Provided by: Creative Commons
Date Added: Feb 2015
There are numerous attacks taking place at MAC layer in both wired and wireless networks at exuberant rate because this layer is very sensitive and most compromised layer in connectivity. So, as a result of that many Intrusion Detection Systems (IDSs) have also come in existence from a long time till now for the detection of number of vulnerable attacks. IDS are the tools and techniques which analyze and detect the abnormal data patterns coming from the unauthorized network. These abnormal patterns are known as attacks which are sending through the intruder to harm as well as gain the confidential information.