Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/12320
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialComputer Engineeringen_US
dc.date.accessioned2013-10-28T07:29:31Z-
dc.date.available2013-10-28T07:29:31Z-
dc.date.issued2013-10-28-
dc.identifier.urihttp://hdl.handle.net/10603/12320-
dc.description.abstractMost existent protocols, applications and services for mobile Adhoc networks newline(MANETs) assume a cooperative and friendly network environment and do not newlineaccommodate security. In MANETs, intrusion prevention (IPS) and intrusion detection (IDS) techniques need to complement each other to guarantee a highly secure environment. The IPS and IDS play different roles in different states of the network. Intrusion prevention measures, such as encryption and authentication, are more useful in preventing outside attacks. Once the node is compromised, intrusion prevention measures will have little effect in protecting the network. Therefore, an intrusion detection system is serving as the second line of defense in Adhoc network. This thesis used the incremental approach to designing the detection engine for Adhoc network environments. In this thesis a two-layer architecture has been proposed which fits the unique requirement of MANETs. First layer is a local intrusion detection module, which identifies the friends quickly and second layer is a global detection module in which intrusion behavior is checked rigorously before declaring the node as a trusted node or newlinean intruder node. Finally, it adds a voting mechanism to generate the trust level for each node. This proposed model is fast responsive, light weighted and better than the conventional model available in Adhoc network environment. We consider the layered approach for communication and attacks are identified for the network layer which is the soft target of attackers. In this thesis well known security attacks are applied to the mobile Adhoc environment. Statistics are then collected, important features are extracted from raw data set, and rule sets are induced for well known attacks like Denial of Service attack, Black Hole attack and Wormhole attack. Most of the attacks known in Adhoc environment are included in these three kinds of attacks.en_US
dc.format.extentxv, 99p.en_US
dc.languageEnglishen_US
dc.relation-en_US
dc.rightsuniversityen_US
dc.titleAn efficient framework for intrusion detection system for mobile adhoc networksen_US
dc.title.alternative-en_US
dc.creator.researcherShahnawaz Husainen_US
dc.subject.keywordComputer Scienceen_US
dc.subject.keywordBlack Holeen_US
dc.subject.keywordWorm-Hole Attacken_US
dc.subject.keywordTCP Segmenten_US
dc.subject.keywordDenial of Service Attacken_US
dc.subject.keywordGlobal Data Collection Moduleen_US
dc.description.noteAppendices p.70-86, References p.87-99en_US
dc.contributor.guideGupta, S Cen_US
dc.publisher.placeDehradunen_US
dc.publisher.universityGraphic Era Universityen_US
dc.publisher.institutionDepartment of Computer Applicationsen_US
dc.date.registeredn.d.en_US
dc.date.completedJuly, 2013en_US
dc.date.awardedn.d.en_US
dc.format.dimensions-en_US
dc.format.accompanyingmaterialNoneen_US
dc.type.degreePh.D.en_US
dc.source.inflibnetINFLIBNETen_US
Appears in Departments:School of Computing

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File90.28 kBAdobe PDFView/Open
02_declaration.pdf243.19 kBAdobe PDFView/Open
03_abstract.pdf127.96 kBAdobe PDFView/Open
04_acknowledgement.pdf122.11 kBAdobe PDFView/Open
05_contents.pdf123.33 kBAdobe PDFView/Open
06_list of abbreviations.pdf110 kBAdobe PDFView/Open
07_list of figures.pdf141.8 kBAdobe PDFView/Open
08_list of figures.pdf219.69 kBAdobe PDFView/Open
09_chapter 1.pdf174.75 kBAdobe PDFView/Open
10_chapter 2.pdf476.9 kBAdobe PDFView/Open
11_chapter 3.pdf470.05 kBAdobe PDFView/Open
12_chapter 4.pdf517.1 kBAdobe PDFView/Open
13_chapter 5.pdf1.04 MBAdobe PDFView/Open
14_chapter 6.pdf1.1 MBAdobe PDFView/Open
15_chapter 7.pdf317.41 kBAdobe PDFView/Open
16_appendix.pdf98.8 kBAdobe PDFView/Open
17_references.pdf288.44 kBAdobe PDFView/Open
18_publication.pdf1.91 MBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: