Abstract

In recent years, mobile ad hoc networks (MANET) have become an interesting research area. This type of networks have a salient characteristics compare with wired networks which are more vulnerable. Nowadays, for the network security, defend in depth strategies are used. One of them is intrusion detection system (IDS). Many intrusion detection techniques developed for weird networks however, because the nature of MANET we cannot apply them directly in MANET. According to detection techniques, IDSs can be classified into three categories as follows: Misuse-based detection, Anomaly-based detection, and Specification-based detection. In this paper, we are going to evaluate anomaly-based intrusion detection techniques proposed for MANET. For this, we present a comprehensive survey about anomaly based intrusion detection techniques. Afterward we evaluate their performance, advantages, and disadvantages. As a result constantly, we will understand MANET’s security problems based on which we can suggest solutions for future research.

Highlights

  • A mobile ad hoc network is a collection of mobile nodes that communicate with each other via wireless links, directly or relying on other nodes as routers

  • The structure of this article is as follow: In section 2, Classification and architectures for intrusion detection systems are presented; In section 3, anomaly-based detection techniques are analyzed; In section 4, anomaly-based detection systems proposed will be evaluated; In section 5, we’ll discuss categorization of IDS’s and in section 6, we will arrive at conclusions and will propose some suggestions for future research

  • Because one or more agents can be placed inside a node, the intrusion detection operation can be distributed throughout the network

Read more

Summary

Introduction

A mobile ad hoc network is a collection of mobile nodes that communicate with each other via wireless links, directly or relying on other nodes as routers. Their main advantage is flexibility, adaptability, cooperation and efficient communication in environments without the help of any fixed infrastructure or centralized management point. Despite many advantages, these type of networks are inherently vulnerable to various attacks due to some features such as open medium, dynamic topology, lack of centralized management and control points and etc (Huang & Wenke, 2003). The structure of this article is as follow: In section 2, Classification and architectures for intrusion detection systems are presented; In section 3, anomaly-based detection techniques are analyzed; In section 4, anomaly-based detection systems proposed will be evaluated; In section 5, we’ll discuss categorization of IDS’s and in section 6, we will arrive at conclusions and will propose some suggestions for future research

Intrusion Detection Systems
Classification of Intrusion Detection System
Architecture of IDS
Distributed and Cooperative Intrusion Detection Systems
Hierarchical Intrusion Detection Systems
Mobile Agent for Intrusion Detection Systems
Statistical-Based Techniques
Knowledge-Based Techniques
Machine Learning-Based Techniques
Analysis and Evaluation of Anomaly-Based Detection System
Discussion and Summary
Conclusion and Further Guidelines

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.