A survey on intrusion detection and prevention in wireless ad-hoc networks

作者: Khalid Khan , Amjad Mehmood , Shafiullah Khan , Muhammad Altaf Khan , Zeeshan Iqbal

DOI: 10.1016/J.SYSARC.2019.101701

关键词:

摘要: … WSN), while the survey [45] only considered WSN. In our survey we gave a brief description … The technique of intrusion detection which is commonly used is the Bayesian classifier. It is …

参考文章(163)
Nai-Wei Lo, Fang-Ling Liu, A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET Springer, New York, NY. pp. 59- 65 ,(2013) , 10.1007/978-1-4614-6747-2_8
Animesh Patcha, Jung-Min Park, A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks International Journal of Network Security. ,vol. 2, pp. 131- 137 ,(2006)
Md Satria Mandala, Asri Ngadi, A Hanan Abdullah, Sambasiva Rao Baragada, S Ramakrishna, MS Rao, S Purushothaman, Dzulkifli Mohamad, SH Salleh, MS Salam, AK Othman, Meera Gandhi, SK Srivatsa, G Geethakumari, VN Sastry, Atul Negi, Meera Gandhi, SK Srivatsa, A survey on MANET intrusion detection Computer Science Journals. ,(2008)
S. Ganapathy, P. Yogesh, A. Kannan, An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques International Conference on Power Electronics and Instrumentation Engineering. pp. 117- 122 ,(2011) , 10.1007/978-3-642-20499-9_20
Klaus Julisch, Data Mining for Intrusion Detection Applications of Data Mining in Computer Security. pp. 33- 62 ,(2002) , 10.1007/978-1-4615-0953-0_2
William Stallings, Cryptography and network security ,(1998)
Khaled Labib, V. Rao Vemuri, An application of principal component analysis to the detection and visualization of computer network attacks Annales Des Télécommunications. ,vol. 61, pp. 218- 234 ,(2006) , 10.1007/BF03219975
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004