Mobile ad-hoc networks (MANETs) are susceptible to security attacks due to their limited resources and the wireless medium they operate in. These attacks range from snooping to passive eavesdropping to active interference and DOS attacks. Every node should be equipped to deal with all kinds of attacks since there is no central security mechanism. Hence there should be a mechanism for intrusion detection along with trust establishment and secured routing. In this thesis we propose a hierarchical intrusion detection system based on Bayesian networks. Our work builds on the trust model proposed in [1] to establish trust between peers in the network. To detect an intrusion, a subset of nodes is selected for detecting an intrusion. The detecting...
Everyday reports reveal numerous cyber security incidents, while many more are never uncovered due t...
Mobile Ad-hoc networks extend communications beyond the limit of infrastructure based networks. Futu...
Simplifying network security data to the point that it is readily accessible and usable by a wider a...
This thesis proposes a trust based security model suitable for content-basedrouting in Ad-hoc networ...
An Ad hoc wireless network has no infrastructure. It is formed dynamically by a group of moving node...
The purpose of this research is to find out how security affects the performance of an ad-hoc routin...
The objective of this research is to begin the task of identifying the purpose of outbound traffic o...
Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high leve...
Cyber investigations often involve analysis of large volumes of log files, including network flow da...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
The purpose of this work consists in finding a method able to detect anomalies and adapt to new beh...
Scope and Method of Study: Wireless communication systems continue to show rapid growth as a result ...
Machine learning (ML) has come to be widely used in a broad array of settings, including important s...
A mobile wireless ad hoc network (MANET) consists of a group of mobile nodes communicating wirelessl...
With the increased ease in cloud deployment platforms, web applications have become an easy target f...
Everyday reports reveal numerous cyber security incidents, while many more are never uncovered due t...
Mobile Ad-hoc networks extend communications beyond the limit of infrastructure based networks. Futu...
Simplifying network security data to the point that it is readily accessible and usable by a wider a...
This thesis proposes a trust based security model suitable for content-basedrouting in Ad-hoc networ...
An Ad hoc wireless network has no infrastructure. It is formed dynamically by a group of moving node...
The purpose of this research is to find out how security affects the performance of an ad-hoc routin...
The objective of this research is to begin the task of identifying the purpose of outbound traffic o...
Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high leve...
Cyber investigations often involve analysis of large volumes of log files, including network flow da...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
The purpose of this work consists in finding a method able to detect anomalies and adapt to new beh...
Scope and Method of Study: Wireless communication systems continue to show rapid growth as a result ...
Machine learning (ML) has come to be widely used in a broad array of settings, including important s...
A mobile wireless ad hoc network (MANET) consists of a group of mobile nodes communicating wirelessl...
With the increased ease in cloud deployment platforms, web applications have become an easy target f...
Everyday reports reveal numerous cyber security incidents, while many more are never uncovered due t...
Mobile Ad-hoc networks extend communications beyond the limit of infrastructure based networks. Futu...
Simplifying network security data to the point that it is readily accessible and usable by a wider a...