Cluster Based Cost Efficient Intrusion Detection System For Manet
Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the net...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Kumarasamy, Saravanan B, Hemalatha P, Hashini |
description | Mobile ad-hoc networks are temporary wireless networks. Network resources are
abnormally consumed by intruders. Anomaly and signature based techniques are
used for intrusion detection. Classification techniques are used in anomaly
based techniques. Intrusion detection techniques are used for the network
attack detection process. Two types of intrusion detection systems are
available. They are anomaly detection and signature based detection model. The
anomaly detection model uses the historical transactions with attack labels.
The signature database is used in the signature based IDS schemes.
The mobile ad-hoc networks are infrastructure less environment. The intrusion
detection applications are placed in a set of nodes under the mobile ad-hoc
network environment. The nodes are grouped into clusters. The leader nodes are
assigned for the clusters. The leader node is assigned for the intrusion
detection process. Leader nodes are used to initiate the intrusion detection
process. Resource sharing and lifetime management factors are considered in the
leader election process. The system optimizes the leader election and intrusion
detection process.
The system is designed to handle leader election and intrusion detection
process. The clustering scheme is optimized with coverage and traffic level.
Cost and resource utilization is controlled under the clusters. Node mobility
is managed by the system. |
doi_str_mv | 10.48550/arxiv.1311.1446 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1311_1446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1311_1446</sourcerecordid><originalsourceid>FETCH-LOGICAL-a656-b7a3feae72c339b3a75724546a157badc500273cbd4b2b1584fb3c6d0025cfb83</originalsourceid><addsrcrecordid>eNotj7FuwjAURb0wVMDeqfIPJI3z_Oww0hRaJKoOZY-eHVuyBAmyTQV_X9J2uldXR1c6jD2KqpQNYvVM8Rq-SwFClEJK9cDW7fGSsov8hZLreTumzDfeBxvckPluyPGSwjjwV5edzVP7ut35E9-OkX_Q4PKCzTwdk1v-55wdtptD-17sP9927XpfkEJVGE3gHTldW4CVAdKoa4lSkUBtqLdYVbUGa3ppaiOwkd6AVf19RetNA3P29Hf7q9CdYzhRvHWTSjepwA-9jEOH</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Cluster Based Cost Efficient Intrusion Detection System For Manet</title><source>arXiv.org</source><creator>Kumarasamy, Saravanan ; B, Hemalatha ; P, Hashini</creator><creatorcontrib>Kumarasamy, Saravanan ; B, Hemalatha ; P, Hashini</creatorcontrib><description>Mobile ad-hoc networks are temporary wireless networks. Network resources are
abnormally consumed by intruders. Anomaly and signature based techniques are
used for intrusion detection. Classification techniques are used in anomaly
based techniques. Intrusion detection techniques are used for the network
attack detection process. Two types of intrusion detection systems are
available. They are anomaly detection and signature based detection model. The
anomaly detection model uses the historical transactions with attack labels.
The signature database is used in the signature based IDS schemes.
The mobile ad-hoc networks are infrastructure less environment. The intrusion
detection applications are placed in a set of nodes under the mobile ad-hoc
network environment. The nodes are grouped into clusters. The leader nodes are
assigned for the clusters. The leader node is assigned for the intrusion
detection process. Leader nodes are used to initiate the intrusion detection
process. Resource sharing and lifetime management factors are considered in the
leader election process. The system optimizes the leader election and intrusion
detection process.
The system is designed to handle leader election and intrusion detection
process. The clustering scheme is optimized with coverage and traffic level.
Cost and resource utilization is controlled under the clusters. Node mobility
is managed by the system.</description><identifier>DOI: 10.48550/arxiv.1311.1446</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Networking and Internet Architecture</subject><creationdate>2013-11</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1311.1446$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1311.1446$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Kumarasamy, Saravanan</creatorcontrib><creatorcontrib>B, Hemalatha</creatorcontrib><creatorcontrib>P, Hashini</creatorcontrib><title>Cluster Based Cost Efficient Intrusion Detection System For Manet</title><description>Mobile ad-hoc networks are temporary wireless networks. Network resources are
abnormally consumed by intruders. Anomaly and signature based techniques are
used for intrusion detection. Classification techniques are used in anomaly
based techniques. Intrusion detection techniques are used for the network
attack detection process. Two types of intrusion detection systems are
available. They are anomaly detection and signature based detection model. The
anomaly detection model uses the historical transactions with attack labels.
The signature database is used in the signature based IDS schemes.
The mobile ad-hoc networks are infrastructure less environment. The intrusion
detection applications are placed in a set of nodes under the mobile ad-hoc
network environment. The nodes are grouped into clusters. The leader nodes are
assigned for the clusters. The leader node is assigned for the intrusion
detection process. Leader nodes are used to initiate the intrusion detection
process. Resource sharing and lifetime management factors are considered in the
leader election process. The system optimizes the leader election and intrusion
detection process.
The system is designed to handle leader election and intrusion detection
process. The clustering scheme is optimized with coverage and traffic level.
Cost and resource utilization is controlled under the clusters. Node mobility
is managed by the system.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Networking and Internet Architecture</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj7FuwjAURb0wVMDeqfIPJI3z_Oww0hRaJKoOZY-eHVuyBAmyTQV_X9J2uldXR1c6jD2KqpQNYvVM8Rq-SwFClEJK9cDW7fGSsov8hZLreTumzDfeBxvckPluyPGSwjjwV5edzVP7ut35E9-OkX_Q4PKCzTwdk1v-55wdtptD-17sP9927XpfkEJVGE3gHTldW4CVAdKoa4lSkUBtqLdYVbUGa3ppaiOwkd6AVf19RetNA3P29Hf7q9CdYzhRvHWTSjepwA-9jEOH</recordid><startdate>20131106</startdate><enddate>20131106</enddate><creator>Kumarasamy, Saravanan</creator><creator>B, Hemalatha</creator><creator>P, Hashini</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20131106</creationdate><title>Cluster Based Cost Efficient Intrusion Detection System For Manet</title><author>Kumarasamy, Saravanan ; B, Hemalatha ; P, Hashini</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a656-b7a3feae72c339b3a75724546a157badc500273cbd4b2b1584fb3c6d0025cfb83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Networking and Internet Architecture</topic><toplevel>online_resources</toplevel><creatorcontrib>Kumarasamy, Saravanan</creatorcontrib><creatorcontrib>B, Hemalatha</creatorcontrib><creatorcontrib>P, Hashini</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kumarasamy, Saravanan</au><au>B, Hemalatha</au><au>P, Hashini</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cluster Based Cost Efficient Intrusion Detection System For Manet</atitle><date>2013-11-06</date><risdate>2013</risdate><abstract>Mobile ad-hoc networks are temporary wireless networks. Network resources are
abnormally consumed by intruders. Anomaly and signature based techniques are
used for intrusion detection. Classification techniques are used in anomaly
based techniques. Intrusion detection techniques are used for the network
attack detection process. Two types of intrusion detection systems are
available. They are anomaly detection and signature based detection model. The
anomaly detection model uses the historical transactions with attack labels.
The signature database is used in the signature based IDS schemes.
The mobile ad-hoc networks are infrastructure less environment. The intrusion
detection applications are placed in a set of nodes under the mobile ad-hoc
network environment. The nodes are grouped into clusters. The leader nodes are
assigned for the clusters. The leader node is assigned for the intrusion
detection process. Leader nodes are used to initiate the intrusion detection
process. Resource sharing and lifetime management factors are considered in the
leader election process. The system optimizes the leader election and intrusion
detection process.
The system is designed to handle leader election and intrusion detection
process. The clustering scheme is optimized with coverage and traffic level.
Cost and resource utilization is controlled under the clusters. Node mobility
is managed by the system.</abstract><doi>10.48550/arxiv.1311.1446</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.1311.1446 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_1311_1446 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security Computer Science - Networking and Internet Architecture |
title | Cluster Based Cost Efficient Intrusion Detection System For Manet |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T09%3A12%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cluster%20Based%20Cost%20Efficient%20Intrusion%20Detection%20System%20For%20Manet&rft.au=Kumarasamy,%20Saravanan&rft.date=2013-11-06&rft_id=info:doi/10.48550/arxiv.1311.1446&rft_dat=%3Carxiv_GOX%3E1311_1446%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |