Sangeetha et al., 2015 - Google Patents
ZIDS: zonal-based intrusion detection system for studying the malicious node behaviour in MANETSangeetha et al., 2015
- Document ID
- 16823677497468342875
- Author
- Sangeetha V
- Kumar S
- Publication year
- Publication venue
- 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)
External Links
Snippet
The communication behaviour of mobile nodes in adhoc network are quite confusing to understand owing to the decentralized architecture and dynamic topology. The existing system has presented various security solutions in order to understand the malicious activity …
- 238000001514 detection method 0 title abstract description 33
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Le et al. | 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach | |
Wazid et al. | Detection and prevention mechanism for blackhole attack in wireless sensor network | |
Hai et al. | A lightweight intrusion detection framework for wireless sensor networks | |
Esmaili et al. | Performance analysis of AODV under black hole attack through use of OPNET simulator | |
Juneja | Random-session and K-neighbour based suspected node analysis approach for cooperative blackhole detection in MANET | |
Marathe et al. | ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing | |
Sinha | Impact of DoS attack in IoT system and identifying the attacker location for interference attacks | |
Durga Devi et al. | Malicious node and malicious observer node detection system in MANETs | |
Sharma et al. | Detection & prevention of vampire attack in wireless sensor networks | |
Kodali et al. | Trust model for WSN | |
Alsumayt et al. | A survey of the mitigation methods against dos attacks on manets | |
Kaur | Implementing MANET security using CBDS for combating sleep deprivation & DOS attack | |
Chandan | Consensus routing and environmental discrete trust based secure AODV in MANETs | |
Sangeetha et al. | ZIDS: zonal-based intrusion detection system for studying the malicious node behaviour in MANET | |
Cucurull et al. | Anomaly detection and mitigation for disaster area networks | |
Panda et al. | MANET routing attacks and their countermeasures: A survey | |
Kibirige et al. | Attacks in wireless sensor networks | |
Nandhini et al. | Version attack detection using claim algorithm in RPL based IoT networks: effects and performance parameters evaluation | |
Geetha et al. | Elimination of energy and communication tradeoff to resist wormhole attack in MANET | |
Prabha et al. | Qos aware trust metric based framework for wireless sensor networks | |
Balaji et al. | Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks. | |
Geetha et al. | Graph-based energy supportive routing protocol to resist wormhole attack in mobile adhoc network | |
Reddy et al. | An effective analysis on intrusion detection systems in wireless mesh networks | |
Kanthimathi et al. | Defending against packet dropping attacks in wireless adhoc networks using cluster based trust entropy | |
Joseph et al. | Opening the Pandora’s Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks |