An introduction to support Vector Machines: and other kernel-based learning methods
An introduction to support Vector Machines: and other kernel-based learning methods
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A General Cooperative Intrusion Detection Architecture for MANETs
IWIA '05 Proceedings of the Third IEEE International Workshop on Information Assurance
Securing the AODV protocol using specification-based intrusion detection
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Integration of mobility and intrusion detection for wireless ad hoc networks: Research Articles
International Journal of Communication Systems
Adaptive intrusion detection & prevention of denial of service attacks in MANETs
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA
IEEE Transactions on Dependable and Secure Computing
A specification-based intrusion detection model for OLSR
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
IEEE Wireless Communications
Hi-index | 0.00 |
Mobile Ad Hoc Networks are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders. Anomaly-based detection engines are a topic of ongoing interest in the research community, due to their advantage in detecting unknown attacks. However, this advantage is offset by a number of limitations such as high rates of false alarms, imposition of processing overhead, lack of adaptability under dynamic network conditions etc. This paper presents a comprehensive evaluation and comparison of the most recent literature in the area of anomaly detection for MANETs. The provided weaknesses and limitations, which are thoroughly examined in this paper, constitute open issues in the area of MANET security and will drive future research steps.