Improving the efficiency of Monitoring & detecting Intruders in MANET  

Abstract

Rely on mobile ad hoc networks so many intrusion detection techniques projected based on each node reflexively monitoring the data forwarding by its next hop. This paper projected valued evaluations of false positives and their collision on monitoring based intrusion detection for MANETs. Our investigational consequence shows that, even for a plain three-node configuration, an actual MANET suffers from high false positives; these results are validated by Markov and probabilistic models. Nevertheless, this false positive dilemma cannot be practical by simulating the similar network via admired MANET simulators, such as ns-2, OPNET or Glomosim. To cure this, Glomosim simulator proposed a probabilistic noise generator model. With the proposed noise model, the simulator exhibits the cumulative false positive actions comparable to that of the investigational tested. In simple monitoring based scheme where no resultant and more exact models are used, false positives causes the collisions in network performance in two ways, condensed throughput in standard networks with no attackers and helplessness to ease the upshot of attacks in networks with attackers. 

Authors and Affiliations

V. Pratima, , J. Ravikumar,

Keywords

Related Articles

E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures 

The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers using various gimmicks and techniques to find various loopholes in the system. While there has been good ways to id...

Topology ascendancy in mobile ad hoc networks with accommodating connections 

Supportive communication has conventional tremendous attention for wireless networks. Most existing works on supportive infrastructure are focused on link-level corporeal layer issues. Consequently, the impacts of suppor...

Biometrics using Electronic Voting System with Embedded Security

Abstract-An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are two types of e-voting: On-Line and Offline. On-l...

QARS for Self Reconfiguration Mechanism in Wireless Mesh Networks 

Wireless mesh networks (WMNs) are being developed actively and deployed widely for a variety of applications. Wireless Mesh Network (WMN) is a communication network made up of radio nodes organized in a mesh topo...

Desktop virtualization using SaaS Architecture  

Desktop virtualization is new desktop delivery method in which desktop operating system instance customized, build and runs in data centers and users can access application or the whole desktop by using their sta...

Download PDF file
  • EP ID EP130960
  • DOI -
  • Views 75
  • Downloads 0

How To Cite

V. Pratima, , J. Ravikumar, (2012). Improving the efficiency of Monitoring & detecting Intruders in MANET  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(6), 197-203. https://europub.co.uk./articles/-A-130960