[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Şen et al., 2009 - Google Patents

Intrusion detection in mobile ad hoc networks

Şen et al., 2009

View PDF
Document ID
13211157248300886748
Author
Şen S
Clark J
Publication year
Publication venue
Guide to wireless ad hoc networks

External Links

Snippet

In recent years, mobile ad hoc networks (MANETs) have become a very popular research topic. By providing communications in the absence of a fixed infrastructure, MANETs are an attractive technology for many applications such as rescue operations, tactical operations …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/12Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
    • H04W40/14Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks

Similar Documents

Publication Publication Date Title
Şen et al. Intrusion detection in mobile ad hoc networks
Khan et al. ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Rehman et al. Sinkhole attacks in wireless sensor networks: A survey
Anantvalee et al. A survey on intrusion detection in mobile ad hoc networks
Le et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Abduvaliyev et al. On the vital areas of intrusion detection systems in wireless sensor networks
Ghugar et al. LB‐IDS: Securing Wireless Sensor Network Using Protocol Layer Trust‐Based Intrusion Detection System
Farooqi et al. A survey of intrusion detection systems for wireless sensor networks
Raja Basha Energy efficient aggregation technique‐based realisable secure aware routing protocol for wireless sensor network
Ourouss et al. Defending against smart grayhole attack within MANETs: A reputation-based ant colony optimization approach for secure route discovery in DSR protocol
Arul Selvan et al. Malicious node identification using quantitative intrusion detection techniques in MANET
Nogueira et al. A security management architecture for supporting routing services on WANETs
Alnaghes et al. A survey on some currently existing intrusion detection systems for mobile ad hoc networks
Alghamdi Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
Agarkar et al. A comprehensive survey on routing schemes and challenges in wireless sensor networks (WSN)
Ghosal et al. Intrusion detection in wireless sensor networks: Issues, challenges and approaches
Vijaya Kumar et al. Self‐Adaptive Trust Based ABR Protocol for MANETs Using Q‐Learning
Prasad Secure intrusion detection system routing protocol for mobile ad‐hoc network
Abidoye et al. Lightweight models for detection of denial‐of‐service attack in wireless sensor networks
Hikal et al. Detection of black-hole attacks in MANET using adaboost support vector machine
Singh et al. Capitulation of mitigation techniques of packet drop attacks in MANET to foreground nuances and ascertain trends
Chakravarthi et al. A review on intrusion detection techniques and intrusion detection systems in MANETs
Alattar et al. On lightweight intrusion detection: modeling and detecting intrusions dedicated to OLSR protocol
Yilmaz et al. Exploring placement of intrusion detection systems in rpl-based internet of things
Bhale et al. A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks