Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 6
Page No. 1106 - 1115

Implementation of DDOS Intruder Detection Using Divide and Conquer Strategy in Mobile Ad-Hoc Environment

Authors : S. Hemalatha and P.C. Senthil Mahesh

References

Bace, R., 1998. An introduction to intrusion detection and assessment. ICSA., Inc. http://www.iss.net/documents/whitepapers/intrusion.pdf.

Bace, R.G., 2000. Intrusion Detection. Sams Publishing, USA., ISBN: 1578701856, Pages: 339.

Gangwar, S., 2012. Mobile ad hoc network: A comprehensive study and survey on intrusion detection. Int. J. Eng. Res. Appl., 2: 607-612.
Direct Link  |  

Lee, W. and S. Stolfo, 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Secur. J., 3: 227-261.
CrossRef  |  Direct Link  |  

Mukherjee, B., T.L. Hebedein and K.N. Levitt, 2004. Network intrusion detection. IEEE Network, 8: 26-41.
CrossRef  |  Direct Link  |  

Perkins, C.E. and E.M. Royer, 1999. Ad-hoc on-demand distance vector routing. Proceedings of the 2nd Workshop on Mobile Computing Systems and Applications, February 25-26, 1999, New Orleans, LA., pp: 90-100.

SANS Institute, 2001. Understanding intrusion detection systems. https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337.

SANS Institute, 2005. Host- vs. network-based intrusion detection systems. Global Information Assurance Certification Paper. http://www.giac.org/paper/gsec/1377/host-vs-network-based-intrusion-detection-systems/102574.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved