Intrusion detection has, over the last few years, assumed paramount
importance within the broad realm of network security, more so in
the case of wireless ad hoc networks. These are networks that do
not have an underlying infrastructure; the network topology is constantly
changing. The inherently vulnerable characteristics of wireless ad
hoc networks make them susceptible to attacks, and it may be too
late before any counter action can take effect. Second, with so much
advancement in hacking, if attackers try hard enough they will eventually
succeed in infiltrating the system. This makes it important to constantly
(or at least periodically) monitor what is taking place on a system
and look for suspicious behavior. Intrusion detection systems (IDSs)
do just that: monitor audit data, look for intrusions to the system,
and initiate a proper response (e.g., email the systems administrator,
start an automatic retaliation). As such, there is a need to complement
traditional security mechanisms with efficient intrusion detection
and response. In this article we present a survey on the work that
has been done in the area of intrusion detection in mobile ad hoc
networks.
%0 Journal Article
%1 Mishra04
%A Mishra, A.
%A Nadkarni, K.
%A Patcha, A.
%D 2004
%J Wireless Communications, IEEE
%K automatic_retaliation hacking intrusion_detection_systems mobile_agents network_security network_topology security_mechanisms wireless_ad_hoc_networks MANET ad-hoc network mobile radio security telecommunication
%N 1
%P 48 - 60
%R 10.1109/MWC.2004.1269717
%T Intrusion detection in wireless ad hoc networks
%V 11
%X Intrusion detection has, over the last few years, assumed paramount
importance within the broad realm of network security, more so in
the case of wireless ad hoc networks. These are networks that do
not have an underlying infrastructure; the network topology is constantly
changing. The inherently vulnerable characteristics of wireless ad
hoc networks make them susceptible to attacks, and it may be too
late before any counter action can take effect. Second, with so much
advancement in hacking, if attackers try hard enough they will eventually
succeed in infiltrating the system. This makes it important to constantly
(or at least periodically) monitor what is taking place on a system
and look for suspicious behavior. Intrusion detection systems (IDSs)
do just that: monitor audit data, look for intrusions to the system,
and initiate a proper response (e.g., email the systems administrator,
start an automatic retaliation). As such, there is a need to complement
traditional security mechanisms with efficient intrusion detection
and response. In this article we present a survey on the work that
has been done in the area of intrusion detection in mobile ad hoc
networks.
@article{Mishra04,
abstract = {Intrusion detection has, over the last few years, assumed paramount
importance within the broad realm of network security, more so in
the case of wireless ad hoc networks. These are networks that do
not have an underlying infrastructure; the network topology is constantly
changing. The inherently vulnerable characteristics of wireless ad
hoc networks make them susceptible to attacks, and it may be too
late before any counter action can take effect. Second, with so much
advancement in hacking, if attackers try hard enough they will eventually
succeed in infiltrating the system. This makes it important to constantly
(or at least periodically) monitor what is taking place on a system
and look for suspicious behavior. Intrusion detection systems (IDSs)
do just that: monitor audit data, look for intrusions to the system,
and initiate a proper response (e.g., email the systems administrator,
start an automatic retaliation). As such, there is a need to complement
traditional security mechanisms with efficient intrusion detection
and response. In this article we present a survey on the work that
has been done in the area of intrusion detection in mobile ad hoc
networks.},
added-at = {2011-07-15T15:18:02.000+0200},
author = {Mishra, A. and Nadkarni, K. and Patcha, A.},
biburl = {https://www.bibsonomy.org/bibtex/2b163d28f5f77bf6258d4632329da3577/msteele},
doi = {10.1109/MWC.2004.1269717},
file = {:I\:\\My Documents\\Thesis\\Research\\Mishra04.pdf:PDF},
interhash = {e7b5f954a0d865a3254f742486e91246},
intrahash = {b163d28f5f77bf6258d4632329da3577},
issn = {1536-1284},
journal = {Wireless Communications, IEEE},
keywords = {automatic_retaliation hacking intrusion_detection_systems mobile_agents network_security network_topology security_mechanisms wireless_ad_hoc_networks MANET ad-hoc network mobile radio security telecommunication},
month = feb,
number = 1,
owner = {Matt},
pages = {48 - 60},
review = {May be an interesting article. Not directly related to research.},
timestamp = {2011-07-15T19:57:22.000+0200},
title = {Intrusion detection in wireless ad hoc networks},
volume = 11,
year = 2004
}