Efficacy of misuse detection in ad hoc networks.
Dhanant SubhadrabandhuSaswati SarkarFarooq AnjumPublished in: SECON (2004)
Keyphrases
- ad hoc networks
- misuse detection
- network topology
- end to end
- wireless networks
- routing algorithm
- intrusion detection
- routing protocol
- intrusion detection system
- anomaly detection
- data mining
- quality of service
- wireless ad hoc networks
- intrusion detection and prevention
- mobile wireless
- mac protocol
- mobile networks
- base station
- mobile ad hoc networks
- peer to peer
- network security
- end to end delay
- key management
- mobile nodes
- multi hop
- wireless mesh networks
- neighboring nodes
- wired networks
- aodv routing protocol
- data sets
- packet forwarding
- service differentiation
- information systems