The rapid proliferation of Mobile ad hoc network has changed the landscape of network security. The recent DOS attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology and cooperative algorithms, lack of centralized monitoring and management point and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective.
There are many intrusion detection techniques have been developed on Ad hoc network but have been turned to be inapplicable in this new environment. Here we need to search for new architecture and mechanisms to protect Mobile Ad hoc network. In the above all technique of intrusion detection is applied on the only one layer and that is probably on routing layer. But here we apply this intrusion detection system in the MAC layer for the more security, efficiency and high speed compare to other technique those whose apply in the network layer.
Inhaltsverzeichnis (Table of Contents)
- Chapter 1. Introduction.
- 1.1 Mobile Adhoc Network….
- 1.1.1 History of Mobile Adhoc Networks..
- 1.1.2 Overview Of Mobile Adhoc Networks..
- 1.1.3 Adhoc Routing Protocols for MANET.
- 1.1.3.1 Table Driven Protocols..
- 1.1.3.2 On demand Protocols....
- 1.1.3.3 Hybrid Protocols....
- 1.2 Overview of intrusion detection...
- 1.3 Intrusion Detection System.………
- 1.3.1 Host based intrusion detection system..
- 1.3.2 Network based intrusion detection system..
- 1.4 Why we need IDS....
- 1.5 IDS Techniques….
- 1.5.1 Anomaly Detection...
- 1.5.2 Misuse Detection or Signature Detection..
- 1.5.3 Target Monitoring...
- 1.5.4 Stealth Probes....
- 1.6 Overview of wormhole attacks..
- Chapter 2. Review of literature
- Chapter 3. Present work..
- 3.1 Scope of Study
- 3.2 Problem Formulation.
- 3.3 Objective.
- Chapter 4. Research Methodology.
- Chapter 5. Result and Discussion
- Chapter 6. Conclusion and Future works..
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This dissertation explores the development of an intrusion detection system for mobile ad hoc networks, focusing specifically on the MAC layer. The goal is to create a system that can effectively detect and isolate attacks in this challenging environment.
- Mobile Ad hoc Network Security
- Intrusion Detection Systems (IDS) in MANETs
- MAC Layer Security in MANETs
- Wormhole Attacks in MANETs
- Research Methodology for IDS Development
Zusammenfassung der Kapitel (Chapter Summaries)
Chapter 1: Introduction
This chapter provides an overview of mobile ad hoc networks (MANETs) and their unique security challenges. It discusses the history of MANETs, explores various routing protocols, and introduces the concept of intrusion detection systems (IDSs). The chapter delves into the need for IDSs in MANETs and examines different IDS techniques, including anomaly detection, misuse detection, and stealth probes. The chapter concludes with an overview of wormhole attacks, a prevalent security threat in MANETs.
Chapter 2: Review of Literature
This chapter presents a detailed analysis of existing research and literature related to intrusion detection in MANETs. It examines previous approaches, their limitations, and potential solutions. This review lays the foundation for the research methodology and the development of a new IDS for the MAC layer.
Chapter 3: Present Work
This chapter outlines the scope of the study, defines the specific problem addressed by the dissertation, and outlines the research objectives. It explains the limitations and boundaries of the research project and clarifies the intended contributions of this work.
Chapter 4: Research Methodology
This chapter describes the research approach and methods employed to develop the MAC layer intrusion detection system. It details the design process, the selection of techniques, and the experimental setup used to evaluate the system's effectiveness.
Chapter 5: Result and Discussion
This chapter presents the results of the research, including the implementation and testing of the developed IDS. It analyzes the performance of the system in detecting and isolating attacks, highlighting its strengths and weaknesses. The chapter discusses the significance of the findings and their implications for improving security in MANETs.
Schlüsselwörter (Keywords)
The key terms and focus topics of this dissertation include: mobile ad hoc networks (MANETs), intrusion detection systems (IDSs), MAC layer security, wormhole attacks, anomaly detection, misuse detection, research methodology, and experimental evaluation. These keywords encapsulate the primary concepts and areas of investigation within the research.
- Quote paper
- Tapan Gondaliya (Author), 2013, Intrusion Detection System in mobile ad hoc network in MAC layer, Munich, GRIN Verlag, https://www.grin.com/document/276616