Abstract: Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Intrusion detection techniques are used for the network attack detection process. The receiver collision, low transmission power and misbehave report authentication attacks are generated in the routing process.  The acknowledgement scheme is used to control the routing based attacks. Service level based attacks are raised using service requests. Classification methods are used to discover the service level based attacks. The nodes are grouped into clusters. The leader nodes are assigned for the clusters. Cluster Dependant Leader Election (CDLE) and Cluster Independent Leader Election (CILE) schemes are used in the system. The system optimizes the leader election and intrusion detection process. The system uses the Enhanced Adaptive ACKnowledgment (EAACK) scheme for routing based attack detection process. RSA and Secure Hash Algorithms are used to secure the EAACK scheme.  The Bayesian Classification algorithm is used for service level attack detection process. Node mobility is managed by the system.

 

Keywords: Mobile ad-hoc networks, Intrusion detection, CDLE, CILE, EAACK, Bayesian classification algorithm.