Network-based Anomaly Intrusion Detection System in MANETS
Title | Network-based Anomaly Intrusion Detection System in MANETS |
Publication Type | Miscellaneous |
Year of Publication | 2020 |
Authors | Hussain, M. S., Khan, K. U. R. |
ISBN Number | 978-1-7281-2813-9 |
Keywords | ad hoc network, Ad hoc networks, component, compositionality, fixed wired network, IDS, infrastructure-less networks, intrusion detection system, intrusion detection techniques, MANET Attack Detection, MANETs, Metrics, mobile ad hoc networks, mobile adhoc networks, mobile radio, network intrusion detection, network protocols, Network Simulator-2, Network-based anomaly intrusion detection system, pre-existing unfolding solutions, pubcrawl, resilience, Resiliency, Routing protocols, security, security of data, telecommunication security, wired environment, wireless Adhoc networks, wireless network, wireless networks |
Abstract | In the communication model of wired and wireless Adhoc networks, the most needed requirement is the integration of security. Mobile Adhoc networks are more aroused with the attacks compared to the wired environment. Subsequently, the characteristics of Mobile Adhoc networks are also influenced by the vulnerability. The pre-existing unfolding solutions are been obtained for infrastructure-less networks. However, these solutions are not always necessarily suitable for wireless networks. Further, the framework of wireless Adhoc networks has uncommon vulnerabilities and due to this behavior it is not protected by the same solutions, therefore the detection mechanism of intrusion is combinedly used to protect the Manets. Several intrusion detection techniques that have been developed for a fixed wired network cannot be applied in this new environment. Furthermore, The issue of intensity in terms of energy is of a major kind due to which the life of the working battery is very limited. The objective this research work is to detect the Anomalous behavior of nodes in Manet's and Experimental analysis is done by making use of Network Simulator-2 to do the comparative analysis for the existing algorithm, we enhanced the previous algorithm in order to improve the Energy efficiency and results shown the improvement of energy of battery life and Throughput is checked with respect to simulation of test case analysis. In this paper, the proposed algorithm is compared with the existing approach. |
URL | https://ieeexplore.ieee.org/document/9171127 |
DOI | 10.1109/ICISC47916.2020.9171127 |
Citation Key | shussain_network-based_2020 |
- network intrusion detection
- wireless networks
- wireless network
- wireless Adhoc networks
- wired environment
- telecommunication security
- security of data
- security
- Routing protocols
- Resiliency
- resilience
- pubcrawl
- pre-existing unfolding solutions
- Network-based anomaly intrusion detection system
- Network Simulator-2
- network protocols
- MANET Attack Detection
- mobile radio
- mobile adhoc networks
- mobile ad hoc networks
- Metrics
- MANETs
- intrusion detection techniques
- intrusion detection system
- infrastructure-less networks
- IDS
- fixed wired network
- Compositionality
- component
- Ad hoc networks
- ad hoc network