A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks but unknown Security attacks have learned to survive in a high secure precinct, it must be noticed that virus has an augmenting influence, so it is very difficult to detect unknown attacks at application layer on the run time.

Provided by: IOSR Journal of Engineering Topic: Security Date Added: Dec 2012 Format: PDF

Find By Topic