Professional Documents
Culture Documents
Wollo University College of Informatics Data Communication and Computer Networking MSC Program Research Method in Computing
Wollo University College of Informatics Data Communication and Computer Networking MSC Program Research Method in Computing
Article review for the title Cluster based Intrusion Detection System for Mobile Ad-hoc
Network by Dr. S. Gopala krishnan and Dr. A. Rajesh* Fifth (ICONSTEM), 2019
By Zekarias Mulugeta
ID no :- (SGSE/0460/12)
Kombolcha Ethiopa
Table of Contents
Introduction..........................................................................................................................................1
2 Objectives..........................................................................................................................................1
3 Methodology.....................................................................................................................................2
4 Finding..............................................................................................................................................2
6 Conclusion.........................................................................................................................................2
7 Recommendations.............................................................................................................................2
i
Cluster based Intrusion Detection System for Mobile Ad-hoc Network by Dr. S. Gopala krishnan and Dr. A.
Rajesh* Fifth (ICONSTEM), 2019
Introduction
In the research the author focus on mobile ad-hoc network application area require security. Mobile ad-
hoc network means a collection of individual mobile node communicate each other in different area.
In the research, it is proposed that a well-defined purpose of mobile ad-hoc application and intrusion
detection system, the new ideas or information were communicating and why was important to publish, the
research methodology such as the method that the author uses, how the data collected and analyzed,
At the beginning the researcher describes the MANET application area provides rapid growth in
the industry that cannot deploy fixed infrastructure like battle field& disaster recovery.
Secondly the researcher focuses on why mobile ad-hoc network easily attacked by intruder.
Thirdly the study focus on to create awareness new security method is required in MANET
because of resource deficiency problem like power and by nature of topology change problem.
2 Objectives
The effect of MANET application in different area and new IDS is required.
The effect of MANET application distributed nature and topology problem is easily vulnerable to
intruder.
The effect of intrusion detection system in MANET application area performance effectiveness.
1
Cluster based Intrusion Detection System for Mobile Ad-hoc Network by Dr. S. Gopala krishnan and Dr. A.
Rajesh* Fifth (ICONSTEM), 2019
3 Methodology
Use Empirical approach and observation methodology like Cluster formation and cluster agent election,
intrusion communication (response) and use simulation tools NS2 with existing protocol DRINA to
evaluate performance.
4 Finding
Pros ->The author describe the reason of intruder easily attack MANET application and
6 Conclusion
The main purpose of conducting this research was to use MANET application safely and to give
7 Recommendations
My evaluation to the researcher is power issue of MANET is critical and need other research to increase
node application power performance year and use the application result by confidentiality.