Fuzzy Based Intrusion Detection Systems in MANET
نویسندگان
چکیده
منابع مشابه
Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کاملA Review on Intrusion Detection Systems in MANET
Applications of Mobile Ad Hoc Networks (MANET) are increasing rapidly. However, MANET is susceptible to attacks due to its mobile nature. The security issue is becoming a major concern and constriction in the applications of MANET; therefore, selection of intrusion detection methods is especially important for MANET applications. This paper aims to pioneer and to assort current techniques of In...
متن کاملOntology for MANET Intrusion Detection
At present, the security issues on MANET have become one of the primary concerns. The MANET is more vulnerable to attacks as compared to wired networks due to distributed nature and lacks of infrastructure. Those vulnerabilities are nature of the MANET structure that cannot be removed easily. As a result, attacks with malicious intent have been and will be devised to exploit those vulnerabiliti...
متن کاملIntrusion Detection Algorithm for MANET
Mobile ad hoc networks (MANET) present the opportunity to connect transient nodes to the internet without having central control. This very design supports new nodes to join and leave the network based on their proximity to the MANET. Concurrently, it creates many security challenges for authenticating nodes that are not present in a traditional wired network. Much of the existing work on MANET...
متن کاملA Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET
In recent years, mobile ad hoc networks (MANET) have become an interesting research area. This type of networks have a salient characteristics compare with wired networks which are more vulnerable. Nowadays, for the network security, defend in depth strategies are used. One of them is intrusion detection system (IDS). Many intrusion detection techniques developed for weird networks however, bec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2015
ISSN: 1877-0509
DOI: 10.1016/j.procs.2015.04.071