Network layer intrusion detection in mobile ad hoc network using on-demand attack detection protocol.
M. DuraipandianC. PalanisamyPublished in: Int. J. Electron. Secur. Digit. Forensics (2015)
Keyphrases
- network layer
- intrusion detection
- routing protocol
- mobile ad hoc networks
- intrusion detection system
- cross layer
- multi hop
- ad hoc networks
- computer networks
- network security
- anomaly detection
- network topology
- wireless sensor networks
- network traffic
- physical layer
- sensor networks
- routing algorithm
- data transmission
- mobile nodes
- energy consumption
- data mining
- wireless ad hoc networks
- cloud computing
- application layer
- alert correlation
- multipath
- dos attacks
- data mining techniques
- information systems
- energy efficient
- information security
- data sets
- cyber attacks