Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
A Survey on MANET Intrusion Detection
Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah
Pages - 1 - 11     |    Revised - 15-08-2007     |    Published - 30-08-2007
Volume - 2   Issue - 1    |    Publication Date - February 2008  Table of Contents
Intrusion Detection System (IDS), MANET, Survey, Wireless Ad hoc Network
In recent years, the security issues on MANET have become one of the primary concerns. The MANET is more vulnerable to be attacked than wired network. These vulnerabilities are nature of the MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the MANET operation. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. They are unlikely to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a need of second mechanism to “detect and response” these newer attacks, i.e. “intrusion detection”. This paper aims to explore and to classify current techniques of Intrusion Detection System (IDS) aware MANET. To support these ideas, a discussion regarding attacks, IDS architectures, and researches achievement on MANET are presented inclusively, and then the comparison among several researches achievement will be evaluated based on these parameters. By this way, several existing security problems on MANET can be probed quickly for future researches.
CITED BY (36)  
1 Mandala, S., Ngadi, M. A., Sharif, J. M., Zahid, M. S. M., & Mohamed, F. (2015). Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7(3-4), 296-305.
2 Rathore, M. M., Ahmad, A., & Paul, A. (2016). Real time intrusion detection system for ultra-high-speed big data environments. The Journal of Supercomputing, 1-22.
3 Hussain, M. A. (2015). Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 128-141.
4 masoud Javidi, M., & Aliahmadipour, L. (2015). Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs. Computer Engineering and Applications, 4(1).
5 Samaras, N. S., Kokkinos, K., Chaikalis, C., & Vlachos, V. (2015). On intrusion detection in opportunistic networks. International Journal of Innovation and Regional Development, 6(3), 222-242.
6 EL MOURABIT, Y. O. U. S. E. F., toumanari, a., bouirden, a., & el moussaid, n. a. d. i. a. (2015). a comparative evaluation of intrusion detection techniques in wireless sensor network. journal of theoretical & applied information technology, 76(1).
7 Meenatchi, I., & Palanivel, K. An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs.
8 Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
9 Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
10 Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes mviles ad hoc (Doctoral dissertation, Facultad de Informtica).
11 Pattnaik, O., & Pattanayak, B. K. (2014). Security in vehicular ad hoc network based on intrusion detection system. American Journal of Applied Sciences, 11(2), 337.
12 Ponsam, J. G., & Srinivasan, R. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20).
13 Vimal, S. (2014). An energy efficient intrusion detection system in MANET for secure routing and clustering (Doctoral dissertation).
14 Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
15 Subha, P. S., & Moses, J. C. A Survey of Various Risk Mitigating Techniques in MANET Environment.
16 Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE.
17 Daniel, J. V., Joshna, S., & Manjula, P. (2013). A Survey of Various Intrusion Detection Techniques in Wireless Sensor Networks. International Journal of Computer Science and Mobile Computing, 2(9).
18 Singh, D., & Bedi, S. S. (2013). A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network. International Journal of Computer Applications, 82(5).
19 Butun, I. (2013). Prevention and Detection of Intrusions in Wireless Sensor Networks.
20 Kundu, A., Kundu, T. K., & Mukhopadhyay, I. Survey on Intrusion Detection and Prevention System: A MANET Perspective.
21 Kisku, B., & Datta, R. (2012, December). An energy efficient scheduling scheme for intrusion detection system in mobile ad-hoc networks. In Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on (pp. 1-6). IEEE.
22 Singh, O., & Singh, J. (2012). Comparative Study of Various Distributed Intrusion Detection Systems for WLAN.
23 Srinivasan, S., & Alampalayam, S. P. (2012). Intrusion Detection Algorithm for MANET. Privacy Solutions and Security Frameworks in Information Protection, 163.
24 Sathya, R., & Latha, P. (2012). An Effective Security Approach for MANET using Detection Algorithm. Wireless Communication, 4(12), 702-707.
25 M. Karami, M. K. Rafsanjani, A. H. F. Navid and Y. Yavari, QAIDS: Quantitative and Agent based Intrusion Detection System, Computer and Information Science, 4(2), pp. 64-74, 2011.
26 Y. Singh and S. K. Jena, Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks, Computer Science Advances in Parallel Distributed Computing Communications in Computer and Information Science, 203(1), pp. 410-419, 2011.
27 Xenakis, C., Panos, C., & Stavrakakis, I. (2011). A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security, 30(1), 63-80.
28 Manikandan, S. P., & Manimegalai, R. (2011). Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks. International Journal on Computer Science and Engineering, 3(9), 3243.
29 Saraydayran, J., Benali, F., & Paffumi, L. (2011). A Survey on new Threats and Countermeasures on Emerging Networks. INTECH Open Access Publisher.
30 Vuppala, S., Banerjee, A., Pal, A., & Choudhury, P. (2011). An Attack Identification Scheme Using Hierarchical Data Clustering in MANET. In International Conference on Computer Engineering and Technology, 3rd (ICCET 2011). ASME Press.
31 S. Mandala, M. A. Ngadi, A. H. Abdullah and A. S. Ismail, A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol, Computer Science Recent Trends in Wireless and Mobile Networks Communications in Computer and Information Science, 84(1), pp. 87-98, 2010.
32 Qasem, M. A. Rassam, Anomaly intrusion detection system using immune network with reduced network traffic features. Thesis Masters, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 2010.
33 Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275-284.
34 Husain, S., Gupta, S. C., Chand, M., & Mandoria, H. L. (2010, September). A proposed model for Intrusion Detection System for mobile adhoc network. In Computer and Communication Technology (ICCCT), 2010 International Conference on (pp. 99-102). IEEE.
35 Menaria, S., Valiveti, S., & Kotecha, K. (2010). Comparative study of distributed intrusion detection in ad-hoc networks. International Journal of Computer Applications, 8(9), 11-16.
36 Lacey, T. H. (2010). Reputation-based internet protocol security: a multilayer security framework for mobile Ad Hoc networks (No. AFIT/DCS/ENG/10-07). AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF ENGINEERING AND MANAGEMENT.
1 Google Scholar 
2 Academic Journals Database 
3 Academic Journals Database 
4 ScientificCommons 
5 Academic Index 
6 CiteSeerX 
7 refSeek 
8 iSEEK 
9 Socol@r  
10 ResearchGATE 
11 Libsearch 
12 Libsearch 
13 Bielefeld Academic Search Engine (BASE) 
14 Scribd 
15 WorldCat 
16 SlideShare 
17 SlideShare 
19 PdfSR 
1 T. Clausen, P. Jaquet, et.al. Optimized link state routing protocol. Internet Draft, draft-ietfmanet- olsr-06.txt, work in progress, 2001
2 D.B. Johnson, D.A. Maltz, et.al. The dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR). Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress, 2002
3 C.E Perkins, E. Belding-Royer. Ad hoc On-demand Distance Vector (AODV), Request For Comments (RFC) 3561, 2003
4 C.E. Perkins, P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications, 1994
5 C. Endorf, E. Schultz and J. Mellander, Intrusion Detection & Prevention, McGraw-Hill, ISBN: 0072229543 (2004)
6 J. P. Anderson. Computer Security Threat Monitoring and Surveillance. Technical Report, James P. Anderson Co., Fort Washington, PA, 1980
7 D.E. Denning, An Intrusion-Detection Model. IEEE Transactions on Software Engineering, pp. 222- 231, 1987
8 P.A. Porras and R. Kemmerer, Penetration State Transition Analysis C a Rule-Based Intrusion Detection Approach. The 8th Annual Computer Security Application Conference, pp. 220-229, 1992
9 P. Porras and A. Valdes, Live Traffic Analysis of TCP/IP Gateways. ISOC Symposium on Network and Distributed System Security, San Diego, CA, 1998
10 S. Forrest, S.A. Hofmeyr, and A. Somayaji. Computer Immunology. Communications of the ACM, pp. 88-96, 1997
11 H. Debar, M. Becker and D. Siboni. A Neural Network Component for an Intrusion Detection System. Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 240-250, 1992
12 N. Ye, X. Li, et.al. Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. IEEE Transactions on Systems, Man, and Cybernetics, pp. 266-274, 2001
13 W. Lee, S.J. Stolfo, K.W. Mok. A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy (Oakland, California), 1999
14 G. Florez, S.M. Bridges, and R.B. Vaughn, An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection. The North American Fuzzy Information Processing Society Conference, New Orleans, LA, 2002
15 H. Debar, M. Dacier, and A.Wespi, A Revised Taxonomy for Intrusion-Detection Systems. Annales des Telecommunications, pp. 361-378, 2000
16 A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot, Handbook of Applied Cryptography. CRC Press, Inc., USA (2001)
17 A. Mishra, K. Nadkarni, and A. Patcha. Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, 2004.
18 Y. Zhang, W. Lee, and Y. Huang. Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks Journal (ACM WINET), 9(5): 545-556, 2003.
19 L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network Magazine , 1999
20 E.C.H. Ngai, M.R. Lyu, R.T. Chin. An authentication service against dishonest users in mobile ad hoc networks, IEEE Proceedings on Aerospace Conference, vol. 2, pp. 1275 1285 2004.
21 L. Blazevic et al. Self-organization in mobile ad-hoc networks: the approach of terminodes, IEEE Communications Magazine , pp. 166173, 2001
22 J. Kong et al. Adaptive security for multi-layer ad-hoc networks. Special Issue of Wireless Communications and Mobile Computing, John Wiley Inter Science Press (2002)
23 W. Zhang, R. Rao, et. al. Secure routing in ad hoc networks and a related intrusion detection problem, IEEE Military Communications Conference (MILCOM), vol. 2, 1316 p. 735 740, 2003
24 P. Kyasanur, N. Vaidya. Detection and handling of MAC layer misbehavior in wireless networks. International Conference on Dependable Systems and Networks. pp. 173182, 2003
25 Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, The 6th Annual International Conference on Mobile Computing and Networking, pp. 275283, 2000
26 Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks. ACM MOBICOM, 2002
27 Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE INFOCOM03, 2003
28 J. R. Douceur. The sybil attack. The 1st International Workshop on Peer-to-Peer Systems pp. 251260, 2002.
29 Y. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of ACM MobiCom Workshop - WiSe03, 2003
30 J. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks. The 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001
31 P. Papadimitratos, Z.J. Haas, E.G. Sirer, Path set selection in mobile ad hoc networks, The Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 111, 2002
32 S. Bo, W. Kui, U.W. Pooch. Towards adaptive intrusion detection in mobile ad hoc networks. IEEE Global Telecommunications Conference, pp. 35513555, 2004
33 B. DeCleene et al. Secure group communications for wireless networks. IEEE Military Communications Conference, 2001.
34 C. Douligeris, A. Mitrokosta, DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks: The International Journal of Computer and Telecommunications Networking 44 (5):643666, 2004
35 C.M. Chlamtac, J.J.-N. Liu, Mobile ad hoc networking: imperatives and challenges, Ad Hoc Networks 1, 2003
36 H. Yang, H.Y. Luo, et.al. Security in Mobile Ad Hoc networks: challenges and solutions. IEEE Wireless Communications, pp.3847, 2004.
37 C. Krugel and T. Toth. Applying mobile agent technology to intrusion detection. In ICSE Workshop on Software Engineering and Mobility, 2001.
38 T. Anantvalee and J. Wu. A Survey on Intrusion Detection in Mobile Ad Hoc Networks, Book Series Wireless Network Security, Springer, pp. 170 196, ISBN: 978-0-387-28040-0 (2007)
39 P. Albers, O. Camp, et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002.
40 O. Kachirski, R. Guha. Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS03), IEEE, 2003
41 D. Sterne, P. Balasubramanyam, et al. A General Cooperative Intrusion Detection Architecture for MANETs. In Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, 2005
42 C. Ko, J. Rowe, P. Brutch, K. Levitt, System Health and Intrusion Monitoring Using a hierarchy of Constraints. In Proceedings of 4th International Symposium, RAID, 2001.
43 B. Sun, K.Wu, and U. W. Pooch. Alert Aggregation in Mobile Ad Hoc Networks. The 2003 ACM Workshop on Wireless Security in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom'03), pp. 69-78, 2003.
Mr. Satria Mandala
- Malaysia
Mr. Md. Asri Ngadi
- Malaysia
Mr. A.Hanan Abdullah
-- - Malaysia