http://www.ijrcct.org/index.php/ojs/article/download/170/137
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
Mobile ad hoc networks offer excellent perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, MANET presents serious vulnerabilities to security attacks. In this paper, I propose an intrusion detection scheme based on extended finite state machines. I provide formal specification of the correct behavior of the routing protocol and by the means of a backward checking algorithm, detect run-time violations of the implementation. I chose the standard proactive routing protocol OLSR as a case study and show that my approach allows detecting several kinds of attacks as well as conformance anomalies.
Authors and Affiliations
Umesh Prasad Rout
FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL
In this paper investigate the problem of discovering the set of troublesome rules in a large firewall policy and consequently eliminating or resolving them. all the rules in the policy are consistent and can be reord...
Resource Provisioning Techniques in Cloud Computing Environment: A Survey
Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, applications and services) that can be rapidly provisioned a...
Slicing :A Proficient Scheme For Sustain And Publicize
The Privacy Preserving on a microdata publishing different anonymization techniques nameing as generalization and bucketization have been proposes. In generalization amount of information loses on high dimensional da...
Security Enhancement in Mobile Ad hoc Networks using Non-zero Non-cooperative Game Theory
Mobile Ad hoc Network (MANET) is a multi hop infrastructure less wireless networks which offers unrestricted mobility. As wireless ad-hoc networks lack a centralized infrastructure, they are exposed to a lot of attac...
Comparison of Existing Dictionary Based Data Compression Methods for English and Gujarati Text
Data compression is a common requirement for most of the computerized applications. There are number of data compression algorithms, which are dedicated to compress different data formats. Even for a single data type...