An Emerging Anomaly Detection Technique to Diminish the Routing Misbehavior in Mobile Ad hoc Network (MANET)
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 7
Abstract
Mobile ad hoc network does not have traffic concentration points such as gateway or access points which perform behavior monitoring of individual nodes. Therefore, maintaining the network function for normal nodes when other nodes do not route and forward correctly is a big challenge. This paper, address the behavior based anomaly detection technique inspired by the biological immune system to enhance the performance of MANET to operate despite the presence of misbehaving nodes. Due to its reliance on overhearing, the existing watchdog technique may fail to detect misbehavior or raise false alarms in the presence of ambiguous collisions, receiver collisions, and limited transmission power. In this present scheme uses intelligent machine learning techniques that learns and detects each node by false alarm and negative selection approach.
A Study of Carbimazole Treatment in Hyperthyroidism Comparsion with Radioiodine
ABSTRACT: Background and Objective: Hyperthyroidism is a common clinical disorder all over world. Even though diagnosis in hyperthyroidism is generally straight forward, its prevalence varies among population. Although...
Didactic Transposition of the Alternative Knowledge of the Brazilian Telenovela “O Clone” to Knowledge Taught
The aim of this study was to demonstrate how scientific knowledge found in different themes in an entertainment movie can be transposed into teachable knowledge and used as a didactic edutainment tool for developing infe...
Equivalence of the 3 Methods of Estimating Bad Debts
When first learned, the three (3) methods of estimating bad debts appear distinct from one another. But upon closer examination, all three methods actually exhibit a common attribute that is at the same time unique for...
Fault Tolerance in Parallel System Using Multiple Stacks
Abstract: The project describes a technique to tolerate faults in large data structures hosted on distributed servers, based on the concept of fused backups. The prevalent solution to this problem is replication. To tole...
Security Measures in SCADA Systems
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been widely investigated, and many security mechanisms have been proposed from research communities. The inter...