{"title":"基于MAC层的城域网入侵检测系统","authors":"Tapan P. Gondaliya, M. Singh","doi":"10.1109/ICCCNT.2013.6726538","DOIUrl":null,"url":null,"abstract":"Modern communication is containing different types of wireless networks as backbone for various applications used for different users. Mobile Ad-hoc Networks is the type of network which contains many mobile devices and provide good solution for many type communications for different applications military, industry and remote areas (flood hit areas, nuclear hit areas etc). Mobile Ad-hoc Networks prove to be the best fit for various applications like Military operations, Flood affected areas, Remote area etc. Ad-hoc Networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred in Ad-hoc network. These attacks are very common in case of Reactive Protocols like Ad-hoc On Demand Distance Vector Protocol. In this research, an intrusion detection system will be developed for detection and isolation of attacks. In this Research, mac layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the Network. This Research provided an intrusion detection system on MAC layer which have detected the attack sequences in MANET network. Research provides stable and effective attack observations which can be directly applicable to the Real environment for Mobile Ad-hoc Devices","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Intrusion detection system on MAC layer for attack prevention in MANET\",\"authors\":\"Tapan P. Gondaliya, M. Singh\",\"doi\":\"10.1109/ICCCNT.2013.6726538\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern communication is containing different types of wireless networks as backbone for various applications used for different users. Mobile Ad-hoc Networks is the type of network which contains many mobile devices and provide good solution for many type communications for different applications military, industry and remote areas (flood hit areas, nuclear hit areas etc). Mobile Ad-hoc Networks prove to be the best fit for various applications like Military operations, Flood affected areas, Remote area etc. Ad-hoc Networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred in Ad-hoc network. These attacks are very common in case of Reactive Protocols like Ad-hoc On Demand Distance Vector Protocol. In this research, an intrusion detection system will be developed for detection and isolation of attacks. In this Research, mac layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the Network. This Research provided an intrusion detection system on MAC layer which have detected the attack sequences in MANET network. Research provides stable and effective attack observations which can be directly applicable to the Real environment for Mobile Ad-hoc Devices\",\"PeriodicalId\":6330,\"journal\":{\"name\":\"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"volume\":\"26 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2013.6726538\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2013.6726538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion detection system on MAC layer for attack prevention in MANET
Modern communication is containing different types of wireless networks as backbone for various applications used for different users. Mobile Ad-hoc Networks is the type of network which contains many mobile devices and provide good solution for many type communications for different applications military, industry and remote areas (flood hit areas, nuclear hit areas etc). Mobile Ad-hoc Networks prove to be the best fit for various applications like Military operations, Flood affected areas, Remote area etc. Ad-hoc Networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred in Ad-hoc network. These attacks are very common in case of Reactive Protocols like Ad-hoc On Demand Distance Vector Protocol. In this research, an intrusion detection system will be developed for detection and isolation of attacks. In this Research, mac layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the Network. This Research provided an intrusion detection system on MAC layer which have detected the attack sequences in MANET network. Research provides stable and effective attack observations which can be directly applicable to the Real environment for Mobile Ad-hoc Devices