Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

`

Wollo University College of informatics

Data communication and Computer Networking MSC program

Research Method in computing

Article review for the title Cluster based Intrusion Detection System for Mobile Ad-hoc
Network by Dr. S. Gopala krishnan and Dr. A. Rajesh* Fifth (ICONSTEM), 2019

By Zekarias Mulugeta

ID no :- (SGSE/0460/12)

Submitted to Habtamu.M (Phd)

Submitted date Feb, 01-2019

Kombolcha Ethiopa
Table of Contents
Introduction..........................................................................................................................................1

1 Statement of the problem..................................................................................................................1

2 Objectives..........................................................................................................................................1

3 Methodology.....................................................................................................................................2

4 Finding..............................................................................................................................................2

5 Strength and weakness of the study..................................................................................................2

6 Conclusion.........................................................................................................................................2

7 Recommendations.............................................................................................................................2

i
Cluster based Intrusion Detection System for Mobile Ad-hoc Network by Dr. S. Gopala krishnan and Dr. A.
Rajesh* Fifth (ICONSTEM), 2019

Introduction

In the research the author focus on mobile ad-hoc network application area require security. Mobile ad-

hoc network means a collection of individual mobile node communicate each other in different area.

In the research, it is proposed that a well-defined purpose of mobile ad-hoc application and intrusion

detection system, the new ideas or information were communicating and why was important to publish, the

research methodology such as the method that the author uses, how the data collected and analyzed,

effectiveness of cluster based, improvement and conclusion is explained in a good way.

1 Statement of the problem

At the beginning the researcher describes the MANET application area provides rapid growth in

the industry that cannot deploy fixed infrastructure like battle field& disaster recovery.

Secondly the researcher focuses on why mobile ad-hoc network easily attacked by intruder.

Thirdly the study focus on to create awareness new security method is required in MANET

because of resource deficiency problem like power and by nature of topology change problem.

2 Objectives

Specifically, the study sought to determine

The effect of MANET application in different area and new IDS is required.

The effect of MANET application distributed nature and topology problem is easily vulnerable to

intruder.

The effect of intrusion detection system in MANET application area performance effectiveness.

1
Cluster based Intrusion Detection System for Mobile Ad-hoc Network by Dr. S. Gopala krishnan and Dr. A.
Rajesh* Fifth (ICONSTEM), 2019

3 Methodology

Use Empirical approach and observation methodology like Cluster formation and cluster agent election,

intrusion communication (response) and use simulation tools NS2 with existing protocol DRINA to

evaluate performance.

4 Finding

MANET application and security problem are listed.

Create Awareness because of nature MANET is easily vulnerable to intruder.

Describe best intrusion detection system in a good way.

5 Strength and weakness of the study

Pros ->The author describe the reason of intruder easily attack MANET application and

Describe the effect of intrusion detection system for MANET.

->Describe MANET application has vital role in different area.

Cons: -> cannot identify intruder type mostly occur.

6 Conclusion

The main purpose of conducting this research was to use MANET application safely and to give

guaranties for integrity of communication between nodes.

7 Recommendations

My evaluation to the researcher is power issue of MANET is critical and need other research to increase

node application power performance year and use the application result by confidentiality.

You might also like