IMPROVED EAACK FOR INTRUSION DETECTION SYSTEM
نویسندگان
چکیده
منابع مشابه
EAACK - A Secure Intrusion-Detection System for MANETs
The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not r...
متن کاملPerformance Enhancement of Intrusion Detection System Using Advance Adaptive EAACK for MANETs
متن کامل
An Elliptic Curve Cryptography Based Enhanced Adaptive Acknowledgment (ecc-eaack) Intrusion Detection System
MANET is a new wireless network technology increasingly used in many applications. These networks are more vulnerable to attacks than wired networks. Since they have different characteristics, conventional security techniques are not directly applicable to them. Intrusion detection system (IDS) is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. Researchers cu...
متن کاملDH-EAACK Secure Intrusion Detection System to detect Black Hole Attack in MANET
Mobile Ad-Hoc Networks (MANETs) type of Ad-hoc wireless network. Due to mobility of nodes, MANET more vulnerable to different types of attacks and security threats. To overcome these challenges Intrusion Detection System technique used. By using the schemes of EAACK, this paper proposed dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific ...
متن کاملImproved Single Keyword Pattern Matching Algorithm for Intrusion Detection System
With the spreading of the internet and online procedures requesting a secure channel, it has become an inevitable requirement to provide the network security. It is very clear that firewalls are not enough to secure a network completely because the attacks committed from outside of the network are stopped whereas inside attacks are not. This is the situation where intrusions detection systems (...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2016
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2016.0517006