Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
O Innocent Mapanga nasceu no Zimbabué. Recebeu a sua licenciatura em Ciências da Computação pela Universidade de Educação Científica de Bindura, Zimbabué, em 2008, e um MTech em Ciência e Engenharia Informática pela Universidade Tecnológica de Deli, Deli, Índia, em 2014. Actualmente está a fazer o seu doutoramento centrado na Segurança de Redes.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities. 84 pp. Englisch. Bestandsnummer des Verkäufers 9786139827237
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Mapanga InnocentInnocent Mapanga was born in Zimbabwe. He received his B.Sc. Honors degree in Computer Science from Bindura University of Science Education, Zimbabwe, in 2008 and an MTech in Computer Science & Engineering from Delhi . Bestandsnummer des Verkäufers 385872965
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities.Books on Demand GmbH, Überseering 33, 22297 Hamburg 84 pp. Englisch. Bestandsnummer des Verkäufers 9786139827237
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS should be designed to reduce false positives and to ensure that only actual malicious traffic is detected and stopped .This study focuses on detecting the presence of malicious nodes that selectively or randomly drop packets intended for other destination nodes in Mobile Ad-hoc Networks(MANETs) ,it further classifies each packet drop attack, according to its attack type by observing and analyzing how each packet drop attack affect the network characteristics. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, your ability to detect and respond to that intrusion can be the difference between a small incident and a major disaster. This study follows a three-stage cycle: i. data collection ii. data analysis iii. detection and classification. This syudy motivates the intelligent use of artificial neural networks that makes use of local data collected at each node in detecting malicious activities. Bestandsnummer des Verkäufers 9786139827237
Anzahl: 1 verfügbar
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Packet Drop Attack Detection In Mobile Adhoc Networks using ANN | Innocent Mapanga | Taschenbuch | Englisch | 2018 | LAP LAMBERT Academic Publishing | EAN 9786139827237 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. Bestandsnummer des Verkäufers 118706843
Anzahl: 5 verfügbar