TY - JOUR AU - Alka Chaudhary, Komal Saxena, PY - 2020/06/01 Y2 - 2024/03/29 TI - Soft Computing Techniques for Intrusion Detection in Mobile Ad Hoc Networks JF - International Journal of Control and Automation JA - IJCA VL - 13 IS - 02 SE - Articles DO - UR - http://sersc.org/journals/index.php/IJCA/article/view/32929 SP - 1543 - 1548 AB - Mobile ad hoc networks (MANETs) are suitable for communication in the absence of pre-defined infrastructure but it is extremely prone to threats due to its characteristics such as variable topologies, no centralized points followed by lack of a clear boundary of defense so that detection of intrusions is very difficult in MANETs than the conventional networks. The primary intention of intrusion detecting system is to categorize normal and abnormal behavior of nodes in the system. This paper focuses to develop local architecture of intrusion detection system using soft computing approaches for classifying the normal and abnormal activities. Results show that the proposed intrusion detection system is vital for detection of known and unknown attacks with high detection rates. ER -