Prasad et al., 2022 - Google Patents
An enhanced detection system against routing attacks in mobile ad-hoc networkPrasad et al., 2022
- Document ID
- 15746211123595805511
- Author
- Prasad M
- Tripathi S
- Dahal K
- Publication year
- Publication venue
- Wireless Networks
External Links
Snippet
Mobile ad-hoc network is a dynamic wireless network that transfers information through neighbor nodes with a temporary configuration. Due to its dynamic nature, it is exposed to attacks and intrusions. Routing disruption attack is the main problem of this network where …
- 238000001514 detection method 0 title abstract description 78
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Heidari et al. | Internet of Things intrusion detection systems: a comprehensive review and future directions | |
| Islabudeen et al. | A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks | |
| Farahani | Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks | |
| Prasad et al. | An enhanced detection system against routing attacks in mobile ad-hoc network | |
| Elsaid et al. | An optimized collaborative intrusion detection system for wireless sensor networks: SA Elsaid, N. Albtati | |
| Gebremariam et al. | Localization and detection of multiple attacks in wireless sensor networks using artificial neural network | |
| Rabhi et al. | IoT routing attacks detection using machine learning algorithms | |
| McDermott et al. | Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks | |
| Sen | A survey of intrusion detection systems using evolutionary computation | |
| Srividya et al. | An optimal cluster & trusted path for routing formation and classification of intrusion using the machine learning classification approach in WSN | |
| Prasad et al. | A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network | |
| Qu et al. | A lightweight intrusion detection method based on fuzzy clustering algorithm for wireless sensor networks | |
| Gunduz et al. | A review of machine learning solutions to denial-of-services attacks in wireless sensor networks | |
| Godala et al. | RETRACTED ARTICLE: A weight optimized deep learning model for cluster based intrusion detection system | |
| Ravindran | Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN | |
| Ma et al. | DCONST: Detection of multiple-mix-attack malicious nodes using consensus-based trust in IoT networks | |
| Saif et al. | Dhoa-ANFIS: a hybrid technique to detect routing attacks in wireless body area network | |
| Antony et al. | A novel model for Sybil attack detection in online social network using optimal three-stream double attention network | |
| Joardar et al. | Mitigating DoS attack in MANETs considering node reputation with AI | |
| Thanuja et al. | Unethical network attack detection and prevention using fuzzy based decision system in mobile ad-hoc networks | |
| Kowsalyadevi et al. | IoBTSec-RPL: a novel RPL attack detecting mechanism using hybrid deep learning over battlefield IoT environment | |
| Liu et al. | Clustering and hybrid genetic algorithm based intrusion detection strategy | |
| Concone et al. | A novel recruitment policy to defend against sybils in vehicular crowdsourcing | |
| Reji et al. | Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection. | |
| Behera et al. | Attack Detection and Mitigation in Industrial IoT: An Optimized Ensemble Approach. |