Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks.
Aikaterini MitrokotsaNikos KomninosChristos DouligerisPublished in: Int. J. Netw. Secur. (2010)
Keyphrases
- intrusion detection
- ad hoc networks
- information security
- network topology
- routing protocol
- end to end
- intrusion detection system
- wireless networks
- wireless ad hoc networks
- anomaly detection
- routing algorithm
- network intrusion detection
- network security
- key management
- quality of service
- peer to peer
- network traffic
- mobile networks
- mobile ad hoc networks
- data mining
- network intrusion
- detecting anomalous
- high detection rate
- security issues
- computer security
- network infrastructure
- data protection
- alert correlation
- real world
- databases
- security requirements
- normal behavior
- data sets
- real time