Detecting domain‐flux botnet based on DNS traffic features in managed network

DT Truong, G Cheng - Security and Communication Networks, 2016 - Wiley Online Library
Modern botnets such as Zeus and Conficker commonly utilize a technique called domain
fluxing or a domain generation algorithm to generate a large number of pseudo‐random …

A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks

RH Jhaveri, NM Patel - Wireless Networks, 2015 - Springer
Wireless shared medium, randomly moving nodes and multi-hop architecture make mobile
ad hoc networks vulnerable to various network layer threats. Grayhole attack is such a …

Energy efficient secured routing protocol for MANETs

T Singh, J Singh, S Sharma - Wireless networks, 2017 - Springer
The design of routing protocol with energy efficiency and security is a challenging task. To
overcome this challenge, we propose energy-efficient secured routing protocol. The …

[HTML][HTML] A trust-based secure neuro fuzzy clustering technique for mobile ad hoc networks

AR Rajeswari, WC Lai, C Kavitha… - Electronics, 2023 - mdpi.com
A MANET consists of a group of mobile nodes. In a MANET, scalability and mobility have a
greater influence on routing performance. The clustering technique plays a vital role in …

[HTML][HTML] Signaling game based strategy of intrusion detection in wireless sensor networks

S Shen, Y Li, H Xu, Q Cao - Computers & Mathematics with Applications, 2011 - Elsevier
As Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to
require Intrusion Detection System (IDS) available to detect internal malicious sensor nodes …

Efficient selective image encryption

AM Ayoup, AH Hussein, MAA Attia - Multimedia tools and applications, 2016 - Springer
Selective image encryption has a significant importance in many applications as it offers
significant savings in computations, cost, and time. Many attempts are exerted for this …

GT-QoSec: A game-theoretic joint optimization of QoS and security for differentiated services in next generation heterogeneous networks

ZM Fadlullah, C Wei, Z Shi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Recently, numerous real-time, data-rich, and differentiated applications and services have
appeared in the next-generation Heterogeneous Networks. As a result, the number of …

Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network

MJ Faghihniya, SM Hosseini, M Tahmasebi - Wireless Networks, 2017 - Springer
VANET is an ad hoc network that formed between vehicles. Security in VANET plays vital
role. AODV routing protocol is a reactive or on-demand routing protocol which means if there …

Modeling malicious activities in cyber space

S Yu, G Wang, W Zhou - IEEE network, 2015 - ieeexplore.ieee.org
Cyber attacks are an unfortunate part of society as an increasing amount of critical
infrastructure is managed and controlled via the Internet. In order to protect legitimate users …

Hybrid model for dynamic evaluation of trust in cloud services

V Viji Rajendran, S Swamynathan - Wireless Networks, 2016 - Springer
Cloud computing, a new paradigm in distributed computing, has gained wide popularity in a
relatively short span of time. With the increase in the number, functionality and features of …