The rapid proliferation of Mobile ad hoc network has changed the landscape of network security. The recent DOS attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology and cooperative algorithms, lack of centralized monitoring and management point and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective.
There are many intrusion detection techniques have been developed on Ad hoc network but have been turned to be inapplicable in this new environment. Here we need to search for new architecture and mechanisms to protect Mobile Ad hoc network. In the above all technique of intrusion detection is applied on the only one layer and that is probably on routing layer. But here we apply this intrusion detection system in the MAC layer for the more security, efficiency and high speed compare to other technique those whose apply in the network layer.
Inhaltsverzeichnis (Table of Contents)
- Declaration
- Approved Research Topic
- Abstract
- Certificate
- Acknowledgement
- Table Of Content
- List Of Figures
- List Of Abbreviations
- Chapter 1. Introduction
- 1.1 Mobile Adhoc Network
- 1.1.1 History of Mobile Adhoc Networks
- 1.1.2 Overview Of Mobile Adhoc Networks
- 1.1.3 Adhoc Routing Protocols for MANET
- 1.1.3.1 Table Driven Protocols
- Destination-Sequenced Distance-Vector Routing (DSDV)
- Cluster head Gateway Switch Routing (CGSR)
- Wireless Routing Protocol (WRP)
- 1.1.3.2 On demand Protocols
- Ad-Hoc On-Demand Distance Vector Routing (AODV)
- Dynamic Source Routing (DSR)
- 1.1.3.3 Hybrid Protocols
- Zone Routing Protocol
- 1.1.3.1 Table Driven Protocols
- 1.2 Overview of intrusion detection
- 1.3 Intrusion Detection System
- 1.3.1 Host based intrusion detection system
- 1.3.2 Network based intrusion detection system
- 1.4 Why we need IDS
- 1.5 IDS Techniques
- 1.5.1 Anomaly Detection
- 1.5.2 Misuse Detection or Signature Detection
- 1.5.3 Target Monitoring
- 1.5.4 Stealth Probes
- 1.6 Overview of wormhole attacks
- 1.1 Mobile Adhoc Network
- Chapter 2. Review of literature
- Chapter 3. Present work
- 3.1 Scope of Study
- 3.2 Problem Formulation
- 3.3 Objective
- Chapter 4. Research Methodology
- Chapter 5. Result and Discussion
- Chapter 6. Conclusion and Future works
- Chapter 7. References
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This dissertation aims to develop an intrusion detection system for mobile ad hoc networks (MANETs) that operates at the MAC layer. The system will focus on detecting malicious activities and identifying attack sequences within the network. The research aims to provide a stable and effective intrusion detection system that can be directly applied to real-world mobile ad hoc devices.
- Security challenges in mobile ad hoc networks
- Intrusion detection techniques for MANETs
- MAC layer intrusion detection system design and implementation
- Evaluation of the proposed intrusion detection system
- Real-world applicability of the system
Zusammenfassung der Kapitel (Chapter Summaries)
Chapter 1: Introduction This chapter provides an overview of mobile ad hoc networks, including their history, characteristics, and routing protocols. It also introduces the concept of intrusion detection systems and discusses their importance in securing MANETs. The chapter explores various intrusion detection techniques, including anomaly detection, misuse detection, and target monitoring.
Chapter 2: Review of literature This chapter presents a comprehensive review of existing research on intrusion detection systems for mobile ad hoc networks. It examines different approaches, techniques, and challenges related to intrusion detection in this dynamic and challenging environment. The chapter analyzes the strengths and weaknesses of existing solutions and identifies gaps in the current research.
Chapter 3: Present work This chapter outlines the scope of the study, the problem formulation, and the objectives of the research. It defines the specific research questions and the proposed approach to address them. The chapter also discusses the methodology and the tools used in the research.
Chapter 4: Research Methodology This chapter details the research methodology employed in the study. It describes the design and implementation of the proposed intrusion detection system, including the data collection methods, the analysis techniques, and the evaluation metrics used. The chapter also discusses the experimental setup and the data used in the research.
Chapter 5: Result and Discussion This chapter presents the results of the research and discusses their implications. It analyzes the performance of the proposed intrusion detection system in detecting various attacks and evaluates its effectiveness in securing MANETs. The chapter also discusses the limitations of the system and suggests areas for future improvement.
Schlüsselwörter (Keywords)
The keywords and focus themes of the text include mobile ad hoc networks, intrusion detection systems, MAC layer security, attack detection, attack sequences, network security, wireless networks, and security protocols. The research focuses on developing an effective and efficient intrusion detection system for mobile ad hoc networks, specifically at the MAC layer, to enhance the security and resilience of these networks against various attacks.
- Arbeit zitieren
- Tapan Gondaliya (Autor:in), 2013, Intrusion Detection System in mobile ad hoc network in MAC layer, München, GRIN Verlag, https://www.grin.com/document/276616
-
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen.