International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Mobile ad-hoc networks prove to be the best fit for various applications like military operations, flood affected areas, remote area etc. Ad-hoc networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred in ad-hoc network. These attacks are very common in case of reactive protocols like ad-hoc on demand distance vector protocol. In this paper, an intrusion detection system will be developed for detection and isolation of attacks. In this paper, MAC layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the network.