Gray hole attack detection in MANETs

SU Patil - 2017 2nd International Conference for Convergence …, 2017 - ieeexplore.ieee.org
… size, CPU power, neighbor nodes list with IP addresses and battery power. Step 2 : At starts
of … To investigation the IDS performance below gray hole attack in network through proposed …

[PDF][PDF] Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems

H Jadidoleslamy - International Journal of Computer Science and …, 2012 - academia.edu
… domain is Intrusion Detection System (IDS); IDS is a defensive… to improving detection level
and performance of IDS; also, this … were a hole in each one of IDS's components, so the IDS is …

A survey on energy efficient intrusion detection in wireless sensor networks

A Ghosal, S Halder - Journal of Ambient Intelligence and …, 2017 - content.iospress.com
IDS mechanism for detecting black-hole and selective forwarding attacks. To detect attacks,
specification based IDS … More specifically, IDS mechanism measures the behaviour using a …

Investigating black holes in segment routing networks: identification and detection

CC Campanile - 2022 - iris.uniroma1.it
detect network BHs for IPv6 are not suitable in SR. In this paper we investigate the problem
of detecting SR Black Holes … of the creation of an SR Black Holes. Then we show that existing …

Sinkhole+ CloneID: A hybrid attack on RPL performance and detection method

SMH Mirshahjafari, BS Ghahfarokhi - Information Security Journal …, 2019 - Taylor & Francis
IDS method for its detection. Section 4 is on the simulation and Section 5 analyzes the results
in terms of detection … In this section, we introduce an IDS method for detecting the above-…

Intrusion prevention systems: superior security

T Rowan - Network Security, 2007 - Elsevier
… systems known as intrusion detection systems (IDS) appeared in … of ways in which an IPS
can detect the presence of unwanted … One neat way to achieve this is to use a black hole route. …

Intrusion detection in mobile ad-hoc network using hybrid reactive search and bat algorithm

R Srilakshmi, J Muthukuru - International Journal of Intelligent …, 2022 - emerald.com
… such as worm-hole, black-hole, gray-hole and some different … sequence number in the route
detecting stage. Succeeding, they … hub with one of the unused IPs, which tends to choose …

Detection and mitigation of smart blackhole and gray hole attacks in VANET using dynamic time warping

P Remya Krishnan, P Arun Raj Kumar - Wireless Personal …, 2022 - Springer
… the black hole and the gray hole attacks due to its severity. In black hole and gray hole attacks,
… called Smart Blackhole and Gray hole Mitigation (SBGM) to detect and mitigate both black …

Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems

DK Sharma, SK Dhurandher, S Kumaram… - Computer …, 2022 - Elsevier
IDS system can detect this attack. To defend this attack parent fail over and a rank … to
detect Black Hole attacks. Requests are sent to target nodes with fake IP addresses. Only, …

Correlation in an intrusion detection process

F Cuppens, F Autrel, A Miege… - SECI'02: Sécurité des …, 2002 - hal.science
… Fusion process and fusion alert The simple alerts generated by different IDS detecting the
same … there can be holes in the IDS network coverage that make impossible detection of some …