2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT) 2014
DOI: 10.1109/scvt.2014.7046699
|View full text |Cite
|
Sign up to set email alerts
|

Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…We use these two items in a complementary manner to successfully become aware of the packet shedding attacks in MANETs. Considering reproduction comes about, our channels demonstrate that these attacks can be detected with a high rate of accuracy [10].…”
Section: Literature Surveymentioning
confidence: 84%
“…We use these two items in a complementary manner to successfully become aware of the packet shedding attacks in MANETs. Considering reproduction comes about, our channels demonstrate that these attacks can be detected with a high rate of accuracy [10].…”
Section: Literature Surveymentioning
confidence: 84%
“…Thus, the credibility of each single node is key to ensuring accurate and reliable network service delivery. Current trust management schemes such as those proposed in [74,78] only provide verification of data consistency and validity, but cannot guarantee objects' authentication. Furthermore, these previously proposed schemes are not completely adaptable to the IoT context.…”
Section: Trust Managementmentioning
confidence: 99%
“…Hema & Shyni (2015) proposed a Bayesian classification model for Denial of Service attacks to improve the detection rate and reduce the occurrence of false positive alarms in the system. An approach based on two Bernoulli and Multinomial Bayesian models which efficiently detects packet dropping attacks in Mobile Ad hoc Networks was described in Rmaythi et al (2014). The research aimed at discovering secure paths between source and a destination by avoiding DoS attacks.…”
Section: Literature Reviewmentioning
confidence: 99%