Black hole detection using evolutionary algorithm for IDS/IPS in MANETs

R Thanuja, A Umamakeswari - cluster computing, 2019 - Springer
… The main contribution of this research method is to detect the black hole attack (BHA) by …
detection accuracy. The suggested HPSO-GA routing mechanism researches the black hole

[PDF][PDF] Securing network using raspberry pi by implementing vpn, pi-hole, and ips (vpisec)

AM Taib, MFH Ishak, NK Kamarudin - International Journal, 2020 - academia.edu
… The Pi-Hole is … IDS that only alerts the detected attack but does not prevent it. However,
this project implemented OSSEC IPS instead of the Suricata IDS which is capable of detecting

Netguard: Securing network environment using integrated openvpn, pi-hole, and ids on raspberry pi

AM Taib, MT Zabri, NAM Radzi, EA Kadir - … on the Future of ASEAN (ICoFA …, 2020 - Springer
… and intrusion prevention software (IPS) on the installed device. It was developed by open …
threat detection engine. Its network threat engine is adequate of real-time IDS, inline IPS, …

A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs

Z Ali Zardari, J He, N Zhu, KH Mohammadani… - Future Internet, 2019 - mdpi.com
… The main focus of this paper is to detect the black and gray hole attacks in MANETs. In order
… dual detection of black hole and gray hole attacks (DDBG) is proposed. For the detection of …

Smart IDS and IPS for cyber-physical systems

SA Mahboub, ESA Ahmed, RA Saeed - … intelligence paradigms for …, 2021 - igi-global.com
IDS/IPS detection and prevention techniques will help to monitor the misbehavior of a physical
component the IDS look for to detect … is compromised to security holes that make it prone …

WiP: Distributed intrusion detection system for TCP/IP-based connections in industrial environments using self-organizing maps

A Kharitonov, A Zimmermann - … AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P …, 2021 - Springer
… Security holes in different information systems can be … detection methods tend to have
nonzero false alarm rates [37]. That fact hinders the application of anomaly based IDS as an IPS, …

Performances evaluation of threshold-based IDS and trust based IDS under smart black hole attacks

K MEKKAOUI, I MEDDAH - Turkish Journal of Computer and …, 2023 - turcomat.org
… For example by determining the threshold applied for the sequence number, in the
threshold-based IDS which sets a threshold to detect the black holes which announce themselves …

A lightweight anomaly detection system for black hole attack

A Abdelhamid, MS Elsayed, AD Jurcut, MA Azer - Electronics, 2023 - mdpi.com
… for detecting black hole attacks using anomaly detection based on a support vector machine
(SVM). This detection … In the case of black hole attacks, the attacking nodes have some …

A review on cooperative bait based intrusion detection in MANET

B Mandal, S Sarkar, S Bhattacharya… - … of Industry Interactive …, 2020 - papers.ssrn.com
IPS) is used to extend solution of IDS for identifying attacks. There are two major detection
techniques used to detect … to identify attacks like black hole attack and gray hole attack. It …

[PDF][PDF] Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks

K Rozendaal, A Mailewa - International Journal of Computer Applications - researchgate.net
… What sort of attacks does our IDS need to detect? Is it going to be a network-based system
… a security practitioner to better understand the holes in their security framework. With most …