A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks.
Shukor Abd RazakSteven FurnellPhillip J. BrookePublished in: ECIW (2005)
Keyphrases
- intrusion detection system
- intrusion detection
- network security
- anomaly detection
- computer networks
- distributed intrusion detection
- network intrusion detection
- network traffic
- computer systems
- routing protocol
- cyber security
- network intrusion detection systems
- alert correlation
- machine learning
- attack detection
- information security
- cyber attacks
- network traffic data
- misuse detection
- databases
- data sets