An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks
Jaydip SenPublished in: CoRR (2011)
Keyphrases
- intrusion detection
- wireless ad hoc networks
- intrusion detection system
- anomaly detection
- network security
- end to end
- ad hoc networks
- network traffic
- network intrusion detection
- multipath
- wireless networks
- data mining
- multi hop
- distributed computing
- intrusion detection and prevention
- routing protocol
- alert correlation
- detecting anomalous
- network intrusions
- real time
- information security
- key management
- databases
- intrusion prevention
- network topology
- base station
- data mining techniques
- mobile ad hoc networks
- data analysis
- wireless channels
- data sets