1) The document discusses providing security against distributed denial of service (DDOS) attacks in mobile ad hoc networks. It focuses on intrusion detection systems and detecting black hole and wormhole attacks. 2) Black hole attacks involve malicious nodes pretending to have valid routes to destinations in order to intercept packets. Wormhole attacks involve tunneling packets between two points in the network to attract traffic. 3) The document proposes using intrusion detection systems that use both signature-based and anomaly-based detection to identify these types of attacks without prior knowledge of signatures. It aims to provide a solution for detecting and mitigating DDOS attacks in ad hoc networks.