Paper Title :Implementation Of Policy Enforcement Technique For Intrusion Detection System Using Manet's
Author :Ankita Sharma, Darshanaa Birkad, Sabisha Shetty, Shehnaz Jabbar, Hema Kolla
Article Citation :Ankita Sharma ,Darshanaa Birkad ,Sabisha Shetty ,Shehnaz Jabbar ,Hema Kolla ,
(2015 ) " Implementation Of Policy Enforcement Technique For Intrusion Detection System Using Manet's " ,
International Journal of Advance Computational Engineering and Networking (IJACEN) ,
pp. 64-69,
Volume-3, Issue-5
Abstract : The transition to the wireless network from wired network has been a global trend in the past few decades. The
wireless network has brought mobility and scalability making it possible in many applications. Among all wireless networks,
Mobile Ad hoc Network (MANET) is one of the most significant and unique applications. Unlike the other network
architecture, MANET does not require a fixed network infrastructure; every single node works as a transmitter as well as a
receiver. When the nodes are in the same communication range, they communicate directly with each other. Else they rely
on their neighbors to relay messages. The self-configuring ability of nodes in MANET makes it popular among critical
mission applications like military use and emergency recovery. But the open medium and wide distribution of nodes has
made MANET vulnerable to the malicious attackers. In such cases, it is important to develop efficient intrusion-detection
mechanisms for the protection of MANET from attacks. We are witnessing a current trend of expanding MANETs into
industrial applications due the advancements in the technologies and reduction in the hardware costs. For adapting such a
trend, we believe that it is crucial to address its potential security issues. In this paper, we propose and implement a new
intrusion-detection system (IDS) named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs.
In comparison to the contemporary approaches EAACK demonstrates higher malicious-behavior detection rates in particular
circumstances while not affecting the network performances. In our project we are implementing policy enforcement
technique, where we control the access to a network. The term policy means some rules or usage parameters which are
required to give access to the users and check whether the user is authorized or not.
Keywords: EAACK, MANET, ad-hoc, IDS
Type : Research paper
Published : Volume-3, Issue-5
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2052
View Here
Copyright: © Institute of Research and Journals
|
 |
| |
 |
PDF |
| |
Viewed - 78 |
| |
Published on 2015-05-07 |
|