Full Paper View Go Back

A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm

A. Muruganandam1 , M. Natarajan2 , M. Thirunavukkarasu3

Section:Research Paper, Product Type: Journal
Vol.8 , Issue.3 , pp.1-7, Jun-2020

Online published on Jun 30, 2020


Copyright © A. Muruganandam, M. Natarajan, M. Thirunavukkarasu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Muruganandam, M. Natarajan, M. Thirunavukkarasu, “A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm,” International Journal of Scientific Research in Network Security and Communication, Vol.8, Issue.3, pp.1-7, 2020.

MLA Style Citation: A. Muruganandam, M. Natarajan, M. Thirunavukkarasu "A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm." International Journal of Scientific Research in Network Security and Communication 8.3 (2020): 1-7.

APA Style Citation: A. Muruganandam, M. Natarajan, M. Thirunavukkarasu, (2020). A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm. International Journal of Scientific Research in Network Security and Communication, 8(3), 1-7.

BibTex Style Citation:
@article{Muruganandam_2020,
author = {A. Muruganandam, M. Natarajan, M. Thirunavukkarasu},
title = {A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2020},
volume = {8},
Issue = {3},
month = {6},
year = {2020},
issn = {2347-2693},
pages = {1-7},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=391},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=391
TI - A Secured Data against Attacks in Intrusion Detection System with Dynamic Source Routing Protocol Using Counter Measure Selection Algorithm
T2 - International Journal of Scientific Research in Network Security and Communication
AU - A. Muruganandam, M. Natarajan, M. Thirunavukkarasu
PY - 2020
DA - 2020/06/30
PB - IJCSE, Indore, INDIA
SP - 1-7
IS - 3
VL - 8
SN - 2347-2693
ER -

605 Views    315 Downloads    228 Downloads
  
  

Abstract :
In this work has been executed the Intrusion Detection System (IDS) technique dependent on the rule of system, hub, or data misuse location framework that can precisely think about the marks of known assaults and has a low pace of support disappointment alerts. Security is a significant worry in remote innovation, and this street numbers security in the remote portable Adhoc organize by utilizing Novel IDS in the Dynamic Source Routing (DSR) directing convention. We control remote versatile specially appointed system hubs to get refreshes from obscure or undesirable hubs in a similar system by means of directing table. We utilize a novel interruption recognition procedure utilizing steering conventions in MANET. It is a famous, productive, straightforward and secure method for imparting between at least two versatile clients, and we can securely send information, data, updates, and signals starting with one end then onto the next utilizing Novel IDS innovation and by hindering of obscure hubs in MANET. In this investigation work created by utilizing the reproduction device NS2 for playing out our strategy

Key-Words / Index Term :
EAIDC, Counter Measure Selection, DSR, IDS, MANET

References :
[1] Prof. Vidya Bodhe, Ms. Megha F. Lingayat ?Network Intrusion Detection and Counter Measure Selection in Wireless Sensor Network? ISSN 2321 3361 ? 2016 IJESC.
[2] Meenakshi Patel, Sanjay Sharma, Divya Sharan, ?Detection and Prevention of Flooding Attack? 2015.
[3] V. D. Park, and M. S. Corson ?A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks?, Proc. INFOCOM ?97, April 1997.
[4] Alokparna Bandyopadhyay1, Satyanarayana Vuppala2, ?A Simulation Analysis of Flooding Attack in MANET usingNS-3? , IEEE 2011.
[5] Meenakshi Patel, Sanjay Sharma, ?Detection of Malicious Attack in MANET A Behavioral Approach?, IEEE 2012.
[6] Prasenjit Choudhury, Subrata Nandi, Anita Pal, Narayan .C. Debnath, ?Mitigating Route Request Flooding Attack inMANET using Node Reputation?, IEEE 2012.
[7] S.Sanyal, A.Abraham, D.Gada, R.Gorgi, P.Rathore, Z.Dedhia, and N. Moody, ?Security scheme for distributed DOS in mobile ad hoc networks?, 6th International Workshop on Distributed Computing (IWDC?040), vol. 3326, LNCS, Springere , 2004 , pp.541.
[8] Nabil Ali Alrajeh, S. Khan, Bilal Shams, ?Intrusion Detection Systems in Wireless Sensor Networks: A Review?, 2013, International Journal of Distributed Sensor Networks (Saga Journal) May 2013.
[9] S.Kanan, T.Kaliakikumaran, S. Karthik and V.PArunachalam, ?A Review on Attack Prevention Method in MANET? Journal of Modern Mathematics and Statistics Year 2011/Volume :5 /Issues : 1 /Page no. 37-42.
[10] Framework for Intrusion Detection in IEEE 802.11Wireless Mesh Networks, Shafiullah Khan1, 2, Kok-KeongLoo1, and Zia Ud Din3,1School of Engineering and Design, Brunel University, UK.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation