Improving the efficiency of Monitoring & detecting Intruders in MANET
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 6
Abstract
Rely on mobile ad hoc networks so many intrusion detection techniques projected based on each node reflexively monitoring the data forwarding by its next hop. This paper projected valued evaluations of false positives and their collision on monitoring based intrusion detection for MANETs. Our investigational consequence shows that, even for a plain three-node configuration, an actual MANET suffers from high false positives; these results are validated by Markov and probabilistic models. Nevertheless, this false positive dilemma cannot be practical by simulating the similar network via admired MANET simulators, such as ns-2, OPNET or Glomosim. To cure this, Glomosim simulator proposed a probabilistic noise generator model. With the proposed noise model, the simulator exhibits the cumulative false positive actions comparable to that of the investigational tested. In simple monitoring based scheme where no resultant and more exact models are used, false positives causes the collisions in network performance in two ways, condensed throughput in standard networks with no attackers and helplessness to ease the upshot of attacks in networks with attackers.
Authors and Affiliations
V. Pratima, , J. Ravikumar,
Thermal nondestructive testing and spice simulation with approach of electro-thermal modelling
Non-destructive testing (NDT) refers to all the test methods, which permit testing or inspection of object without impairing its future usefulness. The aim of NDT is the detection of damages or unwanted irregularities...
Branch and Bound Technique To Two Stage Flow Shop Scheduling Problem In Which Setup Time is Separated From Processing Time And Both Are Associated With Probabilities
This paper presents an algorithm with the help of branch and bound approach for a flow shop scheduling problems consisting of n jobs to be processed on 2 machines in which setup time is separated from processing t...
Intrusion Alert Elimination on Network Attack Alerting System
Network attack alerting system becomes a critical technology to help and assist security engineers and network administrators to secure their network infrastructure. The proposed system implements network attack alerting...
“AUTO MONITORING OF APPLIANCES BY INTERNET”
Under the heading it is abbreviated as ―Networked home appliance system using Bluetooth technology integrating appliance control/monitoring with Internet service‖ Here the monitoring and controlling of home appliance...
A Survey on Energy-Efficient protocol for Wireless Sensor Networks
Wireless Sensor Network has become one of the hot topics now a days although; it has been already applied in the use of many different areas. Such as the Home Automation, it is very common to find its use on the...