A REVIEW ON INTRUSION DETECTION SYSTEM IN MOBILE COMPUTING
Keywords:
simultaneously, companies,, security, networksAbstract
The appearance of mobile computing devices such as laptops, smart phones grew people started to expect to gain network connectivity. As a result several groups started working on means to accomplish this task. This led to wireless LANs being marketed by several companies however this proposed standard could be used in two ways, one with the presence of a base station and the other without the presence of a base station. In the latter case the computers would communicate to each other directly. This is called as an ad-hoc network. A further specified case of ad-hoc networks is when the nodes i.e., computers in this case are mobile. In these cases each node consists of a host and a router on the same device. This means that the nodes form a network without the use of an external routing device.
References
Nilotpal Chakra borty(2013) “intrusion detection system and intrusion prevention system: a comparative study” International Journal of Computing and Business Research (IJCBR) Volume 4 Issue 2 May 2013 B.Santos Kumar(2013) “Intrusion Detection System- Types and Prevention” International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013
Dr. S.Vijayarani (2015) “INTRUSION DETECTION SYSTEM – A STUDY” International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
E. Ahmed, K. Samad, and W. Mahmood, “Cluster-based intrusion detection (cbid) architecture for mobile ad hoc networks,” in 5th Conference, AusCERT2006 Gold Coast, Australia, May 2006 Proceedings, 2006.
T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile ad hoc networks,” in Wireless Network Security, pp. 159–180, Springer, 2007.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.