An Emerging Anomaly Detection Technique to Diminish the Routing Misbehavior in Mobile Ad hoc Network (MANET)
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 136 | Monthly Hits: ⮙3

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

An Emerging Anomaly Detection Technique to Diminish the Routing Misbehavior in Mobile Ad hoc Network (MANET)

Chinmaya Kumar Nayak, Banchhanidhi Dash, Manoranjan Pradhan

Mobile ad hoc network does not have traffic concentration points such as gateway or access points which perform behavior monitoring of individual nodes. Therefore, maintaining the network function for normal nodes when other nodes do not route and forward correctly is a big challenge. This paper, address the behavior based anomaly detection technique inspired by the biological immune system to enhance the performance of MANET to operate despite the presence of misbehaving nodes. Due to its reliance on overhearing, the existing watchdog technique may fail to detect misbehavior or raise false alarms in the presence of ambiguous collisions, receiver collisions, and limited transmission power. In this present scheme uses intelligent machine learning techniques that learns and detects each node by false alarm and negative selection approach.

Keywords: Intrusion detection, anomaly detection, mobile ad hoc network, security

Edition: Volume 2 Issue 7, July 2013

Pages: 235 - 240

Share this Article

How to Cite this Article?

Chinmaya Kumar Nayak, Banchhanidhi Dash, Manoranjan Pradhan, "An Emerging Anomaly Detection Technique to Diminish the Routing Misbehavior in Mobile Ad hoc Network (MANET)", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013146, Volume 2 Issue 7, July 2013, 235 - 240

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Intrusion detection'

Downloads: 70 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Downloads: 105 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 955 - 959

A Hybrid Approach of Fuzzy C-mean Clustering and Genetic Algorithm (GA) to Improve Intrusion Detection Rate

Kamaldeep Kaur, Navjot Kaur

Share this Article

Similar Articles with Keyword 'anomaly detection'

Downloads: 107 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Downloads: 108 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Downloads: 109 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1676 - 1682

Identifying Emerging Topics Using Link Anomaly Detection in Social Media

Shweta V. Saswade, Prof. S. S. Nandgaonkar

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1496 - 1500

An Intrusion Detection Model for Detecting Type of Attack Using Data Mining

Amruta Surana, Shyam Gupta

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1207 - 1210

Out Lier Detection and Clustering Analysis in Data Stream Classification

Neethu S, Sajni Nirmal

Share this Article

Similar Articles with Keyword 'mobile ad hoc network'

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 46 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 79 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 102 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1237 - 1240

Women Safety Alert System Using Arduino

P. Jayalakshmi, Bejjanki Shashank, Kakumani Yasaswi

Share this Article

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article



Top