An Intelligent Intrusion Detection and Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes
暂无分享,去创建一个
[1] Shangguang Wang,et al. Detecting SYN flooding attacks based on traffic prediction , 2012, Secur. Commun. Networks.
[2] Soufiene Djahel,et al. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.
[3] M. Karthikeyan,et al. Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2016, Wirel. Pers. Commun..
[4] Lyes Khoukhi,et al. Flooding attacks detection in MANETs , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
[5] Mahdieh Ghazvini,et al. A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.
[6] Abderrahmane Baadache,et al. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..
[7] ShahabiSina,et al. A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2016 .
[8] Jigyasu Dubey,et al. A Hybrid Approach for Dynamic Intrusion Detection, Enhancement of Performance and Security in MANET , 2016, ICTCS '16.
[9] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[10] Ilango Krishnamurthi,et al. Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..
[11] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[12] Winston Khoon Guan Seah,et al. Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..
[13] Makoto Yokoo,et al. A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks , 2012, Comput. Commun..
[14] Shifei Ding,et al. Mixed and Continuous Strategy Monitor-Forward Game Based Selective Forwarding Solution in WSN , 2015, Int. J. Distributed Sens. Networks.
[15] Abdul Hanan Abdullah,et al. F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs , 2017, J. King Saud Univ. Comput. Inf. Sci..
[16] Daniel Gutiérrez-Reina,et al. Hybrid Flooding Scheme for Mobile Ad Hoc Networks , 2013, IEEE Communications Letters.
[17] Chu-Hsing Lin,et al. Lifetime elongation of ad hoc networks under flooding attack using power-saving technique , 2014, Ad Hoc Networks.
[18] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[19] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[20] Shiyong Zhang,et al. Flooding attack and defence in Ad hoc networks , 2006 .
[21] Hassan Artail,et al. A cluster-based trust-aware routing protocol for mobile ad hoc networks , 2010, Wirel. Networks.
[22] Gang Qu,et al. Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs , 2013, Int. J. Distributed Sens. Networks.
[23] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[24] Jatinder Singh,et al. Analysis of Intrusion Detection Tools for Wireless Local Area Networks , 2009 .
[25] N. Sreenath,et al. Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol , 2016 .
[26] Angelos Stavrou,et al. Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications , 2013, Wirel. Pers. Commun..
[27] M. Rajesh Babu,et al. A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET , 2016, Wirel. Pers. Commun..
[28] Somnuk Puangpronpitag,et al. A novel challenge & response scheme against selective forwarding attacks in MANETs , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[29] Ayyaswamy Kathirvel,et al. A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT , 2015, EURASIP J. Wirel. Commun. Netw..
[30] R. Manimegalai,et al. TRUST BASED ROUTING TO MITIGATE BLACK HOLE ATTACK IN MANET , 2013 .
[31] Michel Barbeau,et al. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs , 2013, J. Netw. Comput. Appl..
[32] Christoforos Ntantogian,et al. Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks , 2017, Comput. Networks.
[33] Haiying Shen,et al. Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks , 2012, IEEE Transactions on Mobile Computing.
[34] B. Paramasivan,et al. Ant based Defense Mechanism for Selective Forwarding Attack in MANET , 2015, 2015 31st IEEE International Conference on Data Engineering Workshops.
[35] Djamel Djenouri,et al. Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .
[36] Myung-Sup Kim,et al. Traffic Flooding Attack Detection on SNMP MIB Using SVM , 2008 .
[37] R Bouallegue,et al. Handoff Management in Green FEMTOCELL Network , 2011 .
[38] Shashi Gurung,et al. A novel approach for mitigating gray hole attack in MANET , 2018, Wirel. Networks.
[39] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[40] Muhamad Rifqi Rifquddin,et al. Performance of AOMDV routing protocol under rushing and flooding attacks in MANET , 2015, 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE).
[41] Arya Megha,et al. Grayhole Attack and Prevention in Mobile Adhoc Network , 2011 .