IMPROVED EAACK FOR INTRUSION DETECTION SYSTEM

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EAACK - A Secure Intrusion-Detection System for MANETs

The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not r...

متن کامل

An Elliptic Curve Cryptography Based Enhanced Adaptive Acknowledgment (ecc-eaack) Intrusion Detection System

MANET is a new wireless network technology increasingly used in many applications. These networks are more vulnerable to attacks than wired networks. Since they have different characteristics, conventional security techniques are not directly applicable to them. Intrusion detection system (IDS) is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. Researchers cu...

متن کامل

DH-EAACK Secure Intrusion Detection System to detect Black Hole Attack in MANET

Mobile Ad-Hoc Networks (MANETs) type of Ad-hoc wireless network. Due to mobility of nodes, MANET more vulnerable to different types of attacks and security threats. To overcome these challenges Intrusion Detection System technique used. By using the schemes of EAACK, this paper proposed dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific ...

متن کامل

Improved Single Keyword Pattern Matching Algorithm for Intrusion Detection System

With the spreading of the internet and online procedures requesting a secure channel, it has become an inevitable requirement to provide the network security. It is very clear that firewalls are not enough to secure a network completely because the attacks committed from outside of the network are stopped whereas inside attacks are not. This is the situation where intrusions detection systems (...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2016

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2016.0517006