… From this technique, they can identify a blackholeattack. … as DDBG (dualattackdetection of blackhole and grayholeattack), G-… set (CDS) and intrusiondetection system (IDS). With the …
P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
… Memon, ‘‘A dualattackdetectiontechnique to identifyblack and grayholeattacksusing an intrusiondetection system and a connected dominating set in MANETs,’’ Future Internet, vol. …
… We present a strategy termed dualattackdetection for Black and gray node [3] in order … detectionmethod for harmful BlackHoles and GrayHolesusing the nodes for intrusiondetection. …
… a technique for detecting and mitigating the smart blackhole … -based approach to identify grayholeattacks. The significant … a smart blackhole and grayholeattackdetection mechanism …
… ways, ie, the intruder modifies the message then forwards, … algorithm for identifying and defending blackhole and gray … a dualattackdetection mechanism for the black and grayhole …
… of a large amount of IntrusionDetection System (IDS) traffic. … (Dual-AttackDetection of Black-hole and Gray-hole Security … the early detection of malicious nodes using ECC techniques. …
… In this work, a deep learning-based methodology for identifying … protection against dual attacks for black and grey-holeattacks. … Blackholeattackdetectionusing fuzzy based intrusion …
… the detection of the grayholeattack by identifying the … , “Greyholeattackdetection and prevention methods in wireless … , “Intelligent intrusiondetection of greyhole and rushing attacks in …
… it is necessary to identify and prevent such security attacks. In … for detection of blackhole attack in this paper. The proposed … topology, the attacks like GrayHoleattack can be easily …