 Open Access
				Open Access 
				 Subscription or Fee Access
									Subscription or Fee Access
							Agent Based Dynamic Anomaly Intrusion Detection in MANET
Abstract
Keywords
References
A.Mishra, K.Nadkarni, and A.Patcha, “Intrusion detection in wireless ad hoc networks”, IEEE Wireless Commun., vol.11, no.1, pp.48-60, Feb.2004.
M.Chatterjee, S.K. Das and D.Turgut, 2002. WCA: A Weighted Clustering Algorithm (WCA) for mobile ad hoc networks. Cluster Compute, vol.5, pp.193-204.
L.Chambers, Practical Handbook of Genetic algorithm application, vol.1, CRC Press, 1995.
Er, I.I, and W.K.G.Seah, “Mobility Based d-hop clustering algorithm for mobile ad hoc networks”, IEEE Wireless Commun, Networking Conf., vol.4, pp.2359-2364.
B.Sun, K.Wu, and U.Pooch, “Towards adaptive intrusion detection in mobile ad hoc networks”, in proc.IEEE Global Telecommunm. Conf GLOBECOM, NOV./DEC. 2004, PP.3551-3555.
R.Nakkeeran, T.Aruldoss Albert, and R.Ezumalai,“Agent based efficient anomaly intrusion detection in ad hoc networks”, IACSIT, vol.2, no.1, Feb.10.
Yia-an Huang, W.Enke Lee, “A Cooperative intrusion detection system for ad hoc networks”, ACM Workshop on security of ad hoc and sensor networks, 2003, pp.135-147.
Hang Yu Yang, Li-Xia Xie, “Agent based intrusion Detection for a Wireless Local Area Network”, Proceedings of the IEEE third international Conference on Machine Learning and Cybermatics, 2004, pp. 2640-2643.
D.Turgut, S.K. Das, R.Elmasri and B.Turgut, 2002. “Optimizing clustering algorithm in mobile ad hoc networks using genetic algorithm approach”, IEEE Global Telecommunications Conference. GLOBECOM Apos, 2002, pp. 62-66.
P.Argyroudis and D.O’Mahony, “Secure routing for mobile ad hoc networks, ”Commun. Surveys Tuts, vol.7, no.3, pp.2-21, Third Quarter, 2005.
J.F.Sharmila, B.R.Elijah, “Performance analysis of clustering protocols in mobile ad hoc networks, Computer Science, 2008, pp.192-204.
R.Heady,G.Luger,A.Maccabe and M.Servilla, The architecture of a network level intrusion detection system, Technical Report, Computer Science Department, University of New Mexico(August 1990).
B.Mukherjee, L.Todd Heberlein, and Karl N.Levitt, Network Intrusion Detection, IEEE Network, May/June 1994.
R.Janakiraman, M.Waldvogel, and Qi Zhang. Indra: a peer-to-peer approach to network intrusion detection and prevention, Twelfth IEEE International Workshops, Jun 9-11, 2003.
Refbacks
- There are currently no refbacks.
 
	This work is licensed under a Creative Commons Attribution 3.0 License.
 
 
  
  
  
  
  Email this article
			Email this article