Full Paper View Go Back
A. Muruganandam1 , M. Natarajan2 , M. Thirunavukkarasu3
Section:Research Paper, Product Type: Journal
Vol.8 ,
Issue.3 , pp.1-7, Jun-2020
Online published on Jun 30, 2020
Copyright © A. Muruganandam, M. Natarajan, M. Thirunavukkarasu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: A. Muruganandam, M. Natarajan, M. Thirunavukkarasu, “A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm,” International Journal of Scientific Research in Network Security and Communication, Vol.8, Issue.3, pp.1-7, 2020.
MLA Style Citation: A. Muruganandam, M. Natarajan, M. Thirunavukkarasu "A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm." International Journal of Scientific Research in Network Security and Communication 8.3 (2020): 1-7.
APA Style Citation: A. Muruganandam, M. Natarajan, M. Thirunavukkarasu, (2020). A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm. International Journal of Scientific Research in Network Security and Communication, 8(3), 1-7.
BibTex Style Citation:
@article{Muruganandam_2020,
author = {A. Muruganandam, M. Natarajan, M. Thirunavukkarasu},
title = {A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2020},
volume = {8},
Issue = {3},
month = {6},
year = {2020},
issn = {2347-2693},
pages = {1-7},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=391},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=391
TI - A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm
T2 - International Journal of Scientific Research in Network Security and Communication
AU - A. Muruganandam, M. Natarajan, M. Thirunavukkarasu
PY - 2020
DA - 2020/06/30
PB - IJCSE, Indore, INDIA
SP - 1-7
IS - 3
VL - 8
SN - 2347-2693
ER -
Abstract :
In this work has been executed the Intrusion Detection System (IDS) technique dependent on the rule of system, hub, or data misuse location framework that can precisely think about the marks of known assaults and has a low pace of support disappointment alerts. Security is a significant worry in remote innovation, and this street numbers security in the remote portable Adhoc organize by utilizing Novel IDS in the Dynamic Source Routing (DSR) directing convention. We control remote versatile specially appointed system hubs to get refreshes from obscure or undesirable hubs in a similar system by means of directing table. We utilize a novel interruption recognition procedure utilizing steering conventions in MANET. It is a famous, productive, straightforward and secure method for imparting between at least two versatile clients, and we can securely send information, data, updates, and signals starting with one end then onto the next utilizing Novel IDS innovation and by hindering of obscure hubs in MANET. In this investigation work created by utilizing the reproduction device NS2 for playing out our strategy
Key-Words / Index Term :
EAIDC, Counter Measure Selection, DSR, IDS, MANET
References :
[1] Prof. Vidya Bodhe, Ms. Megha F. Lingayat ?Network Intrusion Detection and Counter Measure Selection in Wireless Sensor Network? ISSN 2321 3361 ? 2016 IJESC.
[2] Meenakshi Patel, Sanjay Sharma, Divya Sharan, ?Detection and Prevention of Flooding Attack? 2015.
[3] V. D. Park, and M. S. Corson ?A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks?, Proc. INFOCOM ?97, April 1997.
[4] Alokparna Bandyopadhyay1, Satyanarayana Vuppala2, ?A Simulation Analysis of Flooding Attack in MANET usingNS-3? , IEEE 2011.
[5] Meenakshi Patel, Sanjay Sharma, ?Detection of Malicious Attack in MANET A Behavioral Approach?, IEEE 2012.
[6] Prasenjit Choudhury, Subrata Nandi, Anita Pal, Narayan .C. Debnath, ?Mitigating Route Request Flooding Attack inMANET using Node Reputation?, IEEE 2012.
[7] S.Sanyal, A.Abraham, D.Gada, R.Gorgi, P.Rathore, Z.Dedhia, and N. Moody, ?Security scheme for distributed DOS in mobile ad hoc networks?, 6th International Workshop on Distributed Computing (IWDC?040), vol. 3326, LNCS, Springere , 2004 , pp.541.
[8] Nabil Ali Alrajeh, S. Khan, Bilal Shams, ?Intrusion Detection Systems in Wireless Sensor Networks: A Review?, 2013, International Journal of Distributed Sensor Networks (Saga Journal) May 2013.
[9] S.Kanan, T.Kaliakikumaran, S. Karthik and V.PArunachalam, ?A Review on Attack Prevention Method in MANET? Journal of Modern Mathematics and Statistics Year 2011/Volume :5 /Issues : 1 /Page no. 37-42.
[10] Framework for Intrusion Detection in IEEE 802.11Wireless Mesh Networks, Shafiullah Khan1, 2, Kok-KeongLoo1, and Zia Ud Din3,1School of Engineering and Design, Brunel University, UK.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.