Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013
An Emerging Anomaly Detection Technique to Diminish the Routing Misbehavior in Mobile Ad hoc Network (MANET)
Chinmaya Kumar Nayak, Banchhanidhi Dash, Manoranjan Pradhan
Mobile ad hoc network does not have traffic concentration points such as gateway or access points which perform behavior monitoring of individual nodes. Therefore, maintaining the network function for normal nodes when other nodes do not route and forward correctly is a big challenge. This paper, address the behavior based anomaly detection technique inspired by the biological immune system to enhance the performance of MANET to operate despite the presence of misbehaving nodes. Due to its reliance on overhearing, the existing watchdog technique may fail to detect misbehavior or raise false alarms in the presence of ambiguous collisions, receiver collisions, and limited transmission power. In this present scheme uses intelligent machine learning techniques that learns and detects each node by false alarm and negative selection approach.
Keywords: Intrusion detection, anomaly detection, mobile ad hoc network, security
Edition: Volume 2 Issue 7, July 2013
Pages: 235 - 240
How to Cite this Article?
Chinmaya Kumar Nayak, Banchhanidhi Dash, Manoranjan Pradhan, "An Emerging Anomaly Detection Technique to Diminish the Routing Misbehavior in Mobile Ad hoc Network (MANET)", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013146, Volume 2 Issue 7, July 2013, 235 - 240
146 PDF Views | 121 PDF Downloads
Similar Articles with Keyword 'Intrusion detection'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1571 - 1574Energy Efficient Secure Routing using Clustering Approach in HWSN
Shani Verma, Maya Shelke
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
Similar Articles with Keyword 'anomaly detection'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1825 - 1828Link-Anomaly Detection in Twitter Streams
Shari P S
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2011 - 2014Attack Detection and Mitigation for AGC
Pooja A Kulkarni, Harshal A Karande
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 984 - 986Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems
Vrushali G. Chabilwad, A. D. Gujar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3054 - 3057A Hybrid System Using Genetic Algorithm for Anomaly Intrusion Detection
Arpitha J, Nagaraj Naik
Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 12, December 2017
Pages: 1547 - 1551Attack Detection Based on Data Mining Techniques
Dr. Buthynna Fahran, Dr. Mohammed Najm, Mustafa Abdulsamea Abdulhamed
Similar Articles with Keyword 'mobile ad hoc network'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Similar Articles with Keyword 'security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar