{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:02:37Z","timestamp":1762430557650},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,7,27]],"date-time":"2011-07-27T00:00:00Z","timestamp":1311724800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11235-011-9484-6","type":"journal-article","created":{"date-parts":[[2011,7,26]],"date-time":"2011-07-26T20:48:04Z","timestamp":1311713284000},"page":"2047-2058","source":"Crossref","is-referenced-by-count":41,"title":["Protection of MANETs from a range of attacks using an intrusion detection and prevention system"],"prefix":"10.1007","volume":"52","author":[{"given":"Adnan","family":"Nadeem","sequence":"first","affiliation":[]},{"given":"Michael","family":"Howarth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,27]]},"reference":[{"key":"9484_CR1","volume-title":"Proceedings of IEEE ICCCN","author":"K. Agarwal","year":"2005","unstructured":"Agarwal, K., & Wang, W. (2005). Statistical analysis of the impact of routing in MANETs base on real-time measurement. In Proceedings of IEEE ICCCN."},{"key":"9484_CR2","volume-title":"Proceeding of IEEE consumer communication and networking conference 2006","author":"F. Cretu","year":"2006","unstructured":"Cretu, F., Parekh, J., Wang, & Stolfo, J. (2006). Intrusion and anomaly detection model exchange for mobile ad-hoc networks. In Proceeding of IEEE consumer communication and networking conference 2006."},{"key":"9484_CR3","volume-title":"Proceeding of IEEE WCNC","author":"A. Hijazi","year":"2005","unstructured":"Hijazi, A., & Nasser, N. (2005). Using mobile agent for intrusion detection in wireless ad-hoc networks. In Proceeding of IEEE WCNC."},{"key":"9484_CR4","first-page":"23","volume-title":"Proceeding of MobiCom","author":"Y. Hu","year":"2002","unstructured":"Hu, Y., Perrig, A., & Johnson, B. (2002). A secure on demand routing protocol for ad hoc networks. In Proceeding of MobiCom, Atlanta, Georgia, USA, September (pp. 23\u201328)."},{"key":"9484_CR5","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"Y. Hu","year":"2003","unstructured":"Hu, Y., Jhonson, B., & Perrig, A. (2003). SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1, 175\u2013192.","journal-title":"Ad Hoc Networks"},{"key":"9484_CR6","volume-title":"Proceeding of 2nd ACM workshop on wireless security","author":"Y. Hu","year":"2003","unstructured":"Hu, Y., Perrig, A., & Johnson, B. (2003). Rushing attack and defense in wireless ad hoc networks routing protocols. In Proceeding of 2nd ACM workshop on wireless security. New York: ACM Press."},{"issue":"3","key":"9484_CR7","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R. A., & Porras, P. A. (1995). State transition analysis: a rule based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3), 181\u2013199.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9484_CR8","volume-title":"Proceeding of IEEE INMIC","author":"P. Jacquet","year":"2001","unstructured":"Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., & Viennot, L. (2001). Optimized link state routing protocol for ad hoc networks. In Proceeding of IEEE INMIC."},{"key":"9484_CR9","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume":"353","author":"B. Jhonson","year":"1996","unstructured":"Jhonson, B., & Maltz, A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing Journal, 353, 153\u2013181.","journal-title":"Mobile Computing Journal"},{"key":"9484_CR10","volume-title":"Proceedings of IEEE power engineering conference","author":"H. Jiang","year":"2005","unstructured":"Jiang, H., & Wang, H. (2005). Markov chain based anomaly detection for wireless ad-hoc distribution power communication networks. In Proceedings of IEEE power engineering conference."},{"key":"9484_CR11","volume-title":"Proceeding of IEEE WCNC","author":"J. Joseph","year":"2008","unstructured":"Joseph, J., Das, A., Seet, B., & Lee, B. (2008). CRADS: integrated cross layer approach for detecting routing attacks in MANETs. In Proceeding of IEEE WCNC."},{"key":"9484_CR12","unstructured":"KDD data set, 1999. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html ."},{"key":"9484_CR13","unstructured":"Kurosawa, S., & Jamalipour, A. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. International Journal of Network Security, 5."},{"key":"9484_CR14","first-page":"184","volume-title":"IEEE workshop proceedings on information assurance and security","author":"Z. Li","year":"2005","unstructured":"Li, Z., Das, A., & Zhou, J. (2005). Theoretical basis for intrusion detection. In IEEE workshop proceedings on information assurance and security, 15\u201317 June (pp. 184\u2013192)."},{"key":"9484_CR15","volume-title":"Proceeding of ACM 5th international wireless communication and mobile computing conference","author":"A. Nadeem","year":"2009","unstructured":"Nadeem, A., & Howarth, M. (2009). Adaptive intrusion detection & prevention of denial of service attacks in MANETs. In Proceeding of ACM 5th international wireless communication and mobile computing conference. Germany, June."},{"key":"9484_CR16","volume-title":"Proceedings of IEEE international conference on ultra modern telecommunications & workshops","author":"A. Nadeem","year":"2009","unstructured":"Nadeem, A., & Howarth, M. (2009). A generalized intrusion detection & prevention mechanism for securing MANETs. In Proceedings of IEEE international conference on ultra modern telecommunications & workshops, St. Petersburg, Russia."},{"key":"9484_CR17","volume-title":"INRS telecom","author":"J. Nuevo","year":"2004","unstructured":"Nuevo, J. (2004). A comprehensive GloMoSim tutorial. In INRS telecom."},{"key":"9484_CR18","volume-title":"Proceeding of 32nd IEEE conference on local computer networks","author":"E. Padilla","year":"2007","unstructured":"Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., & Tolle, J. (2007). Detecting black hole attack in tactical MANETs using topology graph. In Proceeding of 32nd IEEE conference on local computer networks."},{"key":"9484_CR19","first-page":"90","volume-title":"Proceeding of IEEE MOBICOM","author":"E. Perkins","year":"1999","unstructured":"Perkins, E., & Royer, M. (1999). Ad hoc on demand distance vector routing. Sun Micro System Laboratories Advance Development Group. In Proceeding of IEEE MOBICOM (pp. 90\u2013100)."},{"key":"9484_CR20","volume-title":"Proceedings of IEEE international conference on security and privacy in communication networks","author":"C. Piro","year":"2006","unstructured":"Piro, C., Shields, C., & Levine, B. (2006). Detecting the sybil attack in mobile ad hoc networks. In Proceedings of IEEE international conference on security and privacy in communication networks."},{"issue":"3","key":"9484_CR21","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1080\/15501320600642718","volume":"2","author":"M. Pirrete","year":"2006","unstructured":"Pirrete, M., & Brooks, R. (2006). The sleep deprivation attack in sensor networks: analysis and methods of defence. International Journal of Distributed Sensor Networks, 2(3), 267\u2013287.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"9484_CR22","volume-title":"Proceedings of 10th IEEE international conference on network protocol (ICNP\u2019 02)","author":"K. Sanzgiri","year":"2002","unstructured":"Sanzgiri, K., & Belding-Royer, M. (2002). A secure routing protocol for ad hoc networks. In Proceedings of 10th IEEE international conference on network protocol (ICNP\u2019 02)."},{"key":"9484_CR23","volume-title":"Proceeding of IEEE ICICS","author":"J. Sen","year":"2007","unstructured":"Sen, J., Chandra, M., Harihara, S.G, Reddy, H., & Balamuralidhar, P. (2007). A mechanism for detection of gray hole attack in mobile ad hoc network. In Proceeding of IEEE ICICS."},{"key":"9484_CR24","volume-title":"Proceeding of IFIP international conference on network & parallel computing","author":"G. Xiaopeng","year":"2007","unstructured":"Xiaopeng, G., & Wei, C. (2007). A novel grey hole attack detection scheme for mobile ad-hoc networks. In Proceeding of IFIP international conference on network & parallel computing."},{"key":"9484_CR25","first-page":"657","volume-title":"Proceeding of IEEE conference on information technology: coding and computing","author":"P. Yi","year":"2005","unstructured":"Yi, P., Dai, Z., & Zhang, S. (2005). Resisting flooding attack in ad hoc networks. In Proceeding of IEEE conference on information technology: coding and computing, Vol.\u00a02 (pp. 657\u2013662)."},{"key":"9484_CR26","volume-title":"IEEE global telecommunication conference Globecom","author":"W. Yu","year":"2005","unstructured":"Yu, W., & Ray, K. (2005). Defence against injecting traffic attack in cooperative ad hoc networks. In IEEE global telecommunication conference Globecom."},{"key":"9484_CR27","volume-title":"Proceeding of 6th ACM MOBICOM","author":"Y. Zhang","year":"2000","unstructured":"Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceeding of 6th ACM MOBICOM."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-011-9484-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-011-9484-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-011-9484-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:50:11Z","timestamp":1559386211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-011-9484-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,27]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["9484"],"URL":"https:\/\/doi.org\/10.1007\/s11235-011-9484-6","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,27]]}}}