Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

host Based Intrusion Detection Architecture for Mobile Ad hoc networks

host Based Intrusion Detection Architecture for Mobile Ad hoc networks
View Free PDF
Author(s): Prabhudutta Ray (Center for Development of Advanced Computing, India)
Copyright: 2007
Pages: 4
Source title: Managing Worldwide Operations and Communications with Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-929-8.ch218
ISBN13: 9781599049298
EISBN13: 9781466665378


Performance test; Object-relational schema; SQL:2003; Array; Multiset; Scoped references with each other using wireless interfaces and can also dynamically form a network topology where each node can act as router to forwarding the packets to other nodes. These networks are in high demand due to the ease and speed in setting up such networks. Due to the inherent vulnerabilities of wireless medium and node mobility make such network highly susceptible to malicious attacks. Things are getting worst when some nodes getting hijacked or compromised and make this network to stop from the smooth workings. This paper proposes the host based intrusion detection architecture to identify the malicious node and provide security support to continue the smooth workings of this network.

Body Bottom