A Survey on Intrusion detection System for Mobile Ad-hoc Networks Ranjit j. Bhosale Master of Engineering, Department of Computer Engineering Sinhgad institute of Technology, Lonavala, University of Pune, Pune. Prof. R.K.Ambekar Dept. of Computer Engineering Sinhgad institute of Technology, Lonavala, University of Pune, Pune. Abstract— The mobile ad-hoc networks (MANET) is a new wireless technology, having features like dynamic topology and self-configuring ability of nodes. The self -configuring ability of nods in MANET made it popular among the critical mission such as military use and emergency recovery. But due to the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. So to protect MANET from various attacks, it is crucial to develop an efficient secure intrusion-detection system for MANET. In this paper, we focus on various intrusion-detection system in MANETs. Keywords— Intrusion detection system,Malicious nodes, Misbehaviour report, Acknowledement. I. INTRODUCTION Wireless networking is the platform for working with the current technology widely used in several applications. Mobile Ad-hoc Network( MANET) is a collection of wireless mobile node, consists of both wireless transmitters and receivers, which dynamically forming a temporary network and communication between transmitter and receiver is by using bi-directional link. Either directly, if nodes in MANET are within communication range or indirectly means transmitter node rely on intermediate node, for forwarding data to destination node. Various feature of MANET, overcomes the problem in contemporary application of wireless network. such as dynamic topology and decentralized network feature of MANET, means all the nodes are free to move randomly. The self-configuring ability of nodes in MANET, Minimal configuration and quick development, makes MANET ready to be used in emergency condition, where an infrastructure is unavailable, or difficult to install network, in scenarios like natural disasters, military conflicts. Due to these various unique characteristics, MANET is becoming popular among all other wireless application as well as widely implemented in industry. Network security has vital importance in every wireless network technology. But open medium and remote distribution of nodes make MANET vulnerable to various types of attacks. So it is necessary to develop an efficient secure intrusion-detection system (IDS) to protect MANET from various attacks. IDS is one of the Research field in MANET, mostly researchers are focusing on developing a new detection, prevention and response mechanisms for MANET. Fig 1. Wireless MANET 1.1 IDS in MANETs: Intrusion is any set of actions that attempt to comprise the integrity, confidentiality or availability and an intrusion detection system (IDS) is a device or software application that monitors network traffic and if any suspicious activity found then it alerts the system or network administrator. There are three main modules of IDS are Monitoring, Analyses, Response. The Monitoring Module is responsible for controlling the collection of data. Analyses Module is responsible for deciding if the collected data indicated as an intrusion or not. Response Module is responsible for manage and using the response actions to the intrusion. Due to the limitations of most MANET routing protocols, nodes in MANETs assume that other nodes always cooperate with each other to relay data. This assumption leaves the attackers with the opportunities to achieve significant impact on the network with just one or two compromised nodes. To overcome this problem, intrusion-detection system (IDS) should be added to enhance the security level of MANETs. If MANET knows how to the detect the attackers as soon as they enters in the network, we will able to completely remove the potential damages caused by compromised nodes at the first time. IDS usually acts as the second layers in MANETs. and it is a great complement to exiting proactive approaches. So intrusion detection system is very important aspect of defending the cyber infrastructure from attackers. Ranjit j. Bhosale et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7330-7333 www.ijcsit.com 7330