A REVIEW ON INTRUSION DETECTION SYSTEM IN MOBILE COMPUTING

Authors

  • Pooja Research Scholar, Department of Computer Science and Engineering, Choudhaary Bhim Singh institute of science & technology,
  • Shilpa Assistant professor, Department of Computer Science and Engineering, Choudhaary Bhim Singh institute of science & technology,

Keywords:

simultaneously, companies,, security, networks

Abstract

The appearance of mobile computing devices such as laptops, smart phones grew people started to expect to gain network connectivity. As a result several groups started working on means to accomplish this task. This led to wireless LANs being marketed by several companies however this proposed standard could be used in two ways, one with the presence of a base station and the other without the presence of a base station. In the latter case the computers would communicate to each other directly. This is called as an ad-hoc network. A further specified case of ad-hoc networks is when the nodes i.e., computers in this case are mobile. In these cases each node consists of a host and a router on the same device. This means that the nodes form a network without the use of an external routing device.

References

Nilotpal Chakra borty(2013) “intrusion detection system and intrusion prevention system: a comparative study” International Journal of Computing and Business Research (IJCBR) Volume 4 Issue 2 May 2013 B.Santos Kumar(2013) “Intrusion Detection System- Types and Prevention” International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013

Dr. S.Vijayarani (2015) “INTRUSION DETECTION SYSTEM – A STUDY” International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015

E. Ahmed, K. Samad, and W. Mahmood, “Cluster-based intrusion detection (cbid) architecture for mobile ad hoc networks,” in 5th Conference, AusCERT2006 Gold Coast, Australia, May 2006 Proceedings, 2006.

T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile ad hoc networks,” in Wireless Network Security, pp. 159–180, Springer, 2007.

Downloads

Published

30-06-2017

How to Cite

Pooja, & Shilpa. (2017). A REVIEW ON INTRUSION DETECTION SYSTEM IN MOBILE COMPUTING. International Journal for Research Publication and Seminar, 8(3), 74–78. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1040

Issue

Section

Original Research Article