A survey on intrusion detection and prevention in wireless ad-hoc networks

Abstract Ad hoc networks have been serving us in one way or the other, for two decades, through their vast variety of applications in majority fields. Due to their features such as hostile deployments, high level of mobility, limited resources and physical insecurity, they are in front line to attackers. First line of defense (cryptographic techniques, fire walls etc.) stops these attacks. But what would happen if the attacker break through this defense system? Second of line of defense also called intrusion detection system (IDS), would stop and mitigate these threats before they harm the network or its resources. Various schemes have been proposed to provide quality IDS that could mitigate the latest threats in ad hoc networks. In this review paper, we gave a detailed overview of ad hoc networks in the start. We explored ad hoc networks security followed by description about IDS. Next, we elaborated the taxonomy of IDS, containing types of IDS based on numerous parameters. In the trailing section, we compared wide variety of IDS schemes based on different methodology/techniques, to show their importance and performance in the field of intrusion detection. Finally, we concluded the paper with informative future research directions in the state of the art research fields that would open up ways for researchers in that area.

[1]  Farhan Abdel Fattah,et al.  Distributed and Cooperative Hierarchical Intrusion Detection on MANETs , 2010 .

[2]  A. Kamal,et al.  Infrastructureless wireless networks: cluster-based architectures and protocols , 2004 .

[3]  Marjan Kuchaki Rafsanjani,et al.  An Optimal Method for Detecting Internal and External Intrusion in MANET , 2010, FGIT-FGCN.

[4]  Wu Yue,et al.  Distributed intrusion detection for mobile ad hoc networks , 2008 .

[5]  Joan Feigenbaum,et al.  A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.

[6]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[7]  Mohammad Teshnehlab,et al.  Implementation of neural networks for intrusion detection in manet , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[8]  A. Patcha,et al.  A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[9]  Jian Shen,et al.  A Privacy-Preserving Health Data Aggregation Scheme , 2016, KSII Trans. Internet Inf. Syst..

[10]  Min-Hua Shao,et al.  Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[11]  Yuxin Ding,et al.  Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..

[12]  Klaus Julisch,et al.  Data Mining for Intrusion Detection , 2002, Applications of Data Mining in Computer Security.

[13]  Lixia Zhang,et al.  A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.

[14]  Aikaterini Mitrokotsa,et al.  Intrusion Detection with Neural Networks and Watermarking Techniques for MANET , 2007, IEEE International Conference on Pervasive Services.

[15]  Yu Liu,et al.  A framework for intrusion detection systems by social network analysis methods in ad hoc networks , 2009, Secur. Commun. Networks.

[16]  Hao Sun,et al.  Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks , 2010, Int. J. Commun. Netw. Syst. Sci..

[17]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[18]  Jingsha He,et al.  A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[19]  Satria Mandala,et al.  A survey on MANET intrusion detection , 2008 .

[20]  Nai-Wei Lo,et al.  A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET , 2013 .

[21]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[22]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[23]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[24]  Azuan Ahmad,et al.  CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism , 2017, Int. J. Commun. Networks Inf. Secur..

[25]  Binod Kumar Pattanayak,et al.  A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET , 2017, Int. J. Commun. Networks Inf. Secur..

[26]  Tarik Taleb,et al.  Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs) , 2010 .

[27]  A. S. Sodiya,et al.  A Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems , 2009 .

[28]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[29]  Muhammad Zeeshan,et al.  Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks , 2017, Int. J. Commun. Networks Inf. Secur..

[30]  Z. A. Khan,et al.  Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.

[31]  John A. Clark,et al.  Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.

[32]  David Heckerman,et al.  A Tutorial on Learning with Bayesian Networks , 1999, Innovations in Bayesian Networks.

[33]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[34]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[35]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[36]  Arputharaj Kannan,et al.  An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques , 2011 .

[37]  Constantine N. Manikopoulos,et al.  Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[38]  Bo-Chao Cheng,et al.  A Context Adaptive Intrusion Detection System for MANET , 2011, Comput. Commun..

[39]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[40]  R. S. Bhuvaneswaran,et al.  Design of genetic algorithm based IDS for MANET , 2012, 2012 International Conference on Recent Trends in Information Technology.

[41]  Ajay Kaul,et al.  A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..

[42]  William H. Robinson,et al.  A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.

[43]  Nei Kato,et al.  A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[44]  N. Marchang,et al.  A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[45]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[46]  Karl N. Levitt,et al.  A Specification-Based Intrusion Detection Model for OLSR , 2005, RAID.

[47]  Prabir Bhattacharya,et al.  A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..

[48]  Jiankun Hu,et al.  A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference , 2009, J. Netw. Comput. Appl..

[49]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[50]  Raouf Boutaba,et al.  Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection , 2011, Journal of Network and Systems Management.

[51]  K. Manousakis,et al.  A stochastic approximation approach for improving intrusion detection data fusion structures , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[52]  Bruce Schneier,et al.  Inside risks: risks of relying on cryptography , 1999, CACM.

[53]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[54]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[55]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[56]  Magdy S. El-Soudani,et al.  Security in Ad Hoc Networks: From Vulnerability to Risk Management , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[57]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[58]  Marco Carvalho,et al.  Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, ICCS.

[59]  Christos Xenakis,et al.  A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..

[60]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[61]  Peter Mell,et al.  NIST Special Publication on Intrusion Detection Systems , 2001 .

[62]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[63]  M. Farooq,et al.  A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols , 2011, Appl. Soft Comput..

[64]  Amitabh Mishra,et al.  A novel intrusion detection approach for wireless ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[65]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[66]  L Vokorokos,et al.  Host-based intrusion detection system , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.

[67]  Abolfazl Esfandi Efficient anomaly intrusion detection system in adhoc networks by mobile agents , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[68]  Mohammad S. Obaidat,et al.  FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..

[69]  A. Kannan,et al.  Multi-Layer Integrated Anomaly Intrusion Detection System for Mobile Adhoc Networks , 2007, 2007 International Conference on Signal Processing, Communications and Networking.

[70]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[71]  M. Hemalatha,et al.  Handling Intrusion Detection System using Snort Based Statistical Algorithm and Semi-supervised Approach , 2013 .

[72]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[73]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[74]  Junshan Li,et al.  A security architecture based on immune agents for MANET , 2010, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC).

[75]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[76]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[77]  Hu Zhengbing,et al.  Study of Intrusion Detection Systems (IDSs) in Network Security , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[78]  Bangnan Xu,et al.  The role of ad hoc networking in future wireless communications , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[79]  Peyman Kabiri,et al.  Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks , 2011, Int. J. Netw. Secur..

[80]  Rituparna Chaki,et al.  HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[81]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[82]  Rong Luo,et al.  Hide Markov Model Based Intrusion Detection and Response for Manets , 2010, 2010 Second International Conference on Information Technology and Computer Science.

[83]  Dongwoo Kim,et al.  Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks , 2006 .

[84]  Srdjan Capkun,et al.  GPS-free Positioning in Mobile Ad Hoc Networks , 2004, Cluster Computing.

[85]  Daquan Gu,et al.  A Novel Intrusion Detection Scheme Using Support Vector Machine Fuzzy Network for Mobile Ad Hoc Networks , 2009, 2009 Second Pacific-Asia Conference on Web Mining and Web-based Application.

[86]  Mohamed Mezghiche,et al.  A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[87]  Andrew S. Miner,et al.  Anomaly intrusion detection using one class SVM , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[88]  K. Jayarajan,et al.  A noncooperative game approach for intrusion detection in Mobile Adhoc networks , 2008, 2008 International Conference on Computing, Communication and Networking.

[89]  Fagen Li,et al.  A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs , 2019, J. Syst. Archit..

[90]  Steven Furnell,et al.  Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks , 2008, Ad Hoc Networks.

[91]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[92]  Geethapriya Thamilarasu,et al.  A cross-layer game for energy-efficient jamming detection in ad hoc networks , 2012, Secur. Commun. Networks.

[93]  Song Deng,et al.  Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system , 2017 .

[94]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[95]  Jung-Min Park,et al.  A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..

[96]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[97]  Zhihong Qian,et al.  Mobile Agents-Based Intrusion Detection System for Mobile Ad Hoc Networks , 2010, 2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering.

[98]  Udo W. Pooch,et al.  Detecting black-hole attack in mobile ad hoc networks , 2003 .

[99]  Amandeep Kaur,et al.  A Review on Security Attacks in Mobile Ad-hoc Networks , 2014 .

[100]  Susan M. Bridges,et al.  FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .

[101]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[102]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[103]  V. Rao Vemuri,et al.  An application of principal component analysis to the detection and visualization of computer network attacks , 2006, Ann. des Télécommunications.

[104]  Gary B. Wills,et al.  Unsupervised Clustering Approach for Network Anomaly Detection , 2012, NDT.

[105]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[106]  Jie Liu,et al.  Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[107]  Biswanath Mukherjee,et al.  DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .

[108]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[109]  Ge Yu,et al.  Minimizing temperature and energy of real-time applications with precedence constraints on heterogeneous MPSoC systems , 2019, J. Syst. Archit..

[110]  M. Wahengbam,et al.  Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[111]  Wenke Lee,et al.  Agent-based cooperative anomaly detection for wireless ad hoc networks , 2006, 12th International Conference on Parallel and Distributed Systems - (ICPADS'06).

[112]  Harold Joseph Highland,et al.  The 17th NSCS abstructArtificial Intelligence and Intrusion Detection: Current and Future Directions : Jeremy Frank, University of California, Davis, CA , 1995 .

[113]  Pietro Michiardi,et al.  Security in ad hoc networks , 2003 .

[114]  Hossam S. Hassanein,et al.  Routeguard: an intrusion detection and response system for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[115]  John A. Clark,et al.  Power-Aware Intrusion Detection in Mobile Ad Hoc Networks , 2009, ADHOCNETS.

[116]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[117]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[118]  Nei Kato,et al.  A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[119]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[120]  Yu Liu,et al.  Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.

[121]  Guangjie Han,et al.  Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[122]  Cannady,et al.  A Comparative Analysis of Current Intrusion Detection Technologies , 1996 .

[123]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[124]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[125]  Ren-Fa Li,et al.  Intrusion detection using mobile agent in ad-hoc networks , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[126]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[127]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[128]  Ali Movaghar-Rahimabadi,et al.  Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.

[129]  Gisung Kim,et al.  Self-adaptive and dynamic clustering for online anomaly detection , 2011, Expert Syst. Appl..

[130]  Qi Zhang,et al.  Indra: a peer-to-peer approach to network intrusion detection and prevention , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..

[131]  S. Mary Saira Bhanu,et al.  Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks , 2010, BAIP.

[132]  A. Halim Zaim,et al.  A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..

[133]  Hitesh Tewari,et al.  Real-time intrusion detection for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[134]  Xin Fu,et al.  Improving energy efficiency of mobile devices by characterizing and exploring user behaviors , 2019, J. Syst. Archit..

[135]  Yang Xiao,et al.  Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..

[136]  Yang Li,et al.  MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[137]  John McHugh,et al.  Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.

[138]  Leandro Nunes de Castro,et al.  Artificial Immune Systems: A Novel Approach to Pattern Recognition , 2002 .

[139]  Rajesh Singh,et al.  Simplified Approach for Data Warehouse Quality Measurement , 2010 .

[140]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[141]  Prabir Bhattacharya,et al.  A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[142]  L. Javier García-Villalba,et al.  On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments , 2006, PWC.

[143]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[144]  Grant A. Jacoby,et al.  Mobile Host-Based intrusion Detection and Attack Identification , 2007, IEEE Wireless Communications.

[145]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[146]  Oludele Awodele,et al.  A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) , 2009 .

[147]  Sanjay Kumar Jena,et al.  Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks , 2011 .

[148]  R. Sekar,et al.  Experiences with Specification-Based Intrusion Detection , 2001, Recent Advances in Intrusion Detection.

[149]  Giovanni Vigna,et al.  NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..

[150]  Kalamullah Ramli,et al.  Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System , 2018, Int. J. Commun. Networks Inf. Secur..

[151]  Wei Wang,et al.  Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks , 2013, Inf. Sci..

[152]  Tarek S. Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.

[153]  Horst F. Wedde,et al.  BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior , 2005, GECCO '05.

[154]  M. E. Eissa,et al.  Black Hole attack Detection using fuzzy based IDS , 2017, Int. J. Commun. Networks Inf. Secur..

[155]  Houda Moudni,et al.  Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks , 2018, Int. J. Commun. Networks Inf. Secur..

[156]  Dirk Westhoff,et al.  Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Proceedings IEEE 56th Vehicular Technology Conference.

[157]  Udo W. Pooch,et al.  Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.

[158]  Prabir Bhattacharya,et al.  A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[159]  Aikaterini Mitrokotsa,et al.  Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks , 2006 .

[160]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..