A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Securing the AODV protocol using specification-based intrusion detection
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol
Wireless Personal Communications: An International Journal
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
International Journal of Knowledge-based and Intelligent Engineering Systems - Extended papers selected from KES-2006
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
WSEAS Transactions on Computers
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
Proceedings of the second ACM conference on Wireless network security
OpenLIDS: a lightweight intrusion detection system for wireless mesh networks
Proceedings of the 15th annual international conference on Mobile computing and networking
A weighted-dissimilarity-based anomaly detection method for mobile networks
Proceedings of the 2009 International Conference on Hybrid Information Technology
A dynamic intrusion detection hierarchy for MANETs
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
SAID: a self-adaptive intrusion detection system in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
On RSN-oriented wireless intrusion detection
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Lightweight and distributed attack detection scheme in mobile ad hoc networks
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Quantifying resiliency and detection latency of intrusion detection structures
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Creating and maintaining a good intrusion detection hierarchy in dynamic ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A cross-layer approach to detect jamming attacks in wireless ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Exploring discrepancies in findings obtained with the KDD Cup '99 data set
Intelligent Data Analysis
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Zone-Based clustering for intrusion detection architecture in ad-hoc networks
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
A system for power-aware agent-based intrusion detection (SPAID) in wireless ad hoc networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
APA: an interior-oriented intrusion detection system based on multi-agents
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
A distributed intrusion detection scheme for wireless ad hoc networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Evaluation of classification algorithms for intrusion detection in MANETs
Knowledge-Based Systems
Information Sciences: an International Journal
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Honeypot Framework for Wireless Sensor Networks
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Algorithms for a distributed IDS in MANETs
Journal of Computer and System Sciences
Hi-index | 0.00 |
In this paper we propose a distributed intrusiondetection system for ad hoc wireless networks based onmobile agent technology. Wireless networks areparticularly vulnerable to intrusion, as they operate inopen medium, and use cooperative strategies for networkcommunications. By efficiently merging audit data frommultiple network sensors, we analyze the entire ad hocwireless network for intrusions and try to inhibit intrusionattempts. In contrast to many intrusion detection systemsdesigned for wired networks, we implement an efficientand bandwidth-conscious framework that targetsintrusion at multiple levels and takes into accountdistributed nature of ad hoc wireless networkmanagement and decision policies.