[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sangeetha et al., 2015 - Google Patents

ZIDS: zonal-based intrusion detection system for studying the malicious node behaviour in MANET

Sangeetha et al., 2015

Document ID
16823677497468342875
Author
Sangeetha V
Kumar S
Publication year
Publication venue
2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)

External Links

Snippet

The communication behaviour of mobile nodes in adhoc network are quite confusing to understand owing to the decentralized architecture and dynamic topology. The existing system has presented various security solutions in order to understand the malicious activity …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Le et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Wazid et al. Detection and prevention mechanism for blackhole attack in wireless sensor network
Hai et al. A lightweight intrusion detection framework for wireless sensor networks
Esmaili et al. Performance analysis of AODV under black hole attack through use of OPNET simulator
Juneja Random-session and K-neighbour based suspected node analysis approach for cooperative blackhole detection in MANET
Marathe et al. ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing
Sinha Impact of DoS attack in IoT system and identifying the attacker location for interference attacks
Durga Devi et al. Malicious node and malicious observer node detection system in MANETs
Sharma et al. Detection & prevention of vampire attack in wireless sensor networks
Kodali et al. Trust model for WSN
Alsumayt et al. A survey of the mitigation methods against dos attacks on manets
Kaur Implementing MANET security using CBDS for combating sleep deprivation & DOS attack
Chandan Consensus routing and environmental discrete trust based secure AODV in MANETs
Sangeetha et al. ZIDS: zonal-based intrusion detection system for studying the malicious node behaviour in MANET
Cucurull et al. Anomaly detection and mitigation for disaster area networks
Panda et al. MANET routing attacks and their countermeasures: A survey
Kibirige et al. Attacks in wireless sensor networks
Nandhini et al. Version attack detection using claim algorithm in RPL based IoT networks: effects and performance parameters evaluation
Geetha et al. Elimination of energy and communication tradeoff to resist wormhole attack in MANET
Prabha et al. Qos aware trust metric based framework for wireless sensor networks
Balaji et al. Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks.
Geetha et al. Graph-based energy supportive routing protocol to resist wormhole attack in mobile adhoc network
Reddy et al. An effective analysis on intrusion detection systems in wireless mesh networks
Kanthimathi et al. Defending against packet dropping attacks in wireless adhoc networks using cluster based trust entropy
Joseph et al. Opening the Pandora’s Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks