In mobile ad hoc networks (MANET), the mobility of the node changes dynamically, thus affecting the stability of the connection and increasing energy consumption. The heterogeneity of the MANET nodes in terms of mobility, battery capacity, and processing capabilities often complicates the routing process and results in increased energy consumption and traffic overhead. To overcome the challenges associated with diverse MANET nodes, this article presents a hybrid interval type‐2 fuzzy logic controller and modified dingo optimization (IT2FLC‐MDO) algorithm‐based optimized link‐state routing protocol. In our proposed IT2FLC‐MDO algorithm, multiple Quality of Service (QoS) parameters (node distance, lifetime, residual energy, speed, queue length, etc) are integrated into a single multicriteria node metric to improve the multipath route analysis and topology formation. In this way, the need to broadcast multiple parameters for each session is reduced thus minimizing the control overhead. The proposed routing protocol mainly aims to achieve a tradeoff between the QoS metrics and energy consumption during data transmission, addresses the QoS and energy issues associated with multipath routing, and uses a multicriteria node metric. The proposed IT2FLC‐MDO protocol takes both the energy consumption and QoS parameters into account, thus achieving a balance between the energy consumption and QoS. The cluster head primarily chooses the path with the highest link quality to ensure reliable data transmission. The proposed IT2FLC‐MDO protocol's efficiency is demonstrated using several performance measures such as packet delivery ratio, average end‐to‐end delay, and normalized control overhead. The simulation results indicate that the proposed algorithm can handle MANET uncertainty while minimizing control overhead. The results show that the proposed algorithm offers a packet delivery rate nearly equal to 96% and improves the MANET's lifetime by up to 59%.
Abstract:Computer security has become a major concern of modern technological era and the history of security leads to a better understanding of emergence of security technology. One such field is concerned with protecting computer assets from attackers. Logs contain a huge wealth of information. Logs provides a sight of running system. Vulnerability is a kind of bug used by an attacker .log analysis for system security could be signature based or anomaly based. Both of these signatures are could either be network based or host based. In this paper a survey is done to study the current practices in generation of vulnerability signatures and analysis of logs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.