mhidca: multi level hybrid intrusion detection and continuous authentication for manet security
نویسندگان
چکیده
mobile ad-hoc networks have attracted a great deal of attentions over the past few years. considering their applications, the security issue has a great significance in them. security scheme utilization that includes prevention and detection has the worth of consideration. in this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authenticates using biosensors. optimizing authentication and intrusion detection combination, we formulate the problem as a partially observable distributed stochastic system. in order to reduce the computation time, the parallel forward algorithm of hidden markov model has been used. due to the possibility of misdetection of the sensor and in order to increase the accuracy of observations, more than one sensor is selected in every step, the observations obtained from the sensors are combined for more accurate identification, and the system decides about the security status based on combined observations of the sensors. bayesian theory has been used in sensors evidence fusion brought by increased accuracy and network security, which will be observed in the simulations. the use of this theory causes the increase of accuracy and security on networks.
منابع مشابه
MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملHybrid Multi-level Intrusion Detection System
Intrusion detection is a critical process in network security. Nowadays new intelligent techniques have been used to improve the intrusion detection process. This paper proposes a hybrid intelligent intrusion detection system to improve the detection rate for known and unknown attacks. We examined different neural network & decision tree techniques. The proposed model consists of multi-level ba...
متن کاملHigh Security for Manet Using Authentication and Intrusion Detection with Data Fusion
In Mobile Ad Hoc Network (MANET), Multimodal Biometric technology plays a vital role in giving security between user-to-device authentications. This paper concentrates on the Intrusion Detection and authentication with data fusion in MANET. To overcome the fault in unimodal biometric systems, Multimodal biometrics is set out to work with Intrusion Detection Systems. Each and every device has di...
متن کاملAn Adaptive Hybrid Multi-level Intelligent Intrusion Detection System for Network Security
Intrusion Detection System (IDS) plays a vital factor in providing security to the networks through detecting malicious activities. Due to the extensive advancements in the computer networking, IDS has become an active area of research to determine various types of attacks in the networks. A large number of intrusion detection approaches are available in the literature using several traditional...
متن کاملMLH-IDS: A Multi-Level Hybrid Intrusion Detection Method
With the growth of networked computers and associated applications, intrusion detection has become essential to keeping networks secure. A number of intrusion detection methods have been developed for protecting computers and networks using conventional statistical methods as well as data mining methods. Data mining methods for misuse and anomaly-based intrusion detection, usually encompass sup...
متن کاملOntology for MANET Intrusion Detection
At present, the security issues on MANET have become one of the primary concerns. The MANET is more vulnerable to attacks as compared to wired networks due to distributed nature and lacks of infrastructure. Those vulnerabilities are nature of the MANET structure that cannot be removed easily. As a result, attacks with malicious intent have been and will be devised to exploit those vulnerabiliti...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
journal of computer and roboticsجلد ۹، شماره ۱، صفحات ۱-۱۱
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023