Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

In recent years, Mobile Ad hoc NETworks MANETs have generated great interest among researchers in the development of theoretical and practical concepts, and their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. In order to provide adequate security against multi-level attacks, the researchers are of the opinion that detection-based schemes should be incorporated in addition to traditionally used prevention techniques because prevention-based techniques cannot prevent the attacks from compromised internal nodes. Intrusion detection system is an effective defense mechanism that detects and prevents the security attacks at various levels. This paper tries to provide a structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms. These detection techniques are broadly classified into nine categories based on their primary detection engine/s. Further, an attempt has been made to compare different intrusion detection techniques with their operational strengths and limitations. Finally, the paper concludes with a number of future research directions in the design and implementation of intrusion detection systems for MANETs. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Ming-Yang Su,et al.  Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes , 2010, WASA.

[2]  Tarek S. Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.

[3]  H. Chris Tseng,et al.  Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators , 2005, Comput. Secur..

[4]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.

[5]  Joydeep Chandra,et al.  Statistical analysis based efficient decentralized intrusion detection scheme for mobile ad hoc networks , 2008, 2008 16th IEEE International Conference on Networks.

[6]  Henry L. Owen,et al.  Wireless intrusion detection and response: a classic study using main-in-the-middle attack , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[7]  Farrukh Aslam Khan,et al.  A survey of Intrusion Detection Systems for Wireless Sensor Networks , 2012, Int. J. Ad Hoc Ubiquitous Comput..

[8]  Wei T. Yue,et al.  A cost-based analysis of intrusion detection system configuration under active or passive response , 2010, Decis. Support Syst..

[9]  Horst F. Wedde,et al.  BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior , 2005, GECCO '05.

[10]  Christos Xenakis,et al.  A specification-based intrusion detection engine for infrastructure-less networks , 2014, Comput. Commun..

[11]  Dongwoo Kim,et al.  Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks , 2006 .

[12]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[13]  Chuan-xiang Ma,et al.  A Novel Intrusion Detection Architecture Based on Adaptive Selection Event Triggering for Mobile Ad-hoc Networks , 2009, 2009 Second International Symposium on Intelligent Information Technology and Security Informatics.

[14]  Mohy Mahmoud,et al.  Securing the AODV protocol using specification-based intrusion detection , 2006, Q2SWinet '06.

[15]  Karl N. Levitt,et al.  A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[16]  Amitabh Mishra,et al.  Intrusion detection in MANETS - the second wall of defense , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).

[17]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[18]  Anupam Joshi,et al.  Threshold-based intrusion detection in ad hoc networks and secure AODV , 2008, Ad Hoc Networks.

[19]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[20]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[21]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[22]  Ingrid Moerman,et al.  An overview of mobile ad hoc networks: applications and challenges , 2004 .

[23]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[24]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[25]  Evy Hendriarianti,et al.  River Water Quality Performance from Carbondioxygenation Rate , 2017 .

[26]  Christos Xenakis,et al.  An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks , 2011, TrustBus.

[27]  Yang Li,et al.  A hybrid data mining anomaly detection technique in ad hoc networks , 2007, Int. J. Wirel. Mob. Comput..

[28]  Srdjan Capkun,et al.  GPS-free Positioning in Mobile Ad Hoc Networks , 2004, Cluster Computing.

[29]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks , 2007 .

[30]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[31]  Ren-Fa Li,et al.  Intrusion detection using mobile agent in ad-hoc networks , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[32]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[33]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[34]  Hyung Yun Kong,et al.  Design of a Cooperative Distributed Intrusion Detection System for AODV , 2006, ICUCT.

[35]  Chai Kiat Yeo,et al.  Distributed Court System for intrusion detection in mobile ad hoc networks , 2011, Comput. Secur..

[36]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[37]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[38]  Elmar Gerhards-Padilla,et al.  Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD) , 2011, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[39]  Amitabh Mishra,et al.  A novel intrusion detection approach for wireless ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[40]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[41]  Christos Douligeris,et al.  LIDF: Layered intrusion detection framework for ad-hoc networks , 2009, Ad Hoc Networks.

[42]  Nabendu Chaki,et al.  A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks , 2011, ArXiv.

[43]  Susan M. Bridges,et al.  FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .

[44]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[45]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[46]  John A. Clark,et al.  Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.

[47]  V. Rao Vemuri,et al.  An application of principal component analysis to the detection and visualization of computer network attacks , 2006, Ann. des Télécommunications.

[48]  S. Mary Saira Bhanu,et al.  Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks , 2010, BAIP.

[49]  A. S. Sodiya,et al.  A Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems , 2009 .

[50]  Daquan Gu,et al.  A Novel Intrusion Detection Scheme Using Support Vector Machine Fuzzy Network for Mobile Ad Hoc Networks , 2009, 2009 Second Pacific-Asia Conference on Web Mining and Web-based Application.

[51]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[52]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[53]  A. Kannan,et al.  Multi-Layer Integrated Anomaly Intrusion Detection System for Mobile Adhoc Networks , 2007, 2007 International Conference on Signal Processing, Communications and Networking.

[54]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[55]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks: Anjum/Ad hoc Networks , 2007 .

[56]  Yu Liu,et al.  Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.

[57]  Zonghua Zhang,et al.  ARSoS: An Adaptive, Robust, and Sub-Optimal Strategy for Automated Deployment of Anomaly Detection System in MANETs , 2008, 2008 International Wireless Communications and Mobile Computing Conference.

[58]  Aurobindo Sundaram,et al.  An introduction to intrusion detection , 1996, CROS.

[59]  Bo-Chao Cheng,et al.  A Context Adaptive Intrusion Detection System for MANET , 2011, Comput. Commun..

[60]  Nei Kato,et al.  A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[61]  Debasish Bera,et al.  A distributed intrusion detection system for wireless ad hoc networks , 2008, 2008 16th IEEE International Conference on Networks.

[62]  Junshan Li,et al.  A security architecture based on immune agents for MANET , 2010, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC).

[63]  Karl N. Levitt,et al.  A Specification-Based Intrusion Detection Model for OLSR , 2005, RAID.

[64]  Bu-Sung Lee,et al.  CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS , 2010, Comput. Networks.

[65]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[66]  Steven Furnell,et al.  Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks , 2008, Ad Hoc Networks.

[67]  Felix Naumann,et al.  Data fusion , 2009, CSUR.

[68]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[69]  Hu Zhengbing,et al.  Study of Intrusion Detection Systems (IDSs) in Network Security , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[70]  Geethapriya Thamilarasu,et al.  A cross-layer game for energy-efficient jamming detection in ad hoc networks , 2012, Secur. Commun. Networks.

[71]  Sheldon Howard Jacobson,et al.  The Theory and Practice of Simulated Annealing , 2003, Handbook of Metaheuristics.

[72]  Prabir Bhattacharya,et al.  A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..

[73]  Jaideep Srivastava,et al.  Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) , 2005 .

[74]  Christos Dimitrakakis,et al.  Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.

[75]  Jiankun Hu,et al.  A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference , 2009, J. Netw. Comput. Appl..

[76]  Bradley Efron,et al.  Hotelling's T2 Test Under Symmetry Conditions , 1970 .

[77]  Rituparna Chaki,et al.  HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[78]  Ralf Steinmetz,et al.  A Cross-Layer Approach towards Robustness of Mobile Peer-to-Peer Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[79]  Cannady,et al.  A Comparative Analysis of Current Intrusion Detection Technologies , 1996 .

[80]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[81]  Yasir Abdelgadir Mohamed,et al.  Immune inspired framework for ad hoc network security , 2009, 2009 IEEE International Conference on Control and Automation.

[82]  L. Javier García-Villalba,et al.  On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments , 2006, PWC.

[83]  Dharma P. Agrawal,et al.  SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[84]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[85]  Gary B. Wills,et al.  Unsupervised Clustering Approach for Network Anomaly Detection , 2012, NDT.

[86]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[87]  Grant A. Jacoby,et al.  Mobile Host-Based intrusion Detection and Attack Identification , 2007, IEEE Wireless Communications.

[88]  Jie Liu,et al.  Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[89]  Hong Man,et al.  A distributed cross-layer intrusion detection system forad hoc networks , 2006, Ann. des Télécommunications.

[90]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[91]  Farhan Abdel Fattah,et al.  Distributed and Cooperative Hierarchical Intrusion Detection on MANETs , 2010 .

[92]  Christos Xenakis,et al.  A novel Intrusion Detection System for MANETs , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[93]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[94]  P.S. Hiremath,et al.  Content Based Image Retrieval Using Color, Texture and Shape Features , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[95]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[96]  Min-Hua Shao,et al.  Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[97]  Gisung Kim,et al.  A distributed sinkhole detection method using cluster analysis , 2010, Expert Syst. Appl..

[98]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[99]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[100]  Nathan L. Clarke,et al.  A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach , 2006, ISI.

[101]  Dong-You Choi,et al.  A Novel Cross Layer Intrusion Detection System in MANET , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[102]  S. Muknahallipatna,et al.  Fibre Channel Switch Modeling at Fibre Channel-2 Level for Large Fabric Storage Area Network Simulations using OMNeT++ , 2007 .

[103]  M. Wahengbam,et al.  Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[104]  Saurabh Bagchi,et al.  MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks , 2008, Ad Hoc Networks.

[105]  Wenke Lee,et al.  Agent-based cooperative anomaly detection for wireless ad hoc networks , 2006, 12th International Conference on Parallel and Distributed Systems - (ICPADS'06).

[106]  Wenke Lee,et al.  Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.

[107]  Harold Joseph Highland,et al.  The 17th NSCS abstructArtificial Intelligence and Intrusion Detection: Current and Future Directions : Jeremy Frank, University of California, Davis, CA , 1995 .

[108]  Klaus Julisch,et al.  Data Mining for Intrusion Detection , 2002, Applications of Data Mining in Computer Security.

[109]  Bo Sun Intrusion detection in mobile ad hoc networks , 2004 .

[110]  Michel Barbeau,et al.  Handling Security Threats to the RFID System of EPC Networks , 2016 .

[111]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[112]  Aikaterini Mitrokotsa,et al.  Intrusion Detection with Neural Networks and Watermarking Techniques for MANET , 2007, IEEE International Conference on Pervasive Services.

[113]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[114]  Udo W. Pooch,et al.  Detecting black-hole attack in mobile ad hoc networks , 2003 .

[115]  Umang Singh,et al.  Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption , 2010, IET Commun..

[116]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[117]  Michael Szydlo,et al.  Merkle Tree Traversal in Log Space and Time , 2004, EUROCRYPT.

[118]  M. Farooq,et al.  A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols , 2011, Appl. Soft Comput..

[119]  Marjan Kuchaki Rafsanjani,et al.  An Optimal Method for Detecting Internal and External Intrusion in MANET , 2010, FGIT-FGCN.

[120]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .

[121]  Sanjay Kumar Jena,et al.  Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks , 2011 .

[122]  R. Sekar,et al.  Experiences with Specification-Based Intrusion Detection , 2001, Recent Advances in Intrusion Detection.

[123]  Fei Yu,et al.  PSO Algorithm Based Online Self-Tuning of PID Controller , 2007 .

[124]  Wei Wang,et al.  Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks , 2013, Inf. Sci..

[125]  Fatiha Djemili Tolba,et al.  MASID: Multi-Agent System for Intrusion Detection in MANET , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[126]  Syed Asad Hussain,et al.  Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..

[127]  Mohammad S. Obaidat,et al.  FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..

[128]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[129]  Yuxin Ding,et al.  Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..

[130]  Bu-Sung Lee,et al.  Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.

[131]  Issa M. Khalil,et al.  LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks , 2007, Comput. Networks.

[132]  Sunil Kumar,et al.  Security Issues in Mobile Ad Hoc Networks: A Survey , 2016 .

[133]  Elmar Gerhards-Padilla,et al.  TOGBAD - an approach to detect routing attacks in tactical environments , 2011, Secur. Commun. Networks.

[134]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[135]  Joni da Silva Fraga,et al.  Algorithms for a distributed IDS in MANETs , 2014, J. Comput. Syst. Sci..

[136]  Udo W. Pooch,et al.  Routing anomaly detection in mobile ad hoc networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[137]  Hao Sun,et al.  Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks , 2010, Int. J. Commun. Netw. Syst. Sci..

[138]  Jean-Yves Le Boudec,et al.  An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks , 2005, IEEE Transactions on Neural Networks.

[139]  Jean-Yves Le Boudec,et al.  An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks , 2004, BioADIT.

[140]  Ming-Yang Su Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[141]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[142]  Jingsha He,et al.  A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[143]  Satria Mandala,et al.  A survey on MANET intrusion detection , 2008 .

[144]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[145]  N. Jaisankar,et al.  An intelligent system for intrusion detection using outlier detection , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[146]  J.B.D. Cabrera,et al.  Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[147]  Wu Yue,et al.  Distributed intrusion detection for mobile ad hoc networks , 2008 .

[148]  Yu Liu,et al.  A framework for intrusion detection systems by social network analysis methods in ad hoc networks , 2009, Secur. Commun. Networks.

[149]  Ray Hunt,et al.  Intrusion detection techniques and approaches , 2002, Comput. Commun..

[150]  Joan Feigenbaum,et al.  A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.

[151]  Rong Luo,et al.  Hide Markov Model Based Intrusion Detection and Response for Manets , 2010, 2010 Second International Conference on Information Technology and Computer Science.

[152]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[153]  Jin-Hee Cho,et al.  Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks , 2011, Perform. Evaluation.

[154]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[155]  A. Patcha,et al.  A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[156]  J. M. Kizza System Intrusion Detection and Prevention , 2015 .

[157]  Jung-Min Park,et al.  A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..

[158]  Yang Li,et al.  MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[159]  Jin-Hee Cho,et al.  Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.

[160]  Oludele Awodele,et al.  A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) , 2009 .

[161]  John McHugh,et al.  Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.

[162]  Leandro Nunes de Castro,et al.  Artificial Immune Systems: A Novel Approach to Pattern Recognition , 2002 .

[163]  Prabir Bhattacharya,et al.  A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[164]  Gulshan Kumar,et al.  An information theoretic approach for feature selection , 2012, Secur. Commun. Networks.

[165]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[166]  Shiyong Zhang,et al.  A Novel Intrusion Detection Method for Mobile Ad Hoc Networks , 2005, EGC.

[167]  Hui-Tang Lin,et al.  A Specification-Based Intrusion Detection Model for Wireless Ad Hoc Networks , 2012, 2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications.

[168]  Hitesh Tewari,et al.  Real-time intrusion detection for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[169]  G. Ravi,et al.  Voltage Collapse Enhancement and Loss Reduction by Reactive Power Reserve , 2011 .

[170]  David Heckerman,et al.  A Tutorial on Learning with Bayesian Networks , 1999, Innovations in Bayesian Networks.

[171]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[172]  Udo W. Pooch,et al.  Towards adaptive intrusion detection in mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[173]  Bruce Schneier,et al.  Inside risks: risks of relying on cryptography , 1999, CACM.

[174]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[175]  Christos Douligeris,et al.  Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks , 2006 .

[176]  Ilango Krishnamurthi,et al.  Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..

[177]  Dong Zhou,et al.  Translation techniques in cross-language information retrieval , 2012, CSUR.

[178]  Mohamed Mezghiche,et al.  A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[179]  Michael P. Howarth,et al.  Adaptive intrusion detection & prevention of denial of service attacks in MANETs , 2009, IWCMC.

[180]  William Stallings,et al.  Wireless Communications & Networks , 2002 .

[181]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[182]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[183]  Aaron Earle Wireless Security Handbook , 2005 .

[184]  Raman K. Mehra,et al.  Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks , 2008, Inf. Fusion.

[185]  Abderrahim Benslimane,et al.  Toward a cross-layer monitoring process for mobile ad hoc networks , 2009, Secur. Commun. Networks.

[186]  Yang Xiao,et al.  Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..

[187]  Michael P. Howarth,et al.  An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.

[188]  Eleni Darra,et al.  A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks , 2011, TrustBus.

[189]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[190]  Zhihong Qian,et al.  Mobile Agents-Based Intrusion Detection System for Mobile Ad Hoc Networks , 2010, 2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering.

[191]  Aikaterini Mitrokotsa,et al.  Evaluation of classification algorithms for intrusion detection in MANETs , 2012, Knowl. Based Syst..

[192]  Rajendra V. Boppana,et al.  On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks , 2011, IEEE Transactions on Mobile Computing.

[193]  K. Manousakis,et al.  A stochastic approximation approach for improving intrusion detection data fusion structures , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[194]  Bu-Sung Lee,et al.  CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[195]  Marco Carvalho,et al.  Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, ICCS.

[196]  Imane Aly Saroit,et al.  Misbehavior nodes detection and isolation for MANETs OLSR protocol , 2011, WCIT.

[197]  Christos Xenakis,et al.  A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..

[198]  Johnny S. Wong,et al.  A taxonomy of intrusion response systems , 2007, Int. J. Inf. Comput. Secur..

[199]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[200]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[201]  Ahmed Patel,et al.  A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..

[202]  Bu-Sung Lee,et al.  Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs , 2007, 2007 15th IEEE International Conference on Networks.

[203]  Özgür B. Akan,et al.  A survey on bio-inspired networking , 2010, Comput. Networks.

[204]  Y. Wang,et al.  Anomaly intrusion detection using one class SVM , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[205]  Peter Mell,et al.  Intrusion Detection Systems , 2001 .

[206]  Rui Chen,et al.  An Intrusion Detection Method for Ad Hoc Network Based on Class Association Rules Mining , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.

[207]  K. Jayarajan,et al.  A noncooperative game approach for intrusion detection in Mobile Adhoc networks , 2008, 2008 International Conference on Computing, Communication and Networking.

[208]  Ana R. Cavalli,et al.  An EFSM-Based Intrusion Detection System for Ad Hoc Networks , 2005, ATVA.

[209]  Jaideep Srivastava,et al.  Intrusion Detection: A Survey , 2005 .

[210]  Arputharaj Kannan,et al.  An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques , 2011 .

[211]  Karl N. Levitt,et al.  DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET , 2006, RAID.

[212]  Constantine N. Manikopoulos,et al.  Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[213]  Yibeltal Fantahun Alem,et al.  Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.

[214]  Feiqi Deng,et al.  A Parameter Selection Approach for Mixtures of Kernels Using Immune Evolutionary Algorithm and its Application to IDSs , 2007 .

[215]  M. Little,et al.  Detecting coordinated attacks in tactical wireless networks using cooperative signature-based detectors , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[216]  Hossam S. Hassanein,et al.  Routeguard: an intrusion detection and response system for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[217]  John A. Clark,et al.  Power-Aware Intrusion Detection in Mobile Ad Hoc Networks , 2009, ADHOCNETS.

[218]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[219]  Abolfazl Esfandi Efficient anomaly intrusion detection system in adhoc networks by mobile agents , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[220]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[221]  Yasir Abdelgadir Mohamed,et al.  Implementation of IDS with response for securing MANETs , 2010, 2010 International Symposium on Information Technology.

[222]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[223]  Peyman Kabiri,et al.  Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks , 2011, Int. J. Netw. Secur..

[224]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[225]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[226]  Nei Kato,et al.  A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[227]  Jean-Yves Le Boudec,et al.  An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..

[228]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[229]  Bo Sun,et al.  Integration of mobility and intrusion detection for wireless ad hoc networks: Research Articles , 2007 .

[230]  H. O. Lancaster The chi-squared distribution , 1971 .

[231]  Anupam Joshi,et al.  Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[232]  William H. Robinson,et al.  A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.

[233]  N. Marchang,et al.  A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[234]  Gunnar Rätsch,et al.  Constructing Boosting Algorithms from SVMs: An Application to One-Class Classification , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[235]  R. A. Maxion,et al.  Proper Use of ROC Curves in Intrusion/Anomaly Detection , 2004 .

[236]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[237]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[238]  Ali A. Ghorbani,et al.  Network Intrusion Detection and Prevention - Concepts and Techniques , 2010, Advances in Information Security.

[239]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[240]  Mohammad Teshnehlab,et al.  Implementation of neural networks for intrusion detection in manet , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[241]  Timothy W. Finin,et al.  CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies , 2012, Distributed and Parallel Databases.

[242]  George Kesidis,et al.  Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[243]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[244]  Rajendra V. Boppana,et al.  An Analysis of Monitoring Based Intrusion Detection for Ad Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[245]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[246]  Dirk Westhoff,et al.  Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Proceedings IEEE 56th Vehicular Technology Conference.

[247]  Udo W. Pooch,et al.  Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.

[248]  Prabir Bhattacharya,et al.  A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[249]  Aikaterini Mitrokotsa,et al.  Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks , 2006 .

[250]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..

[251]  Sehun Kim,et al.  A cooperative-sinkhole detection method for mobile ad hoc networks , 2010 .

[252]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[253]  Yang Li,et al.  Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[254]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[255]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[256]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[257]  R. S. Bhuvaneswaran,et al.  Design of genetic algorithm based IDS for MANET , 2012, 2012 International Conference on Recent Trends in Information Technology.

[258]  Kyriakos Manousakis,et al.  Quantifying resiliency and detection latency of intrusion detection structures , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[259]  Raouf Boutaba,et al.  Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection , 2011, Journal of Network and Systems Management.

[260]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[261]  Vasileios Karyotis,et al.  Evolutionary Dynamics of Complex Communications Networks , 2013 .

[262]  Lixia Zhang,et al.  A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.

[263]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[264]  Farooq Anjum,et al.  LiPaD: lightweight packet drop detection for ad hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.