2023
DOI: 10.21203/rs.3.rs-2423431/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Mitigation of smart black hole attacks using universal sink detection method in graph theory

Abstract: Nowadays, network security has become a very important aspect due to the increasing number of connected things and the multiple threats that become more and more intelligent. Mobile Ad hoc networks (MANET), known to be non-infrastructure and self-configured peer networks, are subject to multiple types of attacks. For this reason, it is essential to implement an Intrusion Detection System that realizes fast attack detection to alert users by any malicious activity taking place on the network. Black hole is one … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…Statistical/mathematical-based methods contribute to the detection and mitigation of black hole attacks by analyzing network traffic patterns, identifying anomalies indicative of suspicious behavior, and implementing algorithms to dynamically compute routing paths or isolate malicious nodes. In [ 13 ], the authors introduced an IDS focused on early detection and isolation of malicious nodes. This is achieved by leveraging local information shared among neighbors and employing a universal sink detection method in graph theory.…”
Section: Related Workmentioning
confidence: 99%
“…Statistical/mathematical-based methods contribute to the detection and mitigation of black hole attacks by analyzing network traffic patterns, identifying anomalies indicative of suspicious behavior, and implementing algorithms to dynamically compute routing paths or isolate malicious nodes. In [ 13 ], the authors introduced an IDS focused on early detection and isolation of malicious nodes. This is achieved by leveraging local information shared among neighbors and employing a universal sink detection method in graph theory.…”
Section: Related Workmentioning
confidence: 99%