8. INTRUSION DETECTION IN MOBILE ADHOC NETWORK
Intrusion detection involves the runtime gathering of data from system operation, and the subsequent
analysis of the data; the data can be audit logs generated by an operating system or packets “sniffed” from a
network. We limit our focus to intrusion detection based on behaviour, we think it is a more efficient,
lightweight and easily scalable solution to Intrusion Detection in MANETs. Intrusion Detection Systems based
on behaviour can be broadly classified into these categories: anomaly detection, signature or misuse detection,
and specification based detection. In signature-based intrusion detection [5][10], the data is matched against
known attack characteristics. In anomaly detection find out the normal behaviour of systems, usually
established through automated training, are compared with the actual activity of the system to flag any
significant deviation. In specification-based detection [7][8], the correct behaviours of critical objects are
manually abstracted and crafted as security specifications, which are compared with the actual behaviour of the
objects. This paper describes intrusion detection for mobile ad hoc networks. we employ Behavioural-based
techniques to monitor the ad hoc on-demand distance vector (AODV) routing protocol, a widely adopted ad
hoc routing protocol. AODV is a reactive and stateless routing protocol that establishes routes only as desired
by the source node. AODV is vulnerable to various kinds of attacks.
9. ANTI-JAMMING METRICS AD HOC NETWORKS
Several metrics were previously proposed to evaluate the effectiveness of a jammer in impacting the
throughput of the network. To mitigate the impact of jamming, we adopt a dynamic control channel allocation
strategy, whereby each cluster establishes and maintains its own control channel. The impact of long-range
jamming attacks can be significantly reduced by varying the spatial and temporal frequency allocation of the
control channel. Such a design would also reduce the delay and communication overhead of the control
channel re-establishment process, since it requires only local coordination.