Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
Marianne AzerSherif El-KassasAbdel Wahab F. HassanMagdy S. El-SoudaniPublished in: ARES (2008)
Keyphrases
- intrusion detection
- ad hoc networks
- network intrusions
- network intrusion
- network attacks
- peer to peer
- mobile wireless
- network intrusion detection systems
- intrusion detection system
- computer security
- mobile ad hoc networks
- routing protocol
- anomaly detection
- intrusion prevention
- network topology
- network security
- key management scheme
- network traffic data
- wireless mesh networks
- network traffic
- end to end
- mobile nodes
- routing algorithm
- network intrusion detection
- wireless networks
- key management
- security vulnerabilities
- quality of service
- misuse detection
- normal behavior
- intrusion detection and prevention
- cyber attacks
- cyber security
- multi hop
- information security
- distributed systems
- mobile networks
- network infrastructure
- data mining
- detecting anomalous
- base station
- end to end delay
- alert correlation
- data mining techniques
- dos attacks
- wireless sensor networks
- real time
- computer systems
- worm detection