[go: up one dir, main page]

Prasad et al., 2022 - Google Patents

An enhanced detection system against routing attacks in mobile ad-hoc network

Prasad et al., 2022

Document ID
15746211123595805511
Author
Prasad M
Tripathi S
Dahal K
Publication year
Publication venue
Wireless Networks

External Links

Snippet

Mobile ad-hoc network is a dynamic wireless network that transfers information through neighbor nodes with a temporary configuration. Due to its dynamic nature, it is exposed to attacks and intrusions. Routing disruption attack is the main problem of this network where …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks

Similar Documents

Publication Publication Date Title
Heidari et al. Internet of Things intrusion detection systems: a comprehensive review and future directions
Islabudeen et al. A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks
Farahani Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks
Prasad et al. An enhanced detection system against routing attacks in mobile ad-hoc network
Elsaid et al. An optimized collaborative intrusion detection system for wireless sensor networks: SA Elsaid, N. Albtati
Gebremariam et al. Localization and detection of multiple attacks in wireless sensor networks using artificial neural network
Rabhi et al. IoT routing attacks detection using machine learning algorithms
McDermott et al. Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks
Sen A survey of intrusion detection systems using evolutionary computation
Srividya et al. An optimal cluster & trusted path for routing formation and classification of intrusion using the machine learning classification approach in WSN
Prasad et al. A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network
Qu et al. A lightweight intrusion detection method based on fuzzy clustering algorithm for wireless sensor networks
Gunduz et al. A review of machine learning solutions to denial-of-services attacks in wireless sensor networks
Godala et al. RETRACTED ARTICLE: A weight optimized deep learning model for cluster based intrusion detection system
Ravindran Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN
Ma et al. DCONST: Detection of multiple-mix-attack malicious nodes using consensus-based trust in IoT networks
Saif et al. Dhoa-ANFIS: a hybrid technique to detect routing attacks in wireless body area network
Antony et al. A novel model for Sybil attack detection in online social network using optimal three-stream double attention network
Joardar et al. Mitigating DoS attack in MANETs considering node reputation with AI
Thanuja et al. Unethical network attack detection and prevention using fuzzy based decision system in mobile ad-hoc networks
Kowsalyadevi et al. IoBTSec-RPL: a novel RPL attack detecting mechanism using hybrid deep learning over battlefield IoT environment
Liu et al. Clustering and hybrid genetic algorithm based intrusion detection strategy
Concone et al. A novel recruitment policy to defend against sybils in vehicular crowdsourcing
Reji et al. Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection.
Behera et al. Attack Detection and Mitigation in Industrial IoT: An Optimized Ensemble Approach.