Improving the efficiency of Monitoring & detecting Intruders in MANET
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 6
Abstract
Rely on mobile ad hoc networks so many intrusion detection techniques projected based on each node reflexively monitoring the data forwarding by its next hop. This paper projected valued evaluations of false positives and their collision on monitoring based intrusion detection for MANETs. Our investigational consequence shows that, even for a plain three-node configuration, an actual MANET suffers from high false positives; these results are validated by Markov and probabilistic models. Nevertheless, this false positive dilemma cannot be practical by simulating the similar network via admired MANET simulators, such as ns-2, OPNET or Glomosim. To cure this, Glomosim simulator proposed a probabilistic noise generator model. With the proposed noise model, the simulator exhibits the cumulative false positive actions comparable to that of the investigational tested. In simple monitoring based scheme where no resultant and more exact models are used, false positives causes the collisions in network performance in two ways, condensed throughput in standard networks with no attackers and helplessness to ease the upshot of attacks in networks with attackers.
Authors and Affiliations
V. Pratima, , J. Ravikumar,
STUDY OF NONLINEAR POLEMETRIC MIXTURE BY S.R. METHOD
Lquid crystals are states of condensed matter whose symmetries lie between crystals and isotropic liquids Thermotropic liquid crystalline phases are exhibited by a large number of organic compounds shows molecu...
E-commerce and the Rural Sector
In the modern times E-commerce is giving a tough competition to the traditional trade and business. Due to the advancement of technology the world has became a global village. E-commerce has reached most of the...
Cloud based Intra-College Communication Information System using Mobile Clients
we have seen over the years that the process of notice boards, important notification about academics has been carried out manually almost across all educational institutions. The process is not only time consuming...
AN OVERVIEW & ANALYSIS COMPARISION OF INTERNET PROTOCAL TCP\IP V/S OSI REFRENCE MODAL
Basically network is a set number of interconnected lines presenting a net, and a network’s roads |an interlinked system, a network of alliances. Today, computer networks are the core of modern communication. A...
Compression Record Based Efficient k - Medoid Algorithm to Increase Scalability and Efficiency
Clustering analysis is a descriptive task that seeks to identify homogeneous groups of objects based on the values of their attri butes. K - medoid clustering algorithms are widely used for many practical applica...