Skip to main content

Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks

  • Conference paper
PRICAI 2008: Trends in Artificial Intelligence (PRICAI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5351))

Included in the following conference series:

Abstract

Intrusion detection on mobile Ad Hoc Networks (MANETs) is in its early stages. In this paper, we show how grammatical evolution can be used to evolve detection programs for dropping attacks, a particularly important attack type for such networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ryan, C., Colline, J.J., O’Neill, M.: Grammatical Evolution: Evolving Programs for an Arbitrary Language. In: Banzhaf, W., Poli, R., Schoenauer, M., Fogarty, T.C. (eds.) EuroGP 1998. LNCS, vol. 1391, pp. 83–95. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  2. Lu, Y., Zhong, Y., Bhargava, B.: Packet Loss in Mobile Ad Hoc Networks. Technical Report, Dept. of Comp. Sci, Purdue Uni., TR 03-009 (2003)

    Google Scholar 

  3. The Network Simulator: ns-2, http://www.isi.edu/nsnam/ns

  4. BonnMotion: A Mobility Scenario Generation and Analysis Tool, http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/BonnMotion/

  5. Perkins, C.E., Royer, E.M.: Ad-hoc On-Demand Distance Vector Routing. In: Proc. of the 2nd IEEE Workshop on Mobile Computer Systems and Applications, pp. 90–100 (1999)

    Google Scholar 

  6. Camp, T., Boleng, J., Davies, V.: A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communication and Mobile Computing, 483–502 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Şen, S., Clark, J.A. (2008). Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks. In: Ho, TB., Zhou, ZH. (eds) PRICAI 2008: Trends in Artificial Intelligence. PRICAI 2008. Lecture Notes in Computer Science(), vol 5351. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89197-0_106

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89197-0_106

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89196-3

  • Online ISBN: 978-3-540-89197-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics