A DYNAMIC APPROACH FOR IMPROVING PERFORMANCE OF INTRUSION DETECTION SYSTEM OVER MANET
暂无分享,去创建一个
[1] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[2] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[3] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[4] Saurabh Mukherjee,et al. Layered approach for intrusion detection using naïve Bayes classifier , 2012, ICACCI '12.
[5] Mehdi Kargar,et al. T ruthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes , 2009 .
[6] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[7] Joohan Lee,et al. A dynamic data mining technique for intrusion detection systems , 2005, ACM Southeast Regional Conference.
[8] Guanhua Yan,et al. Towards a bayesian network game framework for evaluating DDoS attacks and defense , 2012, CCS '12.
[9] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[10] Yasushi Wakahara,et al. Proposal of a method to detect black hole attack in MANET , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[11] Irshad Ullah,et al. Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .
[12] Poonam Pahuja,et al. ROUTING MANAGEMENT FOR MOBILE AD-HOC NETWORKS , 2013 .
[13] Kavé Salamatian,et al. Anomaly extraction in backbone networks using association rules , 2009, IMC '09.
[14] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[15] Yuh-Jye Lee,et al. A three-tier IDS via data mining approach , 2007, MineNet '07.
[16] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[17] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[18] Vera Marinova-Boncheva. Applying a data mining method for intrusion detection , 2007, CompSysTech '07.
[19] B. B. Meshram,et al. Intrusion prevention systems: data mining approach , 2010, ICWET.
[20] Zunping Cheng,et al. Statistical attack detection , 2009, RecSys '09.
[21] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[22] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[23] Ignas G. Niemegeers,et al. Research Issues in Ad-Hoc Distributed Personal Networking , 2003, Wirel. Pers. Commun..
[24] M. Hemalatha,et al. An evaluation of clustering technique over intrusion detection system , 2012, ICACCI '12.
[25] Sajal K. Das,et al. Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.
[26] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[27] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[28] G S Mamatha,et al. Analyzing The Manet Variations, Challenges, Capacity And Protocal Issues , 2010 .
[29] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[30] Chris J. Mitchell,et al. Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.
[31] Aishwarya Nandakumar,et al. Wireless intrusion detection based on different clustering approaches , 2010, A2CWiC '10.
[32] M. Wahengbam,et al. Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.
[33] Prodipto Das,et al. Security Measures for Black Hole Attack in MANET: An Approach , 2012, ArXiv.
[34] Masoud Sabaei,et al. An efficient reputation-based mechanism to enforce cooperation in MANETs , 2009, 2009 International Conference on Application of Information and Communication Technologies.
[35] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[36] Indu Singh,et al. An Improved Inverted table Approach to Detect Selfish Node In Mobile Ad Hoc Network , 2012 .
[37] Syeda Gauhar Fatima,et al. ENERGY EFFICIENT INTRUSION DETECTION SYSTEM FOR WSN , 2012 .
[38] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[39] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[40] Xiaoyan Hong,et al. A new set of passive routing attacks in mobile ad hoc networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..