Risk-Aware Response Mechanism with Extended D-S theory
نویسنده
چکیده
Mobile Ad hoc Networks (MANET) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because its changing the whole topology itself and it causes more damage to MANET. Even there are lot of intrusion detection Systems available to diminish those critical attacks, existing causesunexpected network partition, and causes additional damages to the infrastructure of the network , and it leads to uncertainty in finding routing attacks in MANET. In this paper, we propose a adaptive risk-aware response mechanism with extended Dempster-Shafer theory in MANET to identify the routing attacks and malicious node. Our techniques find the malicious node with degree of evidence from the expert knowledge and detect the important factors for each node.It creates black list and all those malicious nodes so that it may not enter the network again
منابع مشابه
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mitigation with Distributed Node Control
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...
متن کاملA Kind of Context-aware Computing Approach for Proactive Service
We focus on modeling and computing of aware context with uncertainty for making dynamic decision during seamless mobile service. We re-examine formalism of random set, which is not finite-set statistics (FISST), argue the limitations of the direct numerical approaches, give new modeling mode based on random sets theory (RST) for aware context, and propose our computing approach of modeled aware...
متن کاملMinimizing Routing Attacks in MANET Using Extended Dempster-Shefer Theory
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...
متن کاملTheoretical Investigation of the Reaction Mechanism for a Type of N-heterocyclic Compound Involving Mono-N-aryl-3-aminodihydropyrrol
The kinetics of reaction between 4-methylaniline (1), dimethyl acetylenedicarboxylate (2) and formaldehyde (4) has been theoretically investigated to gain further insight into the reaction mechanism. The results of theoretical calculations were achieved using the ab initio method at the HF/6-311g (d, p) level of theory in gas phase. The mechanism of this reaction had 5 steps. Theoretical kineti...
متن کاملRisk-Aware Mitigation
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to ...
متن کامل