
organize scheme can considerably improve the network capacity
in MANETs with supportive infrastructure.
This paper is organized as follows: Section II discusses the
classification of intrusion detection of mobile ad hoc network.
Section III shows the analysis of recent techniques in active
intrusion detection based techniques through disseminated and
supportive layer in mobile ad hoc networks. Section IV describes
the literature review in tabulation form by comparing the
complete intrusion detection and topology control and data
dissemination methods. Section V terminates the paper, solution
areas of future research to expand their real world applications.
Section VI discusses the future direction of these systems.
2. CLASSIFICATION IN INTRUSION DETECTION
MANET COMMUNICATION
Most of the surviving protocols, applications and services for
Mobile Ad Hoc Networks (MANETs) are supposed to be in
cooperative and responsive network environment and will not
provide security. Consequently, the intrusion detection systems
(IDSs), serve as the next line of protection for information
systems and are essential for MANETs with elevated security
requirements.
Fig 2 Classification of Intrusion detection system in MANET
The intrusion detection system can be divided into many
methods. The major methods are active and passive intrusion
detection, Network Intrusion detection systems (NIDS) and host
Intrusiondetection systems (HIDS)
An Active Intrusion detection system (AID) is as well described
as Intrusion Detection and Prevention System. This system is
configured to repeatedly block if the attacks devoid of any
interference required by an operator.
The Passive Intrusion detection (PID) is a system to ease the
configuration to only monitor and evaluate network traffic
activity and alert an operator to check for probable
vulnerabilities and attacks. A passive intrusion detection system
doesn’t have any ability of performing defensive or remedial
functions on its own.
The Network Intrusion Detection(NID) Systems frequently
consists of a network sensor with a Network Interface Card
operating in dissolute mode and a divided management interface.
The intrusion detection system is located beside a network sector
or boundary and monitors all traffic on those sectors.
The Host Intrusion Detection (HID) Systems and software
relevance mediator installed on workstations which are to be
monitored. The mediator monitors the operating system and
writes data to log records and activate alarms.
The Topology control is a method used in dispersed computing
to modify the underlying network in regulating to reduce the
cost of distributed algorithms unless there are no fresh resulting
graphs.
The Topology controls are divided into main problems such as
topology structure, in charge of the initial reduction and
topology preservation, in charge of the preservation of the
abridged topology, so the individuality like connectivity and
exposure are preserved. Once the preliminary topology is set up
particularly when the position of the nodes is haphazard, the
proprietor has no control over intend of the system.
Nevertheless, the proprietor has control over a number of
restrictions of the system: transmission control of the nodes,
situation of the nodes (active or sleeping), function of the nodes
(Cluster head, gateway, regular), etc. Leading. The optimal
abridged topology stops being at the initial next of filled activity.
After a few times being active, some nodes determine to run out
Secure
Communication
Cooperative&
Collaborative
detection engine
Global Response
Local Data Collection
Local Detection
Engine
Local Response
AID PID NID HID
IDS
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 588
of energy. Particularly in wireless sensor networks with multi
hoping, it is a fact the nodes that are nearer to the sink expend
higher amounts of power that those beyond away due to packet
forwarding.
3. ANALYSIS OF RECENT TECHNIQUES IN
ACTIVE INTRUSION DETECTION IN MOBILE AD
HOC NETWORKS
3.1 Various Intrusion Detection Methods in MANET
As described in the paper [1], the anomaly – detection scheme is
based on a dynamic learning process that allows the training data
to be updated at particular time intervals. As mentioned the
MANET is an open medium and the network will be vulnerable
to malicious attacks, so it is vital to expand efficient intrusion
detection method to defend MANET from attacks. As
represented and executed a fresh intrusion detection [6] method
Enhanced Adaptive Acknowledgment (EAACK) particularly
intended for MANETs. EAACK recognized as elevated
malicious behavior exposure rates in assured conditions as it
does not really influence the network performances.
A distributed intrusion detection [15] scheme is based on finish
state machine. A cluster dependent detection method is offered,
where occasionally a node is elected as the monitor node for a
cluster.
The different attacks alongside mobile nodes are flooding, black
hole, warm hole, packet reducing and Byzantine attack etc.
which is important to search new architecture and mechanisms
to protect the wireless networks. There are many intrusion
detection methods which have been used and are strongly related
to routing protocols, such as Watchdog and Pathrater and
Routeguard. The watchdog is called intrusion detection and
Routeguards/pathraters are called as response. [7] Watchdog
inhabits in every node and is based on overhearing.
Nevertheless, if the node that is eavesdropping and reporting
itself is malicious, then it can cause serious impact on system
performance.
Intrusion detection is used as a successive line of protection in
Mobile Ad-hoc Networks. To carry out the protection they
evaluate five supervised [12] categorization algorithms for
intrusion exposures method. As they measure their performance
on a dataset, which consist of different traffic conditions and
mobility model for multiple attacks.
The selective black hole is a node that can electively and
alternately execute a black hole attack or perform as a normal
node. As they demonstrated, numerous [13] IDS nodes are
deployed in MANETs in order to sense and avoid discriminating
black hole attacks. Sink mobility has captivated much research
interest in Wireless Sensor Networks (WSNs), because as
demonstrated in moving approach for the mobile sink [3],
which avoid tracking or sensing on it by adversaries during its
data collection stage around the sensor field. There are lots of
applications in Mobile Ad Hoc Networks in which mobile users
distribute information. Nevertheless, each of these standard
works guessed a particular mobility model and did not
completely examine the authority of the mobility on the
proposed system. The main aim is to quantify the influences of
mobility on data availability [4] and expansions are not done in
concrete protocol.
An intrusion detection and [5] adaptive reply mechanism for
MANETs that senses a variety of attacks and offers an efficient
reply with low network degradation. They considered the
deficiencies of a fixed response to an intrusion and overcome the
deficiencies with a flexible response scheme that depends on the
measured confidence in the attack.
Insider attacks are one of the active attacks occurred in Ad-hoc
network. An intrusion detection system will be developed for
detection and isolation of attacks [20] and mac layer applications
will be used for detecting malicious activities and will focus on
the finding of attack sequences in the network. The Cognitive
radio network to rapidly sense whether they are being attacked, a
simple yet effective IDS is then presented. [8] The demonstrated
non-parametric cumulative sum (cusum) as the change point
detection algorithm to find out the irregular behavior due to
attacks. The leader election is to balance the resource
consumption among all nodes and extend the lifetime of a
MANET and nodes with more remaining resources should be
elected as the leaders. However, there are two main complication
in attained this goal. Primary, devoid of motivation for serving
others, a node might perform inconsiderately by lying about its
remaining resources [9] and avoid being elected. The Alert
aggregation is a significant associate task of intrusion detection.
The goal is to identify and to cluster dissimilar alerts formed by
small level intrusion detection systems, firewalls. As
demonstrated new technique [10] for online alert aggregation
which is dependent on a dynamic, probabilistic model of the
current attack situation.
As represented in the social system analysis metrics that may be
used to hold a new and practical [2] forwarding solution to
provide competent message delivery in detached delay tolerant
MANETs.
3.2 Multimodal Detection Techniques in MANET
The Multimodal is position to work with Intrusion Detection
Systems (IDS) to assuage the shortcomings of unimodal [14]
systems. The scheme chooses whether user verification is
necessary based on the security posture. The decisions are made
in a fully distributed manner by each verification device and
IDS.
This technology is used to ease the inadequacy of uni modal
systems. Since each device in the network has measurement [16]
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 589
and estimation limitations, more than one device needs to be
elected and observation can be fused to increase observation
accuracy by using Dempster–Shafer theory for data fusion.
All devices have dimensions and estimation limitation, many
devices to be chosen and with the help of Dempster-Shafter
theory for data fusion surveillance accuracy gets increased[17].
Based on the safety posture, system terminates which biosensor
(IDS) to pick and whether user authentication is essential.
The Continuous user-to-device authentication is a demanding
task in high security mobile AdHoc networks (MANETs). They
are distributed combined authentication and intrusion discovery
with data fusion [18] in such MANETs. To obtain the optimal
scheme of combining continuous user authentication and IDSs in
a distributed manner, they formulate the problem as a partially
observable [21] Markov decision process (POMDP) multi-armed
bandit problem. They present structural results method to solve
the problem for a large network with a variety of nodes.
The consistency scheme is server-based in which control
mechanisms are implemented to adapt the process of caching a
data item and updating it by the server to its popularity and its
data update rate at the server [22]. Distributed cache invalidation
mechanism is a pull-based algorithm [23] that implements
adaptive time to live (TTL), piggybacking, and prefetching, and
provides near strong consistency capabilities.
The stochastic sequential decision framework [35] to analyze the
problem under a Markovian mobility model, the location update
decision problem is modeled as a Markov Decision Process
(MDP). Then, given a separable cost structure, they show that
the location update decisions of NU and LSU can be
independently carried out without loss of optimality, i.e., a
separation property.
The attacks which compromise the sensor nodes are dangerous
because they allow the attacker to leverage the [36] compromise
of a few nodes to exert control over much of the network.
GenProg uses an extended form of genetic programming to
evolve a program variant that retains required functionality but is
not susceptible to a given defect, using existing test suites to
encode both the defect and required [37] functionality.
The game theoretical analysis derives the expected behaviors of
rational attackers [38], the minimum monitor resource
requirement, and the optimal strategy of the defenders. The
guidelines for IDS design and deployment are provided.
3.3 Topology Control Protocols for MANET
The topology control has received much concentration in
motionless sensor networks by efficiently reducing energy
consumption, reducing interference, and limitation end-to-end
delay, the transience of mobile nodes in Mobile Ad hoc
Networks. The K edge connected topology control algorithms
[27] are mainly used for the dynamic key methods. The
multiuser successive interference cancellation (MUSIC) is a
framework that greedly forms and stimulates sub [28] topologies
in a way that favor successful SIC decoding with a high
probability. The cooperative communications are [29] focused
on link-level physical layer issues. The Capacity-Optimized
Cooperative (COCO) topology control scheme is to improve the
network capacity in MANETs by jointly considering both upper
layer network capacity and physical layer cooperative
communications.
The Network Connectivity based Topology Control (NCTC) to
make [30] the correct the balance between interference and
energy in order to improve the network lifetime of networks. The
weighted and learning automata [31] dependent algorithm used
to exaggerate energy preservation in a mobile ad hoc network.
The Energy Efficient Topology Control [32] Approach is
developed to attain both network connectivity and energy
consumption. While considering the spam attack in MANET
with cooperative [33] communication results low throughput in
network. So the proposed Secure Adaptive Distributed Topology
Control Algorithm aims at topology control and performs secure
self-organization in four phases i.e., Antinode Detection, Cluster
Formation, Key Distribution and Key Renewal, to protect
against malicious node attacks.
Security systems have important impacts on throughput. The
topology control methods [34] are used to get better throughput
by together manipulating upper layer security system and
physical layer system. It’s interrelated to channel circumstances
and relay assortment for cooperative communications.
Routing problems have become highly challenging because of
the popularity of mobile devices. A transient multicast tree is
established on demand and derived based on the autonomous
decisions of intermediate nodes. They proved that the derived
tree is loop-free and theoretically optimal in the maximization of
minimum residual energy [24].
The general framework for designing topology inference
algorithms [26] based on additive metrics is used. The
framework can flexibly fuse information from multiple
measurements to achieve better estimation accuracy. The
broadcasting algorithm suitable for a wide range of vehicular
scenarios, which only employs local information acquired via
periodic beacon messages, containing acknowledgments of the
[25] circulated broadcast messages.
As represented the redundancy management of heterogeneous
wireless sensor networks use multipath routing to respond user
queries in the presence of undependable and malicious nodes.
They devise the exchange as an optimization [11] problem for
dynamically determining the best redundancy stage to relate to
multipath routing for intrusion tolerance so that the query
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 590
reaction success probability is maximized while prolonging the
functional lifetime.
4. ANALYSIS OF PEFORMANCE PARAMETERS
ON WSN INTRUSION DETECTION METHODS
The existing Enhanced Adaptive Acknowledgment for the utility
of such exposure schemes is all most based on the
acknowledgment packets. These methods accept a digital
signature named Enhanced AACK (EAACK).The possibilities of
implementing hybrid cryptography system to additionally reduce
the network overhead caused by digital signature as well as the
possibilities of implementing a key swap mechanism to eradicate
the condition of pre distributed keys.
The Anti-Black whole Mechanism utility, which is mainly used
to estimate an apprehensive value of a node according to the
abnormal dissimilarity between the routing messages transmitted
from the node. This method does not hold any key distribution
and authentication methods.
The Smart server update is server-based in which control
mechanisms are implemented to adapt the process of caching a
data item and updating it by the server to its popularity and its
data update rate at the server. The main drawback is it does not
contain grasping effects of cache placement strategies and cache
replication on performance.
The distributed cache invalidation mechanism is a pull-based
algorithm that implements adaptive time to live (TTL),
piggybacking, and prefetching, and provides near strong
consistency capabilities. The main disadvantages of the system
is when TTL algorithms are more complicated to reinstate the
consecutively average function and does not execute the entire
replica allocation.
The multiuser successive interference cancellation (MUSIC) is a
framework that greedly forms and stimulates sub [28] topologies
in a way that favor successful SIC decoding with a high
probability
The cluster dependent and detection scheme is used when
periodically a node is designated as the observe node for a
cluster. This observing nodes can not only make limited
intrusion detection resolution, but does not cooperatively take
part in global intrusion detection.
An Alert aggregation is dependent on a vigorous, probabilistic
illustration of the contemporary attack circumstances. Alert
aggregation is a significant sub assignment of intrusion
detection. The objective is to discover and to cluster dissimilar
alerts formed by low level interruption detection systems. The
main drawback of the system does not deliberate techniques for
interestingness dependent communication approach for
dispersed IDS.
Fig : parametrics on intrusion deteion methods of WSN Y-refers to the usage of corresponding parameter in its method
Parameters
Packetdeliveryratio
EndtoEnddelay
Energyefficiency
Computationalcost
Routingoverhead
Packetdeliverydelay
Throughput
FalsePositiverate
Hitratio
ExecutionTime
PercentageofIDS
PacketLossrate
Truepositiverate
Anomaly Detection Scheme Y  Y Y
Disconnected Delay-Tolerant Y Y
Anti-DetectionTechnique Y Y Y
Influences Of Mobility On Data Availability Y Y Y
Attack Prevention Y Y
(POMDP) Y Y
Smart Server Update Mechanism Y Y
Distributed Cache Invalidation Method Y Y
Maximum-Residual Multicast Protocol Y Y
Cooperative Communications Y
Stochastic Sequential Decision Y Y Y
Predetermined Sensor Locality Y Y Y Y
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 591
5. CONCULSIONS
As the use of MANET has enlarged the security in MANETs, it
has also developed into more significant. Chronological event
explores that prevention only means cryptography and
authentication, but they are not as much as necessary. Hence the
IDS is fetching into the consideration.
The discussion about the existing techniques dynamic anomaly
detection usually used to authenticate the exceptionality and the
topology of the network thus avoid any malicious crowd from
combination the network. After scrutinizing the architectures of
IDS for MANETs they came to conclusion that IDS structural
design that entail cross layer design using independent mobile
representative dependent on architecture. In which the dispersed
and supportive competently detect the irregularity and
additionally it is appropriate for mobile ad hoc networks.
SCOPE OF FUTURE ENHANCEMENT
To accomplish the dynamic anomaly detection is to unconstraint
the feature, and also some other nearest neighboring techniques.
It preserves the dependent mechanism, where it introduced to
examine the intrusions efficiently. The preserve dependent
mechanism factor recognizes the similarity to usual classes and
detects abnormal attacks. Nearest neighbor and preserve
dependent mechanism frequently uses machine learning and ad-
hoc network intrusion detection.
To overcome these scheduling decisions, focus is made on
developing dispersed development resolution combine
authentication and intrusion exposure for efficient scheduling of
information in MANET. In the dispersed development
resolution, the most appropriate biosensors are animatedly
elected dependent on the recent security posture and energy
states. The biometric scheme controls in verification mode that
single match method to covenant with an efficient scheduling.
All biometric scheme give way of binary option and each of the
devices are used at each time slot with multiple sources.
To realize this, Joint authentication and topology control using
layer dependent exposure method is developed in MANET.
Layer dependent exposure method deals with the faultless of the
channel information and to accomplish exactness. The Layer
based exposure intrusion detection method combine the
suppleness of anomaly detection with the accuracy. In demand is
to enlarge the machine learning technique in order to attain
competent and efficient intrusion detection.
REFERENCES
[1]. Hidehisa Nakayama., Satoshi Kurosawa, Abbas Jamalipour.,
Yoshiaki Nemoto., and Nei Kato., ―A Dynamic Anomaly
Detection Scheme for AODV-Based Mobile Ad Hoc Networks,‖
IEEE Transactions On Vehicular Technology, Vol. 58, No. 5,
June 2009
[2]. Elizabeth M. Daly., and Mads Haahr, ―Social Network
Analysis for Information Flow in Disconnected Delay-Tolerant
MANET,‖ IEEE Transactions on Mobile Computing, Vol. 8, No.
5, May 2009
[3]. Zhou Sha., Jia-Liang Lu., Xu Li., Min-You Wu., ―An Anti-
Detection Moving Strategy for Mobile Sink,‖ IEEE Global
Telecommunications Conference (GLOBECOM 2010)
[4]. Takahiro Hara, ―Quantifying Impact of Mobility on Data
Availability in Mobile Ad Hoc Networks‖, IEEE Transactions on
Mobile Computing, Vol. 9, No. 2, FEBRUARY 2010
[5]. Adnan Nadeem, Michael, Howarth, ―An Intrusion Detection
& Adaptive Response Mechanism for MANETs‖ Journal of
Elsevier Sep 2013
[6]. Elhadi, Shakshuki, Nan Kang, Tarek and Sheltami,
―EAACK—A Secure Intrusion-Detection System for MANETs
―, IEEE Transactions on Industrial Electronics, Vol. 60, No. 3,
March 2013
[7]. Nidal Nasser and Yunfeng Chen, ―Enhanced Intrusion
Detection System for Discovering Malicious Nodes in Mobile
Ad hoc Networks Communications‖, 2007. ICC '07. IEEE
International Conference on 24-28 June 2007
[8]. Zubair Md. Fadlullah, Hiroki Nishiyama, and Nei Kato,
―Intrusion Detection System (IDS) for Combating Attacks
against Cognitive Radio Networks Zubair Network‖, IEEE
(Volume: 27, Issue: 3), May-June 2013
[9]. Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad
Debbabi and Prabir Bhattacharya ―Mechanism Design-Based
Secure Leader Election Model for Intrusion Detection in
MANET‖, IEEE transactions on dependable and secure
computing volume: 8, issue: 1 2011 , page(s): 89 - 103
[10]. Alexander Hofmann, Bernhard Sick, Member, ―On-Line
Intrusion Alert Aggregation with Generative Data Stream
Modeling‖, IEEE Transactions on Dependable and Secure
Computing, (Volume: 8, Issue: 2), March-April 2011
[11]. Hamid Al-Hamadi and Ing-Ray Chen, ―Redundancy
Management of Multipath Routing for Intrusion Tolerance in
Heterogeneous Wireless Sensor Networks‖, IEEE Transactions
on Network and Service Management, Vol. 10, No. 2, June 2013
[12]. Aikaterini Mitrokotsa, Christos Dimitrakakis ―Intrusion
detection in MANET using classification algorithms: The effects
of cost and model selection‖, journal of Elsevier, 2012
[13]. Ming-Yang Su ―Prevention of selective black hole attacks
on mobile ad hoc networks through intrusion detection systems‖,
journal of Elsevier, 2011
[14]. Parasakthi and sanjeev kumar, ―Distributed Combined
Authentication and Intrusion Detection in High-Security Mobile
Ad Hoc Networks to reduce the computation complexity‖,
National Conference on Advances in Computer Science and
Applications with International Journal of Computer
Applications (NCACSA 2012)
[15]. Yi Ping, Jiang Xinghao, Wu Yue & Liu Ning ―Distributed
intrusion detection for mobile ad hoc network‖, Journal of
Systems Engineering and Electronics Vol. 19, No. 4, 2008
[16]. T.Kumanan and Duraiswamy ―Dynamic Intrusion
Detection with Data Fusion and Aggregation in High-Security
Mobile Ad Hoc Networks‖, International Journal of Computer
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 592
Science and Information Technologies, Vol. 3 (2), 2012, 3743-
3748
[17]. Lakshmi Narayanan and Fidal Castro ―High Security for
MANET Using Authentication and Intrusion Detection with
Data Fusion‖, International Journal of Scientific & Engineering
Research Volume 3, Issue 3, March -2012 1 ISSN 2229-5518
[18]. Jeyashree, ―Highly Secure Distributed Authentication and
Intrusion Detection with Data Fusion in MANET‖, International
Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume 2, Issue 2, February 2013
[19]. R.Nallusamy, K.Jayarajan, Dr.K.Duraiswamy, ―Intrusion
Detection in Mobile Ad Hoc Networks Using GA Based Feature
Selection‖, Georgian Electronic Scientific Journal: Computer
Science and Telecommunications 2009|No.5 (22)
[20]. Tapan P. Gondaliya, Maninder Singh, ―Intrusion detection
System for Attack Prevention in Mobile Ad-hoc Network‖,
International Journal of Advanced Research in Computer
Science and Software Engineering Volume 3, Issue 4, April
2013
[21]. Shengrong Bu., F. Richard Yu., Xiaoping P. Liu., and Helen
Tang., ―Structural Results for Combined Continuous User
Authentication and Intrusion Detection in High Security Mobile
Ad-Hoc Networks,‖ IEEE Transactions on Wireless
Communications, Vol. 10, No. 9, September 2011
[22]. Khaleel Mershad and Hassan Artail., ―SSUM: Smart Server
Update Mechanism for Maintaining Cache Consistency in
Mobile Environments,‖ IEEE Transactions on Mobile
Computing, Vol. 9, No. 6, June 2010
[23]. Kassem Fawaz., and Hassan Artail., ―DCIM: Distributed
Cache Invalidation Method for Maintaining Cache Consistency
in Wireless Mobile Networks,‖ IEEE Transactions on Mobile
Computing, Vol. 12, No. 4, April 2013
[24]. Pi-Cheng Hsiu. And Tei-Wei Kuo, ―A Maximum-Residual
Multicast Protocol for Large-Scale Mobile Ad Hoc Networks,‖
IEEE Transactions on Mobile Computing, Vol. 8, No. 11,
November 2009
[25]. Francisco Javier Ros, Pedro Miguel Ruiz and Ivan
Stojmenovic, ―Acknowledgment-Based Broadcast Protocol for
Reliable and Efficient Data Dissemination in Vehicular Ad Hoc
Networks‖, IEEE Transactions on Mobile Computing, Vol. 11,
No. 1, January 2012
[26]. Jian Ni, Haiyong Xie, Sekhar Tatikonda, and Yang Richard
Yang, ―Efficient and Dynamic Routing Topology Inference from
End-to-End Measurements‖, IEEE/ACM transactions on
networking, vol. 18, no. 1, February 2010
[27]. Hiroki Nishiyama, Thuan Ngo, Nirwan Ansari, and Nei
Kato, ―On Minimizing the Impact of Mobility on Topology
Control in Mobile Ad Hoc Networks‖, IEEE Transactions on
Wireless Communications, Vol. 11, No. 3, March 2012
[28]. Ece Gelal, Jianxia Ning, Konstantinos Pelechrinis, Tae-
SukKim, Ioannis Broustis, Srikanth V. Krishnamurthy, and
Bhaskar, ―Topology Control for Effective Interference
Cancellation in Multiuser MIMO Networks‖, IEEE/ACM
Transactions on Networking, Vol. 21, No. 2, April 2013
[29]. Quansheng Guan, Richard Yu, Shengming Jiang and Victor
C. M. Leung, ―Topology Control in Mobile Ad Hoc Networks
with Cooperative Communications‖, IEEE Transaction on
Wireless Communications, (Volume: 19, Issue: 2), April 2012
[30]. Asha and Muniraj, ―Network Connectivity based Topology
Control for Mobile Ad Hoc Networks‖, International Journal of
Computer Applications (0975 – 8887) Volume 56– No.2,
October 2012
[31]. Nasrin Shirali, ―Topology control in the mobile ad hoc
networks in order to intensify energy conservation‖, Journal of
Elsevier Volume 37, Issue 24, 15 December 2013, Pages 10107–
10122
[32]. Asha and muniraj ―Energy Efficient Topology Control
Approach for Mobile Ad hoc Networks‖, IJCSI International
Journal of Computer Science Issues, Vol. 10, Issue 4, No 1, July
2013
[33]. Bharathi and saranya, ―High Throughput Analysis Using
Topological Control & Authentication Scheme in MANET‖,
International Journal of Emerging Technology and Advanced
Engineering, Volume 3, Issue 3, March 2013
[34]. Quansheng Guan., F. Richard Yu., Shengming Jiang., and
Victor C. M. Leung, ―Joint Topology Control and Authentication
Design in Mobile Ad Hoc Networks with Cooperative
Communications,‖ IEEE Transactions on Vehicular Technology,
Vol. 61, No. 6, July 2012
[35]. Zhenzhen Ye and Alhussein A. Abouzeid, ―Optimal
Stochastic Location Updates in Mobile Ad Hoc Networks,‖
IEEE Transactions on Mobile Computing, Vol. 10, No. 5, May
2011
[36]. Jun-Won Ho., Wright, M.; Das, S.K., ―Fast Detection of
Replica Node Attacks in Mobile Sensor Networks Using
Sequential Analysis,‖ IEEE, INFOCOM 2009
[37]. Claire Le Goues., ThanhVu Nguyen., Stephanie Forrest.,
and Westley Weimer., ―GenProg: A Generic Method for
Automatic Software Repair,‖ IEEE Transactions on Software
Engineering, Vol. 38, No. 1, January/February 2012

More Related Content

What's hot

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Web application firewall solution market
Web application firewall solution marketWeb application firewall solution market
Web application firewall solution marketSameerShaikh225
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksAM Publications,India
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsAM Publications,India
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404Manasa Deshaboina
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a studyijsptm
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection SystemIRJET Journal
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemCheapSSLsecurity
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 

What's hot (20)

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
Web application firewall solution market
Web application firewall solution marketWeb application firewall solution market
Web application firewall solution market
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a study
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 

Viewers also liked

Mechatronics engineering education in republic of benin opportunities and cha...
Mechatronics engineering education in republic of benin opportunities and cha...Mechatronics engineering education in republic of benin opportunities and cha...
Mechatronics engineering education in republic of benin opportunities and cha...eSAT Publishing House
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewalleSAT Publishing House
 
Synthesis and structural characterization of cd s
Synthesis and structural characterization of cd sSynthesis and structural characterization of cd s
Synthesis and structural characterization of cd seSAT Publishing House
 
Performance measurement and dynamic analysis of two
Performance measurement and dynamic analysis of twoPerformance measurement and dynamic analysis of two
Performance measurement and dynamic analysis of twoeSAT Publishing House
 
Enhancement of the performance of an industry by the
Enhancement of the performance of an industry by theEnhancement of the performance of an industry by the
Enhancement of the performance of an industry by theeSAT Publishing House
 
Review of methods for diabetic retinopathy detection and severity classification
Review of methods for diabetic retinopathy detection and severity classificationReview of methods for diabetic retinopathy detection and severity classification
Review of methods for diabetic retinopathy detection and severity classificationeSAT Publishing House
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Publishing House
 
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...eSAT Publishing House
 
Congestion control in computer networks using a
Congestion control in computer networks using aCongestion control in computer networks using a
Congestion control in computer networks using aeSAT Publishing House
 
Evaluation of the impact of oil spillage on izombe community and their produc...
Evaluation of the impact of oil spillage on izombe community and their produc...Evaluation of the impact of oil spillage on izombe community and their produc...
Evaluation of the impact of oil spillage on izombe community and their produc...eSAT Publishing House
 
Wound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingWound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingeSAT Publishing House
 
IJRET : International Journal of Research in Engineering and TechnologyOptimi...
IJRET : International Journal of Research in Engineering and TechnologyOptimi...IJRET : International Journal of Research in Engineering and TechnologyOptimi...
IJRET : International Journal of Research in Engineering and TechnologyOptimi...eSAT Publishing House
 
An enhanced mppt technique for small scale
An enhanced mppt technique for small scaleAn enhanced mppt technique for small scale
An enhanced mppt technique for small scaleeSAT Publishing House
 
Information security risk assessment under uncertainty using dynamic bayesian...
Information security risk assessment under uncertainty using dynamic bayesian...Information security risk assessment under uncertainty using dynamic bayesian...
Information security risk assessment under uncertainty using dynamic bayesian...eSAT Publishing House
 
Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...eSAT Publishing House
 
A tricky task scheduling technique to optimize time cost and reliability in m...
A tricky task scheduling technique to optimize time cost and reliability in m...A tricky task scheduling technique to optimize time cost and reliability in m...
A tricky task scheduling technique to optimize time cost and reliability in m...eSAT Publishing House
 
Comparative study on tax compliance software
Comparative study on tax compliance softwareComparative study on tax compliance software
Comparative study on tax compliance softwareeSAT Publishing House
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingeSAT Publishing House
 
A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyeSAT Publishing House
 

Viewers also liked (20)

Mechatronics engineering education in republic of benin opportunities and cha...
Mechatronics engineering education in republic of benin opportunities and cha...Mechatronics engineering education in republic of benin opportunities and cha...
Mechatronics engineering education in republic of benin opportunities and cha...
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
 
Synthesis and structural characterization of cd s
Synthesis and structural characterization of cd sSynthesis and structural characterization of cd s
Synthesis and structural characterization of cd s
 
Performance measurement and dynamic analysis of two
Performance measurement and dynamic analysis of twoPerformance measurement and dynamic analysis of two
Performance measurement and dynamic analysis of two
 
Enhancement of the performance of an industry by the
Enhancement of the performance of an industry by theEnhancement of the performance of an industry by the
Enhancement of the performance of an industry by the
 
Review of methods for diabetic retinopathy detection and severity classification
Review of methods for diabetic retinopathy detection and severity classificationReview of methods for diabetic retinopathy detection and severity classification
Review of methods for diabetic retinopathy detection and severity classification
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
 
Congestion control in computer networks using a
Congestion control in computer networks using aCongestion control in computer networks using a
Congestion control in computer networks using a
 
Evaluation of the impact of oil spillage on izombe community and their produc...
Evaluation of the impact of oil spillage on izombe community and their produc...Evaluation of the impact of oil spillage on izombe community and their produc...
Evaluation of the impact of oil spillage on izombe community and their produc...
 
Wound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingWound epithelization model by 3 d imaging
Wound epithelization model by 3 d imaging
 
IJRET : International Journal of Research in Engineering and TechnologyOptimi...
IJRET : International Journal of Research in Engineering and TechnologyOptimi...IJRET : International Journal of Research in Engineering and TechnologyOptimi...
IJRET : International Journal of Research in Engineering and TechnologyOptimi...
 
An enhanced mppt technique for small scale
An enhanced mppt technique for small scaleAn enhanced mppt technique for small scale
An enhanced mppt technique for small scale
 
Information security risk assessment under uncertainty using dynamic bayesian...
Information security risk assessment under uncertainty using dynamic bayesian...Information security risk assessment under uncertainty using dynamic bayesian...
Information security risk assessment under uncertainty using dynamic bayesian...
 
Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...
 
A tricky task scheduling technique to optimize time cost and reliability in m...
A tricky task scheduling technique to optimize time cost and reliability in m...A tricky task scheduling technique to optimize time cost and reliability in m...
A tricky task scheduling technique to optimize time cost and reliability in m...
 
Comparative study on tax compliance software
Comparative study on tax compliance softwareComparative study on tax compliance software
Comparative study on tax compliance software
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding using
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technology
 

Similar to Analytical survey of active intrusion detection techniques in mobile ad hoc networks

Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETIJMTST Journal
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...eSAT Journals
 
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...eSAT Journals
 
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...rahulmonikasharma
 
M026075079
M026075079M026075079
M026075079ijceronline
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETIRJET Journal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...IOSR Journals
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesIRJET Journal
 

Similar to Analytical survey of active intrusion detection techniques in mobile ad hoc networks (20)

[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...
 
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...
 
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
 
50120140506001
5012014050600150120140506001
50120140506001
 
M026075079
M026075079M026075079
M026075079
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANET
 
50120140507012
5012014050701250120140507012
50120140507012
 
50120140507012
5012014050701250120140507012
50120140507012
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
L010527175
L010527175L010527175
L010527175
 
Science journal
Science journalScience journal
Science journal
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Analytical survey of active intrusion detection techniques in mobile ad hoc networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 586 ANALYTICAL SURVEY OF ACTIVE INTRUSION DETECTION TECHNIQUES IN MOBILE AD HOC NETWORKS R.M.Chamundeeswari1 , P Sumathi2 1 Assistant Professor, Department Of Computer Application, Asan Memorial College of Arts & Science, Chennai 2 Assistant Professor, PG and Research Department of Computer Science, Govt Arts College, Coimbatore Abstract The mobile ad hoc network (MANET) is an infrastructure less system, comprises of mobile devices connected by wireless medium. MANET data communication undergoes various violation and prohibition issues by its mobile nodes, due to different access and information flow requirement across the network. In addition intermittent connectivity of wireless network and mobile device failures cause security lapses in the MANET communication, further leads to intruder’s generating multiple attacks.. Intrusion detection gets more significant in current MANET security research works. Furthermore due the open forum of MANET may change the system topology by suspecting attacks like inactive eavesdropping, dynamic impersonation and denial of services. To avoid all the problems created by an intruder, a successful MANET is implemented based on its security. The security research in MANET has been paying attention on key managing, routing protocol and intrusion detection techniques. The rating on intrusion detection and supportive layer in MANET has provided with a resolution to extend it to the real world applications. The active intrusion detection system aims to revise the various intrusion detections and prevention systems predicted for Mobile Ad hoc Networks (MANETs) and also compare the latest techniques of Intrusion Detection dependent on their architecture and data gathering techniques. Keywords: MANET, Intrusion Detection –AID, HIDS, NIDS, Topology, Attacks ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Mobile ad hoc networks (MANETs) consist of collection of movable nodes, which move freely in the network. The mobile nodes change their structure and form a random topology networks as it deprived of a fixed infrastructure. The design of dynamic routing protocols with high-quality performance and a smaller amount of overhead is the main demand of mobile ah hoc networks. The Intrusion detection, which has been effectively used in wired networks to identify attacks, can offer a second line of defense. In particular, intrusion detection and response ability is extremely significant, as many real ad hoc networks. The system determines to be organized in aggressive environments in which genuine nodes can be captured and used by adversaries. There are two methods of to detecting the intrusion such as  Misuse based intrusion detection  Anomaly based intrusion detection. The misuse detection also called as knowledge-based detection and anomaly based intrusion detection as behavior-based detection. Fig 1.represent the intrusion detection structures of mobile ad hoc network system The Misuse intrusion detection refers to the detection of intrusions which are accurately crucial and further on time by watching for the incidence. Simulation Analysis Notification Fig 1 Architecture of IDS If there is a misuse of a component, the majority. The statistical techniques alone are not adequate to detect all types of intrusions. Anomaly detection is the detection of items, actions or annotations which are based on a predictable pattern or other items in a dataset.. It stands against anomaly detection technique which utilizes the reverse technique of misuse intrusion detection. The anomaly detection takes first step defining usual system behavior than defining all other behavior as irregular. The aspiration suitable data dissemination approach is essential in mobile ad hoc networks (MANET) due to the repeated topology changes. There are two main methods which affect the data dissemination.  Dynamic topology control,  Resource constraint topology control Preven tion Intrusion Monitor Intrusion detection Response
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 587 The Supportive communication has been remarkable attention for mobile ad hoc network networks. The available mechanism on supportive infrastructure is paying attention on link level corporeal layer issues. Accordingly, the impacts of the supportive infrastructure on network level upper layer issues, such as topology control, map-reading and network capacity are ignored. Fig 2.Represent the intrusion detection methods in agent based intruder in MANET Communication NeighboringIDSAgent Sys.callactivities& Communicationactivities Fig2 IDS Agent Model The author used some topology control related protocol to develop the topology and manage the scheme to improve the network capability in MANETs. By uncooperative behavior in intellect of both upper layer systems capacity and physical layer, the communications are compensated. The planned topology organize scheme can considerably improve the network capacity in MANETs with supportive infrastructure. This paper is organized as follows: Section II discusses the classification of intrusion detection of mobile ad hoc network. Section III shows the analysis of recent techniques in active intrusion detection based techniques through disseminated and supportive layer in mobile ad hoc networks. Section IV describes the literature review in tabulation form by comparing the complete intrusion detection and topology control and data dissemination methods. Section V terminates the paper, solution areas of future research to expand their real world applications. Section VI discusses the future direction of these systems. 2. CLASSIFICATION IN INTRUSION DETECTION MANET COMMUNICATION Most of the surviving protocols, applications and services for Mobile Ad Hoc Networks (MANETs) are supposed to be in cooperative and responsive network environment and will not provide security. Consequently, the intrusion detection systems (IDSs), serve as the next line of protection for information systems and are essential for MANETs with elevated security requirements. Fig 2 Classification of Intrusion detection system in MANET The intrusion detection system can be divided into many methods. The major methods are active and passive intrusion detection, Network Intrusion detection systems (NIDS) and host Intrusiondetection systems (HIDS) An Active Intrusion detection system (AID) is as well described as Intrusion Detection and Prevention System. This system is configured to repeatedly block if the attacks devoid of any interference required by an operator. The Passive Intrusion detection (PID) is a system to ease the configuration to only monitor and evaluate network traffic activity and alert an operator to check for probable vulnerabilities and attacks. A passive intrusion detection system doesn’t have any ability of performing defensive or remedial functions on its own. The Network Intrusion Detection(NID) Systems frequently consists of a network sensor with a Network Interface Card operating in dissolute mode and a divided management interface. The intrusion detection system is located beside a network sector or boundary and monitors all traffic on those sectors. The Host Intrusion Detection (HID) Systems and software relevance mediator installed on workstations which are to be monitored. The mediator monitors the operating system and writes data to log records and activate alarms. The Topology control is a method used in dispersed computing to modify the underlying network in regulating to reduce the cost of distributed algorithms unless there are no fresh resulting graphs. The Topology controls are divided into main problems such as topology structure, in charge of the initial reduction and topology preservation, in charge of the preservation of the abridged topology, so the individuality like connectivity and exposure are preserved. Once the preliminary topology is set up particularly when the position of the nodes is haphazard, the proprietor has no control over intend of the system. Nevertheless, the proprietor has control over a number of restrictions of the system: transmission control of the nodes, situation of the nodes (active or sleeping), function of the nodes (Cluster head, gateway, regular), etc. Leading. The optimal abridged topology stops being at the initial next of filled activity. After a few times being active, some nodes determine to run out Secure Communication Cooperative& Collaborative detection engine Global Response Local Data Collection Local Detection Engine Local Response AID PID NID HID IDS
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 588 of energy. Particularly in wireless sensor networks with multi hoping, it is a fact the nodes that are nearer to the sink expend higher amounts of power that those beyond away due to packet forwarding. 3. ANALYSIS OF RECENT TECHNIQUES IN ACTIVE INTRUSION DETECTION IN MOBILE AD HOC NETWORKS 3.1 Various Intrusion Detection Methods in MANET As described in the paper [1], the anomaly – detection scheme is based on a dynamic learning process that allows the training data to be updated at particular time intervals. As mentioned the MANET is an open medium and the network will be vulnerable to malicious attacks, so it is vital to expand efficient intrusion detection method to defend MANET from attacks. As represented and executed a fresh intrusion detection [6] method Enhanced Adaptive Acknowledgment (EAACK) particularly intended for MANETs. EAACK recognized as elevated malicious behavior exposure rates in assured conditions as it does not really influence the network performances. A distributed intrusion detection [15] scheme is based on finish state machine. A cluster dependent detection method is offered, where occasionally a node is elected as the monitor node for a cluster. The different attacks alongside mobile nodes are flooding, black hole, warm hole, packet reducing and Byzantine attack etc. which is important to search new architecture and mechanisms to protect the wireless networks. There are many intrusion detection methods which have been used and are strongly related to routing protocols, such as Watchdog and Pathrater and Routeguard. The watchdog is called intrusion detection and Routeguards/pathraters are called as response. [7] Watchdog inhabits in every node and is based on overhearing. Nevertheless, if the node that is eavesdropping and reporting itself is malicious, then it can cause serious impact on system performance. Intrusion detection is used as a successive line of protection in Mobile Ad-hoc Networks. To carry out the protection they evaluate five supervised [12] categorization algorithms for intrusion exposures method. As they measure their performance on a dataset, which consist of different traffic conditions and mobility model for multiple attacks. The selective black hole is a node that can electively and alternately execute a black hole attack or perform as a normal node. As they demonstrated, numerous [13] IDS nodes are deployed in MANETs in order to sense and avoid discriminating black hole attacks. Sink mobility has captivated much research interest in Wireless Sensor Networks (WSNs), because as demonstrated in moving approach for the mobile sink [3], which avoid tracking or sensing on it by adversaries during its data collection stage around the sensor field. There are lots of applications in Mobile Ad Hoc Networks in which mobile users distribute information. Nevertheless, each of these standard works guessed a particular mobility model and did not completely examine the authority of the mobility on the proposed system. The main aim is to quantify the influences of mobility on data availability [4] and expansions are not done in concrete protocol. An intrusion detection and [5] adaptive reply mechanism for MANETs that senses a variety of attacks and offers an efficient reply with low network degradation. They considered the deficiencies of a fixed response to an intrusion and overcome the deficiencies with a flexible response scheme that depends on the measured confidence in the attack. Insider attacks are one of the active attacks occurred in Ad-hoc network. An intrusion detection system will be developed for detection and isolation of attacks [20] and mac layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the network. The Cognitive radio network to rapidly sense whether they are being attacked, a simple yet effective IDS is then presented. [8] The demonstrated non-parametric cumulative sum (cusum) as the change point detection algorithm to find out the irregular behavior due to attacks. The leader election is to balance the resource consumption among all nodes and extend the lifetime of a MANET and nodes with more remaining resources should be elected as the leaders. However, there are two main complication in attained this goal. Primary, devoid of motivation for serving others, a node might perform inconsiderately by lying about its remaining resources [9] and avoid being elected. The Alert aggregation is a significant associate task of intrusion detection. The goal is to identify and to cluster dissimilar alerts formed by small level intrusion detection systems, firewalls. As demonstrated new technique [10] for online alert aggregation which is dependent on a dynamic, probabilistic model of the current attack situation. As represented in the social system analysis metrics that may be used to hold a new and practical [2] forwarding solution to provide competent message delivery in detached delay tolerant MANETs. 3.2 Multimodal Detection Techniques in MANET The Multimodal is position to work with Intrusion Detection Systems (IDS) to assuage the shortcomings of unimodal [14] systems. The scheme chooses whether user verification is necessary based on the security posture. The decisions are made in a fully distributed manner by each verification device and IDS. This technology is used to ease the inadequacy of uni modal systems. Since each device in the network has measurement [16]
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 589 and estimation limitations, more than one device needs to be elected and observation can be fused to increase observation accuracy by using Dempster–Shafer theory for data fusion. All devices have dimensions and estimation limitation, many devices to be chosen and with the help of Dempster-Shafter theory for data fusion surveillance accuracy gets increased[17]. Based on the safety posture, system terminates which biosensor (IDS) to pick and whether user authentication is essential. The Continuous user-to-device authentication is a demanding task in high security mobile AdHoc networks (MANETs). They are distributed combined authentication and intrusion discovery with data fusion [18] in such MANETs. To obtain the optimal scheme of combining continuous user authentication and IDSs in a distributed manner, they formulate the problem as a partially observable [21] Markov decision process (POMDP) multi-armed bandit problem. They present structural results method to solve the problem for a large network with a variety of nodes. The consistency scheme is server-based in which control mechanisms are implemented to adapt the process of caching a data item and updating it by the server to its popularity and its data update rate at the server [22]. Distributed cache invalidation mechanism is a pull-based algorithm [23] that implements adaptive time to live (TTL), piggybacking, and prefetching, and provides near strong consistency capabilities. The stochastic sequential decision framework [35] to analyze the problem under a Markovian mobility model, the location update decision problem is modeled as a Markov Decision Process (MDP). Then, given a separable cost structure, they show that the location update decisions of NU and LSU can be independently carried out without loss of optimality, i.e., a separation property. The attacks which compromise the sensor nodes are dangerous because they allow the attacker to leverage the [36] compromise of a few nodes to exert control over much of the network. GenProg uses an extended form of genetic programming to evolve a program variant that retains required functionality but is not susceptible to a given defect, using existing test suites to encode both the defect and required [37] functionality. The game theoretical analysis derives the expected behaviors of rational attackers [38], the minimum monitor resource requirement, and the optimal strategy of the defenders. The guidelines for IDS design and deployment are provided. 3.3 Topology Control Protocols for MANET The topology control has received much concentration in motionless sensor networks by efficiently reducing energy consumption, reducing interference, and limitation end-to-end delay, the transience of mobile nodes in Mobile Ad hoc Networks. The K edge connected topology control algorithms [27] are mainly used for the dynamic key methods. The multiuser successive interference cancellation (MUSIC) is a framework that greedly forms and stimulates sub [28] topologies in a way that favor successful SIC decoding with a high probability. The cooperative communications are [29] focused on link-level physical layer issues. The Capacity-Optimized Cooperative (COCO) topology control scheme is to improve the network capacity in MANETs by jointly considering both upper layer network capacity and physical layer cooperative communications. The Network Connectivity based Topology Control (NCTC) to make [30] the correct the balance between interference and energy in order to improve the network lifetime of networks. The weighted and learning automata [31] dependent algorithm used to exaggerate energy preservation in a mobile ad hoc network. The Energy Efficient Topology Control [32] Approach is developed to attain both network connectivity and energy consumption. While considering the spam attack in MANET with cooperative [33] communication results low throughput in network. So the proposed Secure Adaptive Distributed Topology Control Algorithm aims at topology control and performs secure self-organization in four phases i.e., Antinode Detection, Cluster Formation, Key Distribution and Key Renewal, to protect against malicious node attacks. Security systems have important impacts on throughput. The topology control methods [34] are used to get better throughput by together manipulating upper layer security system and physical layer system. It’s interrelated to channel circumstances and relay assortment for cooperative communications. Routing problems have become highly challenging because of the popularity of mobile devices. A transient multicast tree is established on demand and derived based on the autonomous decisions of intermediate nodes. They proved that the derived tree is loop-free and theoretically optimal in the maximization of minimum residual energy [24]. The general framework for designing topology inference algorithms [26] based on additive metrics is used. The framework can flexibly fuse information from multiple measurements to achieve better estimation accuracy. The broadcasting algorithm suitable for a wide range of vehicular scenarios, which only employs local information acquired via periodic beacon messages, containing acknowledgments of the [25] circulated broadcast messages. As represented the redundancy management of heterogeneous wireless sensor networks use multipath routing to respond user queries in the presence of undependable and malicious nodes. They devise the exchange as an optimization [11] problem for dynamically determining the best redundancy stage to relate to multipath routing for intrusion tolerance so that the query
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 590 reaction success probability is maximized while prolonging the functional lifetime. 4. ANALYSIS OF PEFORMANCE PARAMETERS ON WSN INTRUSION DETECTION METHODS The existing Enhanced Adaptive Acknowledgment for the utility of such exposure schemes is all most based on the acknowledgment packets. These methods accept a digital signature named Enhanced AACK (EAACK).The possibilities of implementing hybrid cryptography system to additionally reduce the network overhead caused by digital signature as well as the possibilities of implementing a key swap mechanism to eradicate the condition of pre distributed keys. The Anti-Black whole Mechanism utility, which is mainly used to estimate an apprehensive value of a node according to the abnormal dissimilarity between the routing messages transmitted from the node. This method does not hold any key distribution and authentication methods. The Smart server update is server-based in which control mechanisms are implemented to adapt the process of caching a data item and updating it by the server to its popularity and its data update rate at the server. The main drawback is it does not contain grasping effects of cache placement strategies and cache replication on performance. The distributed cache invalidation mechanism is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and prefetching, and provides near strong consistency capabilities. The main disadvantages of the system is when TTL algorithms are more complicated to reinstate the consecutively average function and does not execute the entire replica allocation. The multiuser successive interference cancellation (MUSIC) is a framework that greedly forms and stimulates sub [28] topologies in a way that favor successful SIC decoding with a high probability The cluster dependent and detection scheme is used when periodically a node is designated as the observe node for a cluster. This observing nodes can not only make limited intrusion detection resolution, but does not cooperatively take part in global intrusion detection. An Alert aggregation is dependent on a vigorous, probabilistic illustration of the contemporary attack circumstances. Alert aggregation is a significant sub assignment of intrusion detection. The objective is to discover and to cluster dissimilar alerts formed by low level interruption detection systems. The main drawback of the system does not deliberate techniques for interestingness dependent communication approach for dispersed IDS. Fig : parametrics on intrusion deteion methods of WSN Y-refers to the usage of corresponding parameter in its method Parameters Packetdeliveryratio EndtoEnddelay Energyefficiency Computationalcost Routingoverhead Packetdeliverydelay Throughput FalsePositiverate Hitratio ExecutionTime PercentageofIDS PacketLossrate Truepositiverate Anomaly Detection Scheme Y  Y Y Disconnected Delay-Tolerant Y Y Anti-DetectionTechnique Y Y Y Influences Of Mobility On Data Availability Y Y Y Attack Prevention Y Y (POMDP) Y Y Smart Server Update Mechanism Y Y Distributed Cache Invalidation Method Y Y Maximum-Residual Multicast Protocol Y Y Cooperative Communications Y Stochastic Sequential Decision Y Y Y Predetermined Sensor Locality Y Y Y Y
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 591 5. CONCULSIONS As the use of MANET has enlarged the security in MANETs, it has also developed into more significant. Chronological event explores that prevention only means cryptography and authentication, but they are not as much as necessary. Hence the IDS is fetching into the consideration. The discussion about the existing techniques dynamic anomaly detection usually used to authenticate the exceptionality and the topology of the network thus avoid any malicious crowd from combination the network. After scrutinizing the architectures of IDS for MANETs they came to conclusion that IDS structural design that entail cross layer design using independent mobile representative dependent on architecture. In which the dispersed and supportive competently detect the irregularity and additionally it is appropriate for mobile ad hoc networks. SCOPE OF FUTURE ENHANCEMENT To accomplish the dynamic anomaly detection is to unconstraint the feature, and also some other nearest neighboring techniques. It preserves the dependent mechanism, where it introduced to examine the intrusions efficiently. The preserve dependent mechanism factor recognizes the similarity to usual classes and detects abnormal attacks. Nearest neighbor and preserve dependent mechanism frequently uses machine learning and ad- hoc network intrusion detection. To overcome these scheduling decisions, focus is made on developing dispersed development resolution combine authentication and intrusion exposure for efficient scheduling of information in MANET. In the dispersed development resolution, the most appropriate biosensors are animatedly elected dependent on the recent security posture and energy states. The biometric scheme controls in verification mode that single match method to covenant with an efficient scheduling. All biometric scheme give way of binary option and each of the devices are used at each time slot with multiple sources. To realize this, Joint authentication and topology control using layer dependent exposure method is developed in MANET. Layer dependent exposure method deals with the faultless of the channel information and to accomplish exactness. The Layer based exposure intrusion detection method combine the suppleness of anomaly detection with the accuracy. In demand is to enlarge the machine learning technique in order to attain competent and efficient intrusion detection. REFERENCES [1]. Hidehisa Nakayama., Satoshi Kurosawa, Abbas Jamalipour., Yoshiaki Nemoto., and Nei Kato., ―A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks,‖ IEEE Transactions On Vehicular Technology, Vol. 58, No. 5, June 2009 [2]. Elizabeth M. Daly., and Mads Haahr, ―Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANET,‖ IEEE Transactions on Mobile Computing, Vol. 8, No. 5, May 2009 [3]. Zhou Sha., Jia-Liang Lu., Xu Li., Min-You Wu., ―An Anti- Detection Moving Strategy for Mobile Sink,‖ IEEE Global Telecommunications Conference (GLOBECOM 2010) [4]. Takahiro Hara, ―Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks‖, IEEE Transactions on Mobile Computing, Vol. 9, No. 2, FEBRUARY 2010 [5]. Adnan Nadeem, Michael, Howarth, ―An Intrusion Detection & Adaptive Response Mechanism for MANETs‖ Journal of Elsevier Sep 2013 [6]. Elhadi, Shakshuki, Nan Kang, Tarek and Sheltami, ―EAACK—A Secure Intrusion-Detection System for MANETs ―, IEEE Transactions on Industrial Electronics, Vol. 60, No. 3, March 2013 [7]. Nidal Nasser and Yunfeng Chen, ―Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad hoc Networks Communications‖, 2007. ICC '07. IEEE International Conference on 24-28 June 2007 [8]. Zubair Md. Fadlullah, Hiroki Nishiyama, and Nei Kato, ―Intrusion Detection System (IDS) for Combating Attacks against Cognitive Radio Networks Zubair Network‖, IEEE (Volume: 27, Issue: 3), May-June 2013 [9]. Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya ―Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET‖, IEEE transactions on dependable and secure computing volume: 8, issue: 1 2011 , page(s): 89 - 103 [10]. Alexander Hofmann, Bernhard Sick, Member, ―On-Line Intrusion Alert Aggregation with Generative Data Stream Modeling‖, IEEE Transactions on Dependable and Secure Computing, (Volume: 8, Issue: 2), March-April 2011 [11]. Hamid Al-Hamadi and Ing-Ray Chen, ―Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks‖, IEEE Transactions on Network and Service Management, Vol. 10, No. 2, June 2013 [12]. Aikaterini Mitrokotsa, Christos Dimitrakakis ―Intrusion detection in MANET using classification algorithms: The effects of cost and model selection‖, journal of Elsevier, 2012 [13]. Ming-Yang Su ―Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems‖, journal of Elsevier, 2011 [14]. Parasakthi and sanjeev kumar, ―Distributed Combined Authentication and Intrusion Detection in High-Security Mobile Ad Hoc Networks to reduce the computation complexity‖, National Conference on Advances in Computer Science and Applications with International Journal of Computer Applications (NCACSA 2012) [15]. Yi Ping, Jiang Xinghao, Wu Yue & Liu Ning ―Distributed intrusion detection for mobile ad hoc network‖, Journal of Systems Engineering and Electronics Vol. 19, No. 4, 2008 [16]. T.Kumanan and Duraiswamy ―Dynamic Intrusion Detection with Data Fusion and Aggregation in High-Security Mobile Ad Hoc Networks‖, International Journal of Computer
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 592 Science and Information Technologies, Vol. 3 (2), 2012, 3743- 3748 [17]. Lakshmi Narayanan and Fidal Castro ―High Security for MANET Using Authentication and Intrusion Detection with Data Fusion‖, International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012 1 ISSN 2229-5518 [18]. Jeyashree, ―Highly Secure Distributed Authentication and Intrusion Detection with Data Fusion in MANET‖, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013 [19]. R.Nallusamy, K.Jayarajan, Dr.K.Duraiswamy, ―Intrusion Detection in Mobile Ad Hoc Networks Using GA Based Feature Selection‖, Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2009|No.5 (22) [20]. Tapan P. Gondaliya, Maninder Singh, ―Intrusion detection System for Attack Prevention in Mobile Ad-hoc Network‖, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 [21]. Shengrong Bu., F. Richard Yu., Xiaoping P. Liu., and Helen Tang., ―Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks,‖ IEEE Transactions on Wireless Communications, Vol. 10, No. 9, September 2011 [22]. Khaleel Mershad and Hassan Artail., ―SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments,‖ IEEE Transactions on Mobile Computing, Vol. 9, No. 6, June 2010 [23]. Kassem Fawaz., and Hassan Artail., ―DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks,‖ IEEE Transactions on Mobile Computing, Vol. 12, No. 4, April 2013 [24]. Pi-Cheng Hsiu. And Tei-Wei Kuo, ―A Maximum-Residual Multicast Protocol for Large-Scale Mobile Ad Hoc Networks,‖ IEEE Transactions on Mobile Computing, Vol. 8, No. 11, November 2009 [25]. Francisco Javier Ros, Pedro Miguel Ruiz and Ivan Stojmenovic, ―Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Dissemination in Vehicular Ad Hoc Networks‖, IEEE Transactions on Mobile Computing, Vol. 11, No. 1, January 2012 [26]. Jian Ni, Haiyong Xie, Sekhar Tatikonda, and Yang Richard Yang, ―Efficient and Dynamic Routing Topology Inference from End-to-End Measurements‖, IEEE/ACM transactions on networking, vol. 18, no. 1, February 2010 [27]. Hiroki Nishiyama, Thuan Ngo, Nirwan Ansari, and Nei Kato, ―On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks‖, IEEE Transactions on Wireless Communications, Vol. 11, No. 3, March 2012 [28]. Ece Gelal, Jianxia Ning, Konstantinos Pelechrinis, Tae- SukKim, Ioannis Broustis, Srikanth V. Krishnamurthy, and Bhaskar, ―Topology Control for Effective Interference Cancellation in Multiuser MIMO Networks‖, IEEE/ACM Transactions on Networking, Vol. 21, No. 2, April 2013 [29]. Quansheng Guan, Richard Yu, Shengming Jiang and Victor C. M. Leung, ―Topology Control in Mobile Ad Hoc Networks with Cooperative Communications‖, IEEE Transaction on Wireless Communications, (Volume: 19, Issue: 2), April 2012 [30]. Asha and Muniraj, ―Network Connectivity based Topology Control for Mobile Ad Hoc Networks‖, International Journal of Computer Applications (0975 – 8887) Volume 56– No.2, October 2012 [31]. Nasrin Shirali, ―Topology control in the mobile ad hoc networks in order to intensify energy conservation‖, Journal of Elsevier Volume 37, Issue 24, 15 December 2013, Pages 10107– 10122 [32]. Asha and muniraj ―Energy Efficient Topology Control Approach for Mobile Ad hoc Networks‖, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 4, No 1, July 2013 [33]. Bharathi and saranya, ―High Throughput Analysis Using Topological Control & Authentication Scheme in MANET‖, International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 3, March 2013 [34]. Quansheng Guan., F. Richard Yu., Shengming Jiang., and Victor C. M. Leung, ―Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks with Cooperative Communications,‖ IEEE Transactions on Vehicular Technology, Vol. 61, No. 6, July 2012 [35]. Zhenzhen Ye and Alhussein A. Abouzeid, ―Optimal Stochastic Location Updates in Mobile Ad Hoc Networks,‖ IEEE Transactions on Mobile Computing, Vol. 10, No. 5, May 2011 [36]. Jun-Won Ho., Wright, M.; Das, S.K., ―Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis,‖ IEEE, INFOCOM 2009 [37]. Claire Le Goues., ThanhVu Nguyen., Stephanie Forrest., and Westley Weimer., ―GenProg: A Generic Method for Automatic Software Repair,‖ IEEE Transactions on Software Engineering, Vol. 38, No. 1, January/February 2012