Mobility

Detecting Intrusion on AODV Based Mobile Ad Hoc Networks by k-Means Clustering Method of Data Mining

Free registration required

Executive Summary

MANET has no clear line of defense so; it is accessible to both legitimate network nodes and malicious nodes. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the battery power. Some others may act malicious by launching security attacks like black hole or hack the information. Traditional way of protecting networks with firewalls and encryption software is no longer sufficient. Therefore, intrusion detection system is required that monitor the network, detect malicious node and notifies other node in the network to avoid malicious node i.e. IDS detects malicious activities in the networks.

  • Format: PDF
  • Size: 642.2 KB