Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks

View through CrossRef
Technology and its growth is considerably enormous. This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc networks (MANET) is one of its kinds. Mobile ad hoc network is widely used from collaborative computing to time critical applications in indoor and outdoor environment. Mobility of ad hoc network makes very attractive in all areas of mobile applications. Nodes participating in mobile ad hoc networks are autonomous, self-configurable and act as a router as well. These types of networks are dynamic in nature and have sort life time. Dynamic nature and limitations of the wireless transmission medium make MANET unsecured and vulnerable to various attacks. It is very tough to implement security for this networks and it opens up doors for further research work on this area. There is a great scope for designing a system to identify attacks and take countermeasures to minimize it and keep the performance of the network within acceptable limits. Intrusion detection system is one of its kinds and considered as security mechanism for MANET. This thesis explores different types of intrusion detection system like misuse detection and anomaly detection for mobile ad hoc networks. Anomaly detection techniques for ad hoc networks depend on the characterization of normal behavior pattern of wireless nodes. This research work focuses on wireless node behavior based detection technique. Most of anomaly intrusion detection systems are focusing on upper layer traffic to a profile normal behavior of wireless node. This research work focus on media access control (MAC) layer and network layer of wireless node. It is inefficient to use a large feature set of MAC layer and network layer due to energy limitation in ad-hoc network. A minimal feature set from MAC layer and network layer were proposed. This research work proposed an anomaly intrusion detection system for mobile ad hoc network using fuzzy logic and weighted average method. The network performance of mobile ad hoc network with intrusion detection system was analyzed using various network parameters. Further the performance of the performance of the intrusion detection system was analyzed using detection rate and false alarms. Results show good improvement in detection rate and other performance metrics
Title: Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Description:
Technology and its growth is considerably enormous.
This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc networks (MANET) is one of its kinds.
Mobile ad hoc network is widely used from collaborative computing to time critical applications in indoor and outdoor environment.
Mobility of ad hoc network makes very attractive in all areas of mobile applications.
Nodes participating in mobile ad hoc networks are autonomous, self-configurable and act as a router as well.
These types of networks are dynamic in nature and have sort life time.
Dynamic nature and limitations of the wireless transmission medium make MANET unsecured and vulnerable to various attacks.
It is very tough to implement security for this networks and it opens up doors for further research work on this area.
There is a great scope for designing a system to identify attacks and take countermeasures to minimize it and keep the performance of the network within acceptable limits.
Intrusion detection system is one of its kinds and considered as security mechanism for MANET.
This thesis explores different types of intrusion detection system like misuse detection and anomaly detection for mobile ad hoc networks.
Anomaly detection techniques for ad hoc networks depend on the characterization of normal behavior pattern of wireless nodes.
This research work focuses on wireless node behavior based detection technique.
Most of anomaly intrusion detection systems are focusing on upper layer traffic to a profile normal behavior of wireless node.
This research work focus on media access control (MAC) layer and network layer of wireless node.
It is inefficient to use a large feature set of MAC layer and network layer due to energy limitation in ad-hoc network.
A minimal feature set from MAC layer and network layer were proposed.
This research work proposed an anomaly intrusion detection system for mobile ad hoc network using fuzzy logic and weighted average method.
The network performance of mobile ad hoc network with intrusion detection system was analyzed using various network parameters.
Further the performance of the performance of the intrusion detection system was analyzed using detection rate and false alarms.
Results show good improvement in detection rate and other performance metrics.

Related Results

ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
Konstruksi Sistem Inferensi Fuzzy Menggunakan Subtractive Fuzzy C-Means pada Data Parkinson
Konstruksi Sistem Inferensi Fuzzy Menggunakan Subtractive Fuzzy C-Means pada Data Parkinson
Abstract. Fuzzy Inference System requires several stages to get the output, 1) formation of fuzzy sets, 2) formation of rules, 3) application of implication functions, 4) compositi...
Generated Fuzzy Quasi-ideals in Ternary Semigroups
Generated Fuzzy Quasi-ideals in Ternary Semigroups
Here in this paper, we provide characterizations of fuzzy quasi-ideal in terms of level and strong level subsets. Along with it, we provide expression for the generated fuzzy quasi...
XÂY DỰNG VÀ SỬ DỤNG HỌC LIỆU SỐ TRONG DẠY HỌC “SINH HỌC VI SINH VẬT VÀ VIRUS” (SINH HỌC 10)
XÂY DỰNG VÀ SỬ DỤNG HỌC LIỆU SỐ TRONG DẠY HỌC “SINH HỌC VI SINH VẬT VÀ VIRUS” (SINH HỌC 10)
Bài viết đề cập đến những nghiên cứu về tầm quan trọng của học liệu số, các dạng học liệu số trong dạy học Sinh học nói chung và dạy học Sinh học vi sinh vật và virus – Sinh học 10...
ω – SUBSEMIRING FUZZY
ω – SUBSEMIRING FUZZY
Mapping ρ is called a fuzzy subset of an empty set of S if ρ is the mapping from S to the closed interval [0,1]. A fuzzy subset ρ introduced into this paper is a fuzzy subset of se...
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalis...
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalis...

Back to Top