EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS
Texto
Imagem
Documentos relacionados
The survey explored the characteristics of mobile devices being used in the form of hardware technology, software and communication systems, achievements made and
The elected cluster head will perform signature detection on all the member nodes along with running anomaly detection only on the backup node.. Similarly the backup will be
The main objective of this research is to test the stability of detection precision for low-frequent attacks and weaker detection stability using the current hybrid
In an ad-hoc network that uses AODV as a routing protocol, a mobile node that wishes to communicate with other node first broadcasts an RREQ[6] (Route Request) message to find a
Because of the increas- ing the speed of the decomposition of the anhydrite, together with the growth of the temperature of casting the bronze to the plaster mould, the gases
In this paper, we propose a model for the detection of denial of service attack in wireless networks using dominance based rough set. The proposed model is analyzed with the help of
The proposed algorithm is used to prevent Co-operative Black hole attack in Manet using DSR protocol and also improve the performance in terms of throughput and delay.. The rest of
The two points considered at the alternate sides, of the tangents through the diameter of the circle, and then the line joining these points divides the circle