..

இன்டர்நேஷனல் ஜர்னல் ஆஃப் சென்சார் நெட்வொர்க்ஸ் மற்றும் டேட்டா கம்யூனிகேஷன்ஸ்

ஐ.எஸ்.எஸ்.என்: 2090-4886

திறந்த அணுகல்
கையெழுத்துப் பிரதியை சமர்ப்பிக்கவும் arrow_forward arrow_forward ..

Dynamic Cluster Based Intrusion Detection Architecture to Detect RoutingProtocol Attacks in MANET

Abstract

Sarika Patil and Deepali Borade

Mobile Ad-Hoc Networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station. MANET is more vulnerable to different types of attacks and security threats because of its characteristics of mobility and dynamic nature. Intrusion means any set of action that attempts to compromise the integrity, confidentiality, availability of resources. We are implementing EAACK secure acknowledge based IDS to remove the drawbacks of Watchdog. By using the schemes of EAACK we propose a cooperative, dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific and conventional attacks in MANET. The structural design is organized as a dynamic hierarchy in which data is acquired at the leaves and is incrementally aggregated, reduced, and analyzed as it flows upward toward the root. To maintain communications effectiveness, the hierarchy is automatically reconfigured as desired using clustering techniques in which cluster heads are selected based on topology and other criteria. The usefulness of the architecture is demonstrated via black hole attack scenarios in which attack is detected and removed. Reactive routing protocol is used as it provide better efficiency and hence to reduce the network overhead.

மறுப்பு: இந்த சுருக்கமானது செயற்கை நுண்ணறிவு கருவிகளைப் பயன்படுத்தி மொழிபெயர்க்கப்பட்டது மற்றும் இன்னும் மதிப்பாய்வு செய்யப்படவில்லை அல்லது சரிபார்க்கப்படவில்லை

இந்தக் கட்டுரையைப் பகிரவும்

குறியிடப்பட்டது

arrow_upward arrow_upward