Parker, JamesUndercoffer, JeffreyPinkston, JohnJoshi, Anupam2018-12-132018-12-132004-04-16J. Parker , J. Undercoffer , J. Pinkston , A. Joshi , On Intrusion Detection in Mobile Ad Hoc Networks, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , DOI: 10.1109/PCCC.2004.139517210.1109/PCCC.2004.1395172http://hdl.handle.net/11603/1224823rd IEEE International Performance Computing and Communications Conference -- Workshop on Information AssuranceWe present network intrusion detection mechanisms that rely upon packet snooping to detect aberrant behavior in mobile ad hoc networks. Our extensions, which are applicable to several mobile ad hoc routing protocols, offer two response mechanisms, passive -- to singularly determine if a node is intrusive and act to protect itself from attacks, or active -- to collaboratively determine if a node is intrusive and act to protect all of the nodes of an ad-hoc cluster. We have implemented our extensions using the GloMoSim simulator and detail their efficacy under a variety of operational conditions. Based upon our positive simulation results, we are currently implementing our extensions in laptop computers and PDA's and constructing a testbed that use IEEE 802.11 with mobile ad hoc extensions.6 pagesen-USThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.© 2004 IEEEintrusion detectionmobile ad hoc networkspacket snoopingad hoc clusterrouting protocolstelecommunication securitymobile radioUMBC Ebiquity Research GroupOn intrusion detection and response for mobile ad hoc networksText