proposing a distributed model for intrusion detection in mobile ad-hoc network using neural fuzzy interface

Authors
abstract

security term in mobile ad hoc networks has several aspects because of the special specification of these networks. in this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy ratiocination of fuzzy system as our architecture engine. our scrutiny showed that fuzzy-neural interface had a good ability for separating normal data from abnormal. the ability of proposed architecture was evaluated in accuracy and overhead case.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

full text

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

full text

Distributed Intrusion Detection Models for Mobile Ad Hoc Networks Distributed Intrusion Detection Models for Mobile Ad Hoc Networks

A mobile ad hoc Network (MANET) is a mobile mesh network in which mobile wireless nodes are both hosts and routers so they can communicate without base stations. Because of this cooperative routing capability, MANETs have envisioned for military and emergency communication, but become more vulnerable to routing attacks than wired networks. If a malicious node propagates forged routing informati...

full text

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

full text

Feature Selection in Mobile Ad-hoc Network Intrusion Detection System

As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people’s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some intrusion detection techniques using machine learning and proposed a profile based neighbor monitorin...

full text

A Fuzzy Realistic Mobility Model for Ad hoc Networks

Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this model is more complete than other mobility models.After simulation, it was found out that not o...

full text

My Resources

Save resource for easier access later


Journal title:
journal of advances in computer research

جلد ۲، شماره ۲، صفحات ۸۵-۹۶

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023