ABSTRACT
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. How to do it differently and effectively is a challenging research problem. In this paper, we first examine the vulnerabilities of a wireless ad-hoc network, the reason why we need intrusion detection, and the reason why the current methods cannot be applied directly. We then describe the new intrusion detection and response mechanisms that we are developing for wireless ad-hoc networks.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Intrusion Detection In Wireless Ad Hoc Network.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2861/intrusion-detection-in-wireless-ad-hoc-network-5459
"Intrusion Detection In Wireless Ad Hoc Network." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2861/intrusion-detection-in-wireless-ad-hoc-network-5459>.
"Intrusion Detection In Wireless Ad Hoc Network.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2861/intrusion-detection-in-wireless-ad-hoc-network-5459>.
"Intrusion Detection In Wireless Ad Hoc Network.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2861/intrusion-detection-in-wireless-ad-hoc-network-5459.
- Related Works
- Design And Implementation Of A Web-based E-learning System For Continuing Education (case Study Of Rivers State Polytechnic, Bori)
- Speech Recognition Technology
- Design And Implementation Of A Computerized Financial Management System For Public Institutions (a Case Study Of Unth, Enugu)
- Design And Implementation Of A Computerized Sales Order Accounting System
- Understanding The File Allocation Table [fat] In Windows
- Design And Implementation Of A Computerized Property Management System (a Case Study Of Enugu North Local Government Area)
- Design And Implementation Of Computer Accounting System Of A Non-profitable Organisaiton (a Case Study Of Grail Movement Enugu)
- Blue Brain
- Design And Implementation Of Computer Based. Resource Allocation System In A Dynamic /variable Resource Utilization Environment (case Study: Cyberafe)
- Design And Implementation Of Telecom Inventory Maintenance And Application Installer With Error Tracking (a Case Study Of Globacom Enugu Branch)
