A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
Citations
22 citations
References
14,565 citations
"A Novel Cooperative Intrusion Detec..." refers background or methods in this paper
...Weight is defined as the strength of evidence in supporting a hypothesis (Shafer, 1976)....
[...]
...decreasing the number of false positives, Dempster-Shafer theory (DST) of evidence (Shafer, 1976) was utilized....
[...]
...Let Ω be the frame of discernment which represents a set of mutually exclusive possibilities (Shafer, 1976)....
[...]
...Let Ω be the frame of discernment, which represents a set of mutually exclusive possibilities (Shafer, 1976)....
[...]
...Based on the collected observations from Nodes (A), (B), and (C), we apply Dempster’s rule of combination (Shafer, 1976) to combine the observations of all three nodes....
[...]
4,278 citations
"A Novel Cooperative Intrusion Detec..." refers background in this paper
...This delay is determined through a mechanism that keeps track of settling times for routes, which are defined as the times when routes to a destination fluctuate before the route with the best metric is received (Royer & Toh, 1999)....
[...]
...The process continues until the destination or an intermediate node with a recent route to the destination is found (Royer & Toh, 1999)....
[...]
...However, if a node receives two updates with the same sequence number, it selects the one with the smaller hop count to the destination (Royer & Toh, 1999)....
[...]
...Such messages are used by AODV as periodical local broadcasts to keep nodes informed about others in their neighborhood (Royer & Toh, 1999)....
[...]
2,661 citations
"A Novel Cooperative Intrusion Detec..." refers background in this paper
...At the same time, having a single, central authority can cause major vulnerabilities; if such a node gets compromised, the entire network is sabotaged (Zhou & Haas, 1999)....
[...]
...Security is a significant consideration in MANETs, especially for those applications involving highly secretive information, such as military operations (Zhou & Haas, 1999)....
[...]
...This lack of physical protection raises the chances for a network to get compromised (Zhou & Haas, 1999)....
[...]
1,712 citations
1,430 citations
"A Novel Cooperative Intrusion Detec..." refers background in this paper
...…characteristics of MANETs that differentiate them from other types of wireless networking can be summarized by the following (Corson et al., 1999; Chlamtac et al, 2003; Johansson, 1999): • Dynamic Topologies: since nodes in MANETs are free to move arbitrarily and route changes, frequent network…...
[...]
...Such disruptions can be in the form of fabricating false routing messages, modifying original routing information, or impersonating other nodes (Chlamtac et al., 2003)....
[...]
...This makes the enforcement of cooperation among nodes an essential requirement for a MANET to remain operational (Chlamtac et al., 2003)....
[...]
...nodes act selfishly by not forwarding packets to conserve their resources (Chlamtac et al., 2003)....
[...]