Cluster Based Cost Efficient Intrusion Detection System For Manet

Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the net...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kumarasamy, Saravanan, B, Hemalatha, P, Hashini
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Kumarasamy, Saravanan
B, Hemalatha
P, Hashini
description Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historical transactions with attack labels. The signature database is used in the signature based IDS schemes. The mobile ad-hoc networks are infrastructure less environment. The intrusion detection applications are placed in a set of nodes under the mobile ad-hoc network environment. The nodes are grouped into clusters. The leader nodes are assigned for the clusters. The leader node is assigned for the intrusion detection process. Leader nodes are used to initiate the intrusion detection process. Resource sharing and lifetime management factors are considered in the leader election process. The system optimizes the leader election and intrusion detection process. The system is designed to handle leader election and intrusion detection process. The clustering scheme is optimized with coverage and traffic level. Cost and resource utilization is controlled under the clusters. Node mobility is managed by the system.
doi_str_mv 10.48550/arxiv.1311.1446
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1311_1446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1311_1446</sourcerecordid><originalsourceid>FETCH-LOGICAL-a656-b7a3feae72c339b3a75724546a157badc500273cbd4b2b1584fb3c6d0025cfb83</originalsourceid><addsrcrecordid>eNotj7FuwjAURb0wVMDeqfIPJI3z_Oww0hRaJKoOZY-eHVuyBAmyTQV_X9J2uldXR1c6jD2KqpQNYvVM8Rq-SwFClEJK9cDW7fGSsov8hZLreTumzDfeBxvckPluyPGSwjjwV5edzVP7ut35E9-OkX_Q4PKCzTwdk1v-55wdtptD-17sP9927XpfkEJVGE3gHTldW4CVAdKoa4lSkUBtqLdYVbUGa3ppaiOwkd6AVf19RetNA3P29Hf7q9CdYzhRvHWTSjepwA-9jEOH</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Cluster Based Cost Efficient Intrusion Detection System For Manet</title><source>arXiv.org</source><creator>Kumarasamy, Saravanan ; B, Hemalatha ; P, Hashini</creator><creatorcontrib>Kumarasamy, Saravanan ; B, Hemalatha ; P, Hashini</creatorcontrib><description>Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historical transactions with attack labels. The signature database is used in the signature based IDS schemes. The mobile ad-hoc networks are infrastructure less environment. The intrusion detection applications are placed in a set of nodes under the mobile ad-hoc network environment. The nodes are grouped into clusters. The leader nodes are assigned for the clusters. The leader node is assigned for the intrusion detection process. Leader nodes are used to initiate the intrusion detection process. Resource sharing and lifetime management factors are considered in the leader election process. The system optimizes the leader election and intrusion detection process. The system is designed to handle leader election and intrusion detection process. The clustering scheme is optimized with coverage and traffic level. Cost and resource utilization is controlled under the clusters. Node mobility is managed by the system.</description><identifier>DOI: 10.48550/arxiv.1311.1446</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Networking and Internet Architecture</subject><creationdate>2013-11</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1311.1446$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1311.1446$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Kumarasamy, Saravanan</creatorcontrib><creatorcontrib>B, Hemalatha</creatorcontrib><creatorcontrib>P, Hashini</creatorcontrib><title>Cluster Based Cost Efficient Intrusion Detection System For Manet</title><description>Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historical transactions with attack labels. The signature database is used in the signature based IDS schemes. The mobile ad-hoc networks are infrastructure less environment. The intrusion detection applications are placed in a set of nodes under the mobile ad-hoc network environment. The nodes are grouped into clusters. The leader nodes are assigned for the clusters. The leader node is assigned for the intrusion detection process. Leader nodes are used to initiate the intrusion detection process. Resource sharing and lifetime management factors are considered in the leader election process. The system optimizes the leader election and intrusion detection process. The system is designed to handle leader election and intrusion detection process. The clustering scheme is optimized with coverage and traffic level. Cost and resource utilization is controlled under the clusters. Node mobility is managed by the system.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Networking and Internet Architecture</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj7FuwjAURb0wVMDeqfIPJI3z_Oww0hRaJKoOZY-eHVuyBAmyTQV_X9J2uldXR1c6jD2KqpQNYvVM8Rq-SwFClEJK9cDW7fGSsov8hZLreTumzDfeBxvckPluyPGSwjjwV5edzVP7ut35E9-OkX_Q4PKCzTwdk1v-55wdtptD-17sP9927XpfkEJVGE3gHTldW4CVAdKoa4lSkUBtqLdYVbUGa3ppaiOwkd6AVf19RetNA3P29Hf7q9CdYzhRvHWTSjepwA-9jEOH</recordid><startdate>20131106</startdate><enddate>20131106</enddate><creator>Kumarasamy, Saravanan</creator><creator>B, Hemalatha</creator><creator>P, Hashini</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20131106</creationdate><title>Cluster Based Cost Efficient Intrusion Detection System For Manet</title><author>Kumarasamy, Saravanan ; B, Hemalatha ; P, Hashini</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a656-b7a3feae72c339b3a75724546a157badc500273cbd4b2b1584fb3c6d0025cfb83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Networking and Internet Architecture</topic><toplevel>online_resources</toplevel><creatorcontrib>Kumarasamy, Saravanan</creatorcontrib><creatorcontrib>B, Hemalatha</creatorcontrib><creatorcontrib>P, Hashini</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kumarasamy, Saravanan</au><au>B, Hemalatha</au><au>P, Hashini</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cluster Based Cost Efficient Intrusion Detection System For Manet</atitle><date>2013-11-06</date><risdate>2013</risdate><abstract>Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historical transactions with attack labels. The signature database is used in the signature based IDS schemes. The mobile ad-hoc networks are infrastructure less environment. The intrusion detection applications are placed in a set of nodes under the mobile ad-hoc network environment. The nodes are grouped into clusters. The leader nodes are assigned for the clusters. The leader node is assigned for the intrusion detection process. Leader nodes are used to initiate the intrusion detection process. Resource sharing and lifetime management factors are considered in the leader election process. The system optimizes the leader election and intrusion detection process. The system is designed to handle leader election and intrusion detection process. The clustering scheme is optimized with coverage and traffic level. Cost and resource utilization is controlled under the clusters. Node mobility is managed by the system.</abstract><doi>10.48550/arxiv.1311.1446</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1311.1446
ispartof
issn
language eng
recordid cdi_arxiv_primary_1311_1446
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Networking and Internet Architecture
title Cluster Based Cost Efficient Intrusion Detection System For Manet
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T09%3A12%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cluster%20Based%20Cost%20Efficient%20Intrusion%20Detection%20System%20For%20Manet&rft.au=Kumarasamy,%20Saravanan&rft.date=2013-11-06&rft_id=info:doi/10.48550/arxiv.1311.1446&rft_dat=%3Carxiv_GOX%3E1311_1446%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true