Agent Based Dynamic Anomaly Intrusion Detection in MANET
Abstract
Keywords
Full Text:
PDFReferences
A.Mishra, K.Nadkarni, and A.Patcha, “Intrusion detection in wireless ad hoc networks”, IEEE Wireless Commun., vol.11, no.1, pp.48-60, Feb.2004.
M.Chatterjee, S.K. Das and D.Turgut, 2002. WCA: A Weighted Clustering Algorithm (WCA) for mobile ad hoc networks. Cluster Compute, vol.5, pp.193-204.
L.Chambers, Practical Handbook of Genetic algorithm application, vol.1, CRC Press, 1995.
Er, I.I, and W.K.G.Seah, “Mobility Based d-hop clustering algorithm for mobile ad hoc networks”, IEEE Wireless Commun, Networking Conf., vol.4, pp.2359-2364.
B.Sun, K.Wu, and U.Pooch, “Towards adaptive intrusion detection in mobile ad hoc networks”, in proc.IEEE Global Telecommunm. Conf GLOBECOM, NOV./DEC. 2004, PP.3551-3555.
R.Nakkeeran, T.Aruldoss Albert, and R.Ezumalai,“Agent based efficient anomaly intrusion detection in ad hoc networks”, IACSIT, vol.2, no.1, Feb.10.
Yia-an Huang, W.Enke Lee, “A Cooperative intrusion detection system for ad hoc networks”, ACM Workshop on security of ad hoc and sensor networks, 2003, pp.135-147.
Hang Yu Yang, Li-Xia Xie, “Agent based intrusion Detection for a Wireless Local Area Network”, Proceedings of the IEEE third international Conference on Machine Learning and Cybermatics, 2004, pp. 2640-2643.
D.Turgut, S.K. Das, R.Elmasri and B.Turgut, 2002. “Optimizing clustering algorithm in mobile ad hoc networks using genetic algorithm approach”, IEEE Global Telecommunications Conference. GLOBECOM Apos, 2002, pp. 62-66.
P.Argyroudis and D.O’Mahony, “Secure routing for mobile ad hoc networks, ”Commun. Surveys Tuts, vol.7, no.3, pp.2-21, Third Quarter, 2005.
J.F.Sharmila, B.R.Elijah, “Performance analysis of clustering protocols in mobile ad hoc networks, Computer Science, 2008, pp.192-204.
R.Heady,G.Luger,A.Maccabe and M.Servilla, The architecture of a network level intrusion detection system, Technical Report, Computer Science Department, University of New Mexico(August 1990).
B.Mukherjee, L.Todd Heberlein, and Karl N.Levitt, Network Intrusion Detection, IEEE Network, May/June 1994.
R.Janakiraman, M.Waldvogel, and Qi Zhang. Indra: a peer-to-peer approach to network intrusion detection and prevention, Twelfth IEEE International Workshops, Jun 9-11, 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.