Abstract
In recent years, mobile ad hoc networks (MANET) have become an interesting research area. This type of networks have a salient characteristics compare with wired networks which are more vulnerable. Nowadays, for the network security, defend in depth strategies are used. One of them is intrusion detection system (IDS). Many intrusion detection techniques developed for weird networks however, because the nature of MANET we cannot apply them directly in MANET. According to detection techniques, IDSs can be classified into three categories as follows: Misuse-based detection, Anomaly-based detection, and Specification-based detection. In this paper, we are going to evaluate anomaly-based intrusion detection techniques proposed for MANET. For this, we present a comprehensive survey about anomaly based intrusion detection techniques. Afterward we evaluate their performance, advantages, and disadvantages. As a result constantly, we will understand MANET’s security problems based on which we can suggest solutions for future research.
Highlights
A mobile ad hoc network is a collection of mobile nodes that communicate with each other via wireless links, directly or relying on other nodes as routers
The structure of this article is as follow: In section 2, Classification and architectures for intrusion detection systems are presented; In section 3, anomaly-based detection techniques are analyzed; In section 4, anomaly-based detection systems proposed will be evaluated; In section 5, we’ll discuss categorization of IDS’s and in section 6, we will arrive at conclusions and will propose some suggestions for future research
Because one or more agents can be placed inside a node, the intrusion detection operation can be distributed throughout the network
Summary
A mobile ad hoc network is a collection of mobile nodes that communicate with each other via wireless links, directly or relying on other nodes as routers. Their main advantage is flexibility, adaptability, cooperation and efficient communication in environments without the help of any fixed infrastructure or centralized management point. Despite many advantages, these type of networks are inherently vulnerable to various attacks due to some features such as open medium, dynamic topology, lack of centralized management and control points and etc (Huang & Wenke, 2003). The structure of this article is as follow: In section 2, Classification and architectures for intrusion detection systems are presented; In section 3, anomaly-based detection techniques are analyzed; In section 4, anomaly-based detection systems proposed will be evaluated; In section 5, we’ll discuss categorization of IDS’s and in section 6, we will arrive at conclusions and will propose some suggestions for future research
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.