Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

Shallow and deep networks intrusion detection system: A taxonomy and survey

E Hodo, X Bellekens, A Hamilton, C Tachtatzis… - arXiv preprint arXiv …, 2017 - arxiv.org
Intrusion detection has attracted a considerable interest from researchers and industries.
The community, after many years of research, still faces the problem of building reliable and …

A survey on intrusion detection and prevention in wireless ad-hoc networks

K Khan, A Mehmood, S Khan, MA Khan, Z Iqbal… - Journal of Systems …, 2020 - Elsevier
Ad hoc networks have been serving us in one way or the other, for two decades, through
their vast variety of applications in majority fields. Due to their features such as hostile …

Collaborative trust aware intelligent intrusion detection in VANETs

N Kumar, N Chilamkurti - Computers & Electrical Engineering, 2014 - Elsevier
Abstract Trust aware Collaborative Learning Automata based Intrusion Detection System (T-
CLAIDS) for VANETs is proposed in this paper. Learning Automata (LA) are assumed to be …

[HTML][HTML] Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

B Subba, S Biswas, S Karmakar - Engineering Science and Technology, an …, 2016 - Elsevier
Abstract Present Intrusion Detection Systems (IDSs) for MANETs require continuous
monitoring which leads to rapid depletion of a node's battery life. To address this issue, we …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks

C Panos, C Ntantogian, S Malliaros, C Xenakis - Computer Networks, 2017 - Elsevier
The blackhole attack is one of the simplest yet effective attacks that target the AODV
protocol. Blackhole attackers exploit AODV parameters in order to win route requests, and …

Notice of Retraction: Enhancing Cyber Security in Modern Internet of things (IoT) Using Intrusion Prevention Algorithm for IoT (IPAI)

A Aldaej - IEEE Access, 2019 - ieeexplore.ieee.org
Notice of Retraction After careful and considered review of the content of this paper by a
duly constituted committee, this pape Page 1 Notice of Retraction After careful and …

Securing underwater sensor networks against routing attacks

T Dargahi, HHS Javadi, H Shafiei - Wireless Personal Communications, 2017 - Springer
With the advances in technology, there has been an increasing interest both from research
and industrial communities in the use of Underwater Wireless Sensor Networks (UWSNs) …

[HTML][HTML] On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering

A Vasudeva, M Sood - Journal of King Saud University-Computer and …, 2022 - Elsevier
The large-scale deployment of Mobile Ad hoc Networks (MANETs) requires dealing with the
issues like low throughput, end-to-end delay, and energy exhaustion. In order to resolve …