Existing approaches to intrusion detection in imperfect wireless environments employ local monitoring, but are limited by their failure to reason about the imprecise monitoring within a radio environment that arises from unidirectional links and collisions. This compounds the challenge of detecting subtle behaviour or adds to uncertainty in the detection strategies employed. A simulation platform was developed, based on the Jist/SWANS environment, adopting a robust methodology that employed Monte-Carlo sampling in order to evaluate intrusion detection systems (IDS). A framework for simulating adversaries was developed, which enabled wormholes, black holes, selfishness, flooding and data modification to be simulated as well as a random distr...
Mobile ad hoc networks (MANETs) have experienced rapid growth in their use for various military, med...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhol...
The proliferation of wideband connections while opening the market to a wealth of Web based applicat...
Existing approaches to intrusion detection in imperfect wireless environments employ local monitorin...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...
AbstractPresent Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which le...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
In this dissertation, we describe the portable, open-source distributed simulation framework (WINDS)...
Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a coo...
MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no f...
Securing Mobile Ad hoc Networks (MANET) that are a collection of mobile, decentralized, and self-org...
The dynamic and distributed nature of MANETs make them vulnerable to various types of attacks like b...
Security in wireless frameworks is a significant and difficult task because of the open environment....
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow f...
The study formulated and evaluated a model for effective management of maliciousnodes in mobile Ad-h...
Mobile ad hoc networks (MANETs) have experienced rapid growth in their use for various military, med...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhol...
The proliferation of wideband connections while opening the market to a wealth of Web based applicat...
Existing approaches to intrusion detection in imperfect wireless environments employ local monitorin...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...
AbstractPresent Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which le...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
In this dissertation, we describe the portable, open-source distributed simulation framework (WINDS)...
Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a coo...
MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no f...
Securing Mobile Ad hoc Networks (MANET) that are a collection of mobile, decentralized, and self-org...
The dynamic and distributed nature of MANETs make them vulnerable to various types of attacks like b...
Security in wireless frameworks is a significant and difficult task because of the open environment....
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow f...
The study formulated and evaluated a model for effective management of maliciousnodes in mobile Ad-h...
Mobile ad hoc networks (MANETs) have experienced rapid growth in their use for various military, med...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhol...
The proliferation of wideband connections while opening the market to a wealth of Web based applicat...