Print ISBN : 978-1-4577-0979-1International audienceThe evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile adhoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient regarding security, we need a second line of defence, Intrusion Detection. The focus of this paper is on distributed and intelligent intrusion detection. We propose a model for building a distributed and behavioural intrusion detection system by using a classification method
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
Abstract — Intrusion detection for mobile ad hoc network (MANET) is a complex and difficult task due...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...
Print ISBN : 978-1-4577-0979-1International audienceThe evolution of wireless network technologies a...
The evolution of wireless network technologies and the recent advances in mobile computing hardware ...
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based...
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based...
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based...
Intrusion detection has over the last few years, assumed paramount importance within the broad realm...
AbstractThis paper brings forth a distributed self adaptive intrusion detection system (IDS) based o...
Abstract — Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized...
Abstract—The communication channel in Mobile Adhoc Networks is shared among the nodes in the network...
A Mobile Ad Hoc Network (MANET) is a group of wireless nods that can be dynamically organized as a m...
Proactive security mechanism like authentication, confidentiality and non-repudiation are difficult ...
The recent world is surrounded by wireless networks. Thanks to their great characteristics, the tren...
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
Abstract — Intrusion detection for mobile ad hoc network (MANET) is a complex and difficult task due...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...
Print ISBN : 978-1-4577-0979-1International audienceThe evolution of wireless network technologies a...
The evolution of wireless network technologies and the recent advances in mobile computing hardware ...
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based...
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based...
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based...
Intrusion detection has over the last few years, assumed paramount importance within the broad realm...
AbstractThis paper brings forth a distributed self adaptive intrusion detection system (IDS) based o...
Abstract — Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized...
Abstract—The communication channel in Mobile Adhoc Networks is shared among the nodes in the network...
A Mobile Ad Hoc Network (MANET) is a group of wireless nods that can be dynamically organized as a m...
Proactive security mechanism like authentication, confidentiality and non-repudiation are difficult ...
The recent world is surrounded by wireless networks. Thanks to their great characteristics, the tren...
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
Abstract — Intrusion detection for mobile ad hoc network (MANET) is a complex and difficult task due...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...