2022
DOI: 10.21533/pen.v10i3.2997
|View full text |Cite
|
Sign up to set email alerts
|

Proposed neural intrusion detection system to detect denial of service attacks in MANETs

Abstract: MANTs are groups of mobiles hosts that arrange themselves into a grid lacking some preexist organization where the active network environment makes it simple in danger by an attacker. A node leaves out, and another node enters in the network, making it easy to penetration. This paper aims to design a new method of intrusion detection in the MANET and avoiding Denial of Service (DoS) basis on the neural networks and Zone Sampling-Based Traceback algorithm (ZSBT). There are several restrictions in outdating intr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Without feature optimization, it would the results of the proposed IDS framework is highly improved over the other models [48][49][50][51] . Consequently, the detection rate of the existing [28] and proposed AMOA-DSLC models are validated and compared using Dataset 1 as shown in Fig. 5 and Table 3.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Without feature optimization, it would the results of the proposed IDS framework is highly improved over the other models [48][49][50][51] . Consequently, the detection rate of the existing [28] and proposed AMOA-DSLC models are validated and compared using Dataset 1 as shown in Fig. 5 and Table 3.…”
Section: Resultsmentioning
confidence: 99%
“…Prasad et al [28] implemented a clustering based unsupervised learning model for spotting intrusions in MANET. The suggested centroid initialization based clustering method outperforms basic clustering in terms of accuracy and takes fewer iterations to form final clusters.…”
Section: Related Workmentioning
confidence: 99%
“…First, since there isn't a single, reliable supervisor node in MANETs, attack signatures need to be managed in a decentralized fashion [11].…”
Section: ░ 1 Introductionmentioning
confidence: 99%