{"title":"利用混合入侵检测系统在MANET中建立安全路由","authors":"N. Indira","doi":"10.1109/ICOAC.2014.7229722","DOIUrl":null,"url":null,"abstract":"MANET has lead to the emergence of on the fly networking among the communicating nodes. However, they are vulnerable to a variety of attacks, especially in the routing layer because of their open environment and the communication happens based on the mutual trust among the nodes. An appropriate intrusion detection system is an inevitable requirement. Using anomaly based intrusion detection system results in the false positive identification of the intrusion. Computing trust value for each node in the network leads to higher computational complexity. Combining trust value along with intrusion detection system can reduce the pitfalls of both methods. A comparative study of using only anomaly based intrusion detection system and combination of trust value along with an anomaly based intrusion detection system is performed. The proposed anomaly detection system uses artificial neural networks and Dempster-Shafer theory to confirm the attack occurrence in the network.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Establishing a secure routing in MANET using a hybrid intrusion detection system\",\"authors\":\"N. Indira\",\"doi\":\"10.1109/ICOAC.2014.7229722\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"MANET has lead to the emergence of on the fly networking among the communicating nodes. However, they are vulnerable to a variety of attacks, especially in the routing layer because of their open environment and the communication happens based on the mutual trust among the nodes. An appropriate intrusion detection system is an inevitable requirement. Using anomaly based intrusion detection system results in the false positive identification of the intrusion. Computing trust value for each node in the network leads to higher computational complexity. Combining trust value along with intrusion detection system can reduce the pitfalls of both methods. A comparative study of using only anomaly based intrusion detection system and combination of trust value along with an anomaly based intrusion detection system is performed. The proposed anomaly detection system uses artificial neural networks and Dempster-Shafer theory to confirm the attack occurrence in the network.\",\"PeriodicalId\":325520,\"journal\":{\"name\":\"2014 Sixth International Conference on Advanced Computing (ICoAC)\",\"volume\":\"210 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Sixth International Conference on Advanced Computing (ICoAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOAC.2014.7229722\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Sixth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2014.7229722","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Establishing a secure routing in MANET using a hybrid intrusion detection system
MANET has lead to the emergence of on the fly networking among the communicating nodes. However, they are vulnerable to a variety of attacks, especially in the routing layer because of their open environment and the communication happens based on the mutual trust among the nodes. An appropriate intrusion detection system is an inevitable requirement. Using anomaly based intrusion detection system results in the false positive identification of the intrusion. Computing trust value for each node in the network leads to higher computational complexity. Combining trust value along with intrusion detection system can reduce the pitfalls of both methods. A comparative study of using only anomaly based intrusion detection system and combination of trust value along with an anomaly based intrusion detection system is performed. The proposed anomaly detection system uses artificial neural networks and Dempster-Shafer theory to confirm the attack occurrence in the network.