Design, Implementation and Evaluation of Dynamic Cluster Based IDS to Detect Gray Hole Attack in MANETs

R Funde, P Chandre - … of Innovation in Computer Science and …, 2015 - indianjournals.com
… to detect gray hole attack … detect gray hole attack in MANET Architecture has to enhanced
performance in terms of Packet delivery ratio and throughput due to dynamic cluster based IDS

Preventing system intrusions

M West - Network and System Security, 2014 - Elsevier
… performing intrusion detection and attempting to stop detected possible … This chapter describes
the characteristics of IPS … and close all the holes in today’s increasingly complex software. …

A high throughput string matching architecture for intrusion detection and prevention

L Tan, T Sherwood - 32nd International Symposium on …, 2005 - ieeexplore.ieee.org
… the security community aimed at detecting and thwarting attacks in the network [21, 31, 7]. …
As we mentioned in Section 2, IDS/IPS have three main requirements on string matching …

Automated alerting for black hole routing

V Puri - 2007 - apps.dtic.mil
… The ability to automatically identify an attack using an IDS/IPS system would greatly improve
the performance of BGP Black Hole Routing. As the research in this field to date is limited, it …

[PDF][PDF] Survey on Intrusion Detection and Prevention System: A MANET Perspective

A Kundu, TK Kundu, I Mukhopadhyay - Int. J. Sci. Eng. Res, 2012 - researchgate.net
… System (IPS) is essential to detect security breaches. An intrusion detection system (IDS) is
… path to the node whose packets it wants to intercept as in the so called black hole attacks. …

[PDF][PDF] Evaluation of machine learning algorithms for intrusion detection system in WSN

MS Alsahli, MM Almasri, M Al-Akhras… - … Journal of Advanced …, 2021 - researchgate.net
… Four DoS attacks were considered: Flooding attack, Blackhole attack, Scheduling attack, and
Gray-hole attack. The main purpose was to help WSN manufacturers to create and develop …

A Log analysis based intrusion detection system for the creation of a specification based intrusion prevention system

A Muscat - 2003 - um.edu.mt
… of having an IDS and how they contribute to close “holes” … working on an IDS or an Intrusion
Prevention System (IPS), we … unless the IPS is capable of detecting complex logistical issues …

[PDF][PDF] SDN based intrusion detection and prevention systems using manufacturer usage description: A survey

N Mazhar, R Salleh, MA Hossain… - … Journal of Advanced …, 2020 - pdfs.semanticscholar.org
… An intrusion detection system (IDS) is used to detect and … The alignment of IDS and IPS is
known as intrusion detection … attacks on topology and RPL like a wormhole, black hole, and …

A mobile agent-based P2P Autonomous Security Hole Discovery system

J Zheng, X Wang, X Xue, CK Toh - … 2005, Changsha, China, August 27-29 …, 2005 - Springer
… number of destination hosts, IP addresses of hosts and source … IDS to detect infection or
intrusion and take action as early as possible. Low latency will improve the performance of IDS. …

[图书][B] Practical intrusion analysis: prevention and detection for the twenty-first century

R Trost - 2009 - books.google.com
… new intrusion detection strategies consisting of wireless IDS/IPS, network behavioral analysis
(NBA), converging of physical and logical security, and geospatial intrusion detectionhole. …