Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks.
John Felix Charles JosephAmitabha DasBoon-Chong SeetBu-Sung LeePublished in: Comput. Commun. (2008)
Keyphrases
- intrusion detection
- s box
- routing protocol
- mobile ad hoc networks
- network attacks
- network intrusion
- block cipher
- network intrusions
- network intrusion detection systems
- intrusion prevention
- intrusion detection system
- network traffic data
- computer security
- ad hoc networks
- network intrusion detection
- advanced encryption standard
- anomaly detection
- network traffic
- network security
- misuse detection
- security vulnerabilities
- dos attacks
- network topology
- routing algorithm
- cyber security
- normal behavior
- intrusion detection and prevention
- detecting anomalous
- worm detection
- cyber attacks
- information security
- alert correlation
- data mining
- initial conditions
- mobile networks
- multipath
- computer networks
- data mining techniques
- real world
- malicious nodes
- countermeasures
- fraud detection
- lightweight
- sensor networks
- control system