Main Reference PaperOn the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, August 2011.
  • Several intrusion detection techniques (IDTs) proposed for mobile ad hoc networks rely on each node passively monitoring the data forwarding by its next hop. This project presents quantitative evaluations of false positives and their impact on monitoring-based intrusion detection for ad hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad hoc network suffers from high false positives; these results are validated by Markov and probabilistic models. These false positives can reduce the network performance or increase the overhead. In a simple monitoring-based system where no secondary and more accurate methods are used, the false positives impact the network performance in two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of attacks in networks with attackers.

+ Description
  • Several intrusion detection techniques (IDTs) proposed for mobile ad hoc networks rely on each node passively monitoring the data forwarding by its next hop. This project presents quantitative evaluations of false positives and their impact on monitoring-based intrusion detection for ad hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad hoc network suffers from high false positives; these results are validated by Markov and probabilistic models. These false positives can reduce the network performance or increase the overhead. In a simple monitoring-based system where no secondary and more accurate methods are used, the false positives impact the network performance in two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of attacks in networks with attackers.

  • To propose several intrusions detection techniques (IDTs) for mobile ad hoc networks rely on each node passively monitoring the data forwarding behavior of their neighboring nodes.

  • To perform quantitative evaluations of false positives and their impact on monitoring based intrusion detection for ad hoc networks

+ Aim & Objectives
  • To propose several intrusions detection techniques (IDTs) for mobile ad hoc networks rely on each node passively monitoring the data forwarding behavior of their neighboring nodes.

  • To perform quantitative evaluations of false positives and their impact on monitoring based intrusion detection for ad hoc networks

  • A technique is contributed to improve the cryptography algorithm and improve the security in mobile ad hoc network.

+ Contribution
  • A technique is contributed to improve the cryptography algorithm and improve the security in mobile ad hoc network.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.