2021
DOI: 10.1109/tccn.2021.3055503
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Detection of Flooding-Based Denial of Service Attacks in Wireless Ad Hoc Networks Using Uncertain Reasoning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…N. Nishanth et al [14] use Bayesian inference and the Dempster-Shafer evidence theory approach to defend against RREQ flood attacks in wireless ad hoc networks. The best Bayesian inference system for identifying persistent RREQ flooding attacks has been created using Bayesian inference to detect high and low-rate pulsed RREQ flooding attacks.…”
Section: Related Workmentioning
confidence: 99%
“…N. Nishanth et al [14] use Bayesian inference and the Dempster-Shafer evidence theory approach to defend against RREQ flood attacks in wireless ad hoc networks. The best Bayesian inference system for identifying persistent RREQ flooding attacks has been created using Bayesian inference to detect high and low-rate pulsed RREQ flooding attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Work in [3] focuses on the application of machine learning techniques to the detection of intrusions in CRAHNs. It proposes a classification model that employs supervised learning algorithms to determine whether network traffic is benign or malicious.…”
Section: Cqualitative Analysismentioning
confidence: 99%
“…This work distinguishes itself by proposing a novel approach for enhancing the security of CRAHNs that combines deep learning, blockchain technology, and optimization techniques. The proposed model, unlike work in [3], addresses the scalability and real-time processing limitations of existing deep learning models. In contrast to the work in [26], the proposed model not only focuses on routing but also provides a comprehensive solution that encompasses traffic pattern analysis, attack detection, data integrity, and transparency via blockchain technology.…”
Section: Qualitative Comparisonmentioning
confidence: 99%
See 2 more Smart Citations