Şen et al., 2009 - Google Patents
Intrusion detection in mobile ad hoc networksŞen et al., 2009
View PDF- Document ID
- 13211157248300886748
- Author
- Şen S
- Clark J
- Publication year
- Publication venue
- Guide to wireless ad hoc networks
External Links
Snippet
In recent years, mobile ad hoc networks (MANETs) have become a very popular research topic. By providing communications in the absence of a fixed infrastructure, MANETs are an attractive technology for many applications such as rescue operations, tactical operations …
- 238000001514 detection method 0 title abstract description 173
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/12—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
- H04W40/14—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Şen et al. | Intrusion detection in mobile ad hoc networks | |
Khan et al. | ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs | |
Rehman et al. | Sinkhole attacks in wireless sensor networks: A survey | |
Anantvalee et al. | A survey on intrusion detection in mobile ad hoc networks | |
Le et al. | 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach | |
Abduvaliyev et al. | On the vital areas of intrusion detection systems in wireless sensor networks | |
Ghugar et al. | LB‐IDS: Securing Wireless Sensor Network Using Protocol Layer Trust‐Based Intrusion Detection System | |
Farooqi et al. | A survey of intrusion detection systems for wireless sensor networks | |
Raja Basha | Energy efficient aggregation technique‐based realisable secure aware routing protocol for wireless sensor network | |
Ourouss et al. | Defending against smart grayhole attack within MANETs: A reputation-based ant colony optimization approach for secure route discovery in DSR protocol | |
Arul Selvan et al. | Malicious node identification using quantitative intrusion detection techniques in MANET | |
Nogueira et al. | A security management architecture for supporting routing services on WANETs | |
Alnaghes et al. | A survey on some currently existing intrusion detection systems for mobile ad hoc networks | |
Alghamdi | Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud | |
Agarkar et al. | A comprehensive survey on routing schemes and challenges in wireless sensor networks (WSN) | |
Ghosal et al. | Intrusion detection in wireless sensor networks: Issues, challenges and approaches | |
Vijaya Kumar et al. | Self‐Adaptive Trust Based ABR Protocol for MANETs Using Q‐Learning | |
Prasad | Secure intrusion detection system routing protocol for mobile ad‐hoc network | |
Abidoye et al. | Lightweight models for detection of denial‐of‐service attack in wireless sensor networks | |
Hikal et al. | Detection of black-hole attacks in MANET using adaboost support vector machine | |
Singh et al. | Capitulation of mitigation techniques of packet drop attacks in MANET to foreground nuances and ascertain trends | |
Chakravarthi et al. | A review on intrusion detection techniques and intrusion detection systems in MANETs | |
Alattar et al. | On lightweight intrusion detection: modeling and detecting intrusions dedicated to OLSR protocol | |
Yilmaz et al. | Exploring placement of intrusion detection systems in rpl-based internet of things | |
Bhale et al. | A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks |