Abstract. In this paper, an anomaly detection method in cluster-based mo-bile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used for combining one-class support vector machine (OCSVM), mixture of Gaussians (MoG), and self-organizing maps (SOM) one-class classifiers and the combined model is utilized to par-tially detect the attacks in cluster members. The votes of cluster members are periodically transmitted to the cluster head and final decision on attack detec-tion i...
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there ...
The evolution of wireless network technologies andthe recent advances in mobile computing hardware h...
4Traffic monitoring and anomaly detection are essential activities for computer network management, ...
Abstract:- Security of Wireless Ad hoc network has a primary concern to provide protected communicat...
Abstract:- A Mobile ad hoc network (MANET) is a continuously self configuring infrastructure-less ne...
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without a...
Intrusion Detection System (IDS) provides additional security for the most vulnerable Mobile Adhoc N...
Anomaly detection in mobile ad hoc network (MANET) is a relatively new area of research. The lack of...
This thesis presents a research whose objective is to design an intrusion detection model for Mobile...
Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of hav...
In MANET resources are trivial with a controlled environment with extreme mobility and do not have a...
With the popularity of the Internet, more and more businesses and transactions rely on the network t...
Abstract: Mobile ad hoc network does not have traffic concentration points such as gateway or access...
Fuzzy C-means (FCM) clustering has been used to distinguish communication network traffic outliers b...
Copyright © 2014 Hisham Mustafa. This is an open access article distributed under the Creative Commo...
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there ...
The evolution of wireless network technologies andthe recent advances in mobile computing hardware h...
4Traffic monitoring and anomaly detection are essential activities for computer network management, ...
Abstract:- Security of Wireless Ad hoc network has a primary concern to provide protected communicat...
Abstract:- A Mobile ad hoc network (MANET) is a continuously self configuring infrastructure-less ne...
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without a...
Intrusion Detection System (IDS) provides additional security for the most vulnerable Mobile Adhoc N...
Anomaly detection in mobile ad hoc network (MANET) is a relatively new area of research. The lack of...
This thesis presents a research whose objective is to design an intrusion detection model for Mobile...
Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of hav...
In MANET resources are trivial with a controlled environment with extreme mobility and do not have a...
With the popularity of the Internet, more and more businesses and transactions rely on the network t...
Abstract: Mobile ad hoc network does not have traffic concentration points such as gateway or access...
Fuzzy C-means (FCM) clustering has been used to distinguish communication network traffic outliers b...
Copyright © 2014 Hisham Mustafa. This is an open access article distributed under the Creative Commo...
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there ...
The evolution of wireless network technologies andthe recent advances in mobile computing hardware h...
4Traffic monitoring and anomaly detection are essential activities for computer network management, ...