International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 124 - Issue 13 |
Published: August 2015 |
Authors: Kavita Varule, Sachin Bojewar |
![]() |
Kavita Varule, Sachin Bojewar . RWD based IDS for MANET. International Journal of Computer Applications. 124, 13 (August 2015), 9-13. DOI=10.5120/ijca2015905722
@article{ 10.5120/ijca2015905722, author = { Kavita Varule,Sachin Bojewar }, title = { RWD based IDS for MANET }, journal = { International Journal of Computer Applications }, year = { 2015 }, volume = { 124 }, number = { 13 }, pages = { 9-13 }, doi = { 10.5120/ijca2015905722 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2015 %A Kavita Varule %A Sachin Bojewar %T RWD based IDS for MANET%T %J International Journal of Computer Applications %V 124 %N 13 %P 9-13 %R 10.5120/ijca2015905722 %I Foundation of Computer Science (FCS), NY, USA
Mobile Ad-Hoc network (MANET) is a temporary infrastructure less network. This network is formed by combining some set of wireless mobile hosts [1] [5]. The host is called as a node which dynamically establishes their own network. Intrusion detection in MANETs, however, is challenging for a number of reasons. These networks change their topologies dynamically due to node mobility; lack concentration points where traffic can be analyzed for intrusions; utilize self-configuring multi-party infrastructure protocols that are susceptible to malicious manipulation; and rely on wireless communications channels that provide limited bandwidth .To overcome these constraints, researchers have proposed a number of intrusion detection approaches specifically for MANETs. Intrusion detection is a process of identifying and responding to malicious activity targeted at computing and networking resources. In this IDS architecture multilayer specification based detection engine is used along with Random Walker Detector (RWD) [1] [16]. It randomly traverses a network and find outs that on which node which attack is occurred. If there is attacks it performs re-routing.