Accurate Detection of Multi-layer Packet Dropping Attacks Using Distributed Mobile Agents in MANET

M Boopathi, R Seetha - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Detecting multi-layer packet drop attacks may result in extraordinary computational
overhead in Mobile Ad Hoc Networks (MANET). Most of the existing works consider only …

Layered architecture to detect attacks using asymmetric support vector machine

JJ Edith, A Chandrasekar - Journal of Applied Security Research, 2014 - Taylor & Francis
Intrusion detection is one of the most interesting tasks for network administrators. There is a
necessity in protecting the networks from known liabilities by developing more consistent …

[PDF][PDF] Outlier detection methods for identifying network intrusions—A survey

JR Beulah, DS Punithavathani - International Journal of Applied …, 2015 - researchgate.net
Network intrusion detection is a dynamic research area as intruders or attackers have
increased attacks on all kinds of networking set-ups. In the field of data mining, outlier …

LC-IDS: Loci-Constellation-Based Intrusion Detection for Reconfigurable Wireless Networks

J Zuniga-Mejia, R Villalpando-Hernandez… - Electronics, 2021 - mdpi.com
Detection accuracy of current machine-learning approaches to intrusion detection depends
heavily on feature engineering and dimensionality-reduction techniques (eg, variational …

[PDF][PDF] An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy

K Anusha, N Jayaleshwari, S Arun Kumar… - International Journal of …, 2013 - Citeseer
Mobile ad-hoc Network is a self organized wireless network which has a dynamic topology
where nodes can be join or leave the network at anytime with large number of nodes. Due to …

Intelligent intrusion detection techniques for secure communications in wireless networks: a survey

KPR Prabha, N Jeyanthi - International Journal of …, 2019 - inderscienceonline.com
Communication is the heart of the day to day activity in the current world. Since the world
has practiced with electronic devices for carrying out all the daily activities, electronic and …

Application of High‐Dimensional Outlier Mining Based on the Maximum Frequent Pattern Factor in Intrusion Detection

L Shen, Z Sun, L Chen, J Feng - Mathematical Problems in …, 2021 - Wiley Online Library
As the Internet applications are growing rapidly, the intrusion detection system is widely
used to detect network intrusion effectively. Aiming at the high‐dimensional characteristics of …

Design of intrusion detection system for wireless adhoc network in the detection of man in the middle attack using support vector machine classifier method comparing …

SK Kanisetty, NJ Thiruchitrambalam - AIP Conference Proceedings, 2023 - pubs.aip.org
The goal of this project is to create a wireless adhoc network intrusion detection system that
uses a support vector machine classifier to detect a man-in-the-middle attack, and to …

[PDF][PDF] Performance analysis of classification techniques by using multi agent based intrusion detection system

AK Saxena, S Sinha, P Shukla - International Journal of Computer …, 2018 - researchgate.net
In this paper we have designed Agent based intrusion detection system (ABIDS) where
agents will travel between connected client systems from server in a client-server network …

[PDF][PDF] Integrated Intrusion Detection Scheme using Agents

K Rai, A Guleria, MS Devi - … Journal of Cyber-Security and Digital …, 2020 - researchgate.net
ABSTRACT Misuse based Intrusion Detection System (IDS) employs various signature
matching techniques against stored databases to find intrusions in a network. Anomaly …