Research Journal of Applied Sciences

Year: 2014
Volume: 9
Issue: 5
Page No. 257 - 261

A Software Based Approach for Detecting Intrusion in Wireless Ad Hoc Networks

Authors : M. Ravichandran and C.S. Ravichandran

References

Anonymous, 2009. Intrusion detection systems. Information Assurance Tools Report, 6th Edn., September 25, 2009. http://iac.dtic.mil/iatac/download/intrusion_detection.pdf.

Biles, S., 2003. Detecting the unknown with snort and Statistical Packet Anomaly Detection Engine (SPADE). Computer Security Online Ltd., Technical Report. http://webpages.cs.luc.edu/~pld/courses/447/sum08/class6/biles.spade.pdf.

Estevez-Tapiador, J.M., P. Garcia-Teodoro and J.E. Diaz-Verdejo, 2004. Anomaly detection methods in wired networks: A survey and taxonomy. Comput. Commun., 27: 1569-1584.
CrossRef  |  Direct Link  |  

Gaikwad, V.S. and P.J. Kulkarni, 2012. One versus all classification in network intrusion detection using decision tree. Int. J. Sci. Res. Publ., 2: 1-5.
Direct Link  |  

Garcia-Teodoro, P., J. Diaz-Verdejo, G. Macia-Fernandez and E. Vazquez, 2009. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur., 28: 18-28.
CrossRef  |  Direct Link  |  

Kumar, S., 2007. Survey of current network intrusion detection techniques. http://www.cs.wustl.edu/~jain/cse571-07/ftp/ids.pdf.

Patcha, A. and J.M. Park, 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Networks, 51: 3448-3470.
CrossRef  |  

Zhang, Y. and W. Lee, 2000. Intrusion detection in wireless ad-hoc networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 275-283.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved