@inproceedings{scholars1038, pages = {660--665}, journal = {Proceedings 2010 International Symposium on Information Technology - Engineering Technology, ITSim'10}, year = {2010}, title = {Implementation of IDS with response for securing MANETs}, address = {Kuala Lumpur}, doi = {10.1109/ITSIM.2010.5561608}, volume = {2}, note = {cited By 10; Conference of 2010 International Symposium on Information Technology, ITSim'10 ; Conference Date: 15 June 2010 Through 17 June 2010; Conference Code:81915}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78049415866&doi=10.1109\%2fITSIM.2010.5561608&partnerID=40&md5=c6afb8fc190f1e4a9f7495645859dcb3}, keywords = {Anomaly detection; Artificial Immune System; Clonal selection; Danger theories; IDS; Immune network; Immune systems; Intrusion Detection Systems; Learning capabilities; Negative selection; New approaches; Reliable detection; Secure mobile ad hoc networks; Security, Computer crime; Immunology; Information technology; Intrusion detection; Mobile ad hoc networks; Mobile agents; Network security, Ad hoc networks}, abstract = {This paper presents a new approach to secure Mobile ad hoc networks (MAN Ts) based on the paradigm of Artificial Immune System (HIS). An intrusion detection system with response (IDS ) that simulates a considerable number of immune system features. A considerable amount of immune properties have been mapped to ad hoc networks seeking for comprehensive security system. Negative selection, clonal selection, danger theory, immune network concept are the main paradigms that have been considered in our system. Anomaly detection, first and second response, learning capability, decentralized and reliable detection system are the features that e pected to contribute more to ad hoc network security. {\^A}{\copyright} 2010 IEEE.}, author = {Mohamed, Y. A. and Abdullah, A. B.}, isbn = {9781424467181} }