SlideShare a Scribd company logo
1 of 1
2020 – 2021
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 Mo: +91 9500218218 / +91 8220150373
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
A Study on Secure Intrusion Detection System in Wireless MANETs to
Increase the Performance of Eaack
Abstract :
The migrationto wirelessnetworkfromwirednetworkhasbeena global trendin the past few decades.
The mobilityandscalabilitybroughtbywirelessnetworkmadeitpossibleinmanyapplications.Amongall
the contemporarywirelessnetworks,MobileAdhocNetwork(MANET) isone of the mostimportantand
unique applications.Onthe contraryto traditional networkarchitecture,MANETdoesnotrequire afixed
networkinfrastructure;everysingle nodeworksasbothatransmitterandareceiver.Nodescommunicate
directlywitheachotherwhentheyare bothwithinthe same communicationrange.Otherwise,theyrely
on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular
among critical missionapplicationslike military use oremergencyrecovery.However,the openmedium
and wide distributionof nodesmake MANETvulnerable tomaliciousattackers.Inthiscase,itiscrucial to
develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the
improvements of the technology and cut in hardware costs, we are witnessing a current trend of
expandingMANETsintoindustrialapplications.Toadjusttosuch trend,we stronglybelievethatitisvital
to address its potential security issues. In this paper, we propose and implement a new intrusion-
detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs.
Comparedtocontemporaryapproaches,EAACKdemonstrateshighermalicious-behavior-detectionrates
in certain circumstances while does not greatly affect the network performances.

More Related Content

What's hot

Future Cisco + Ericsson Internet of Things (IoT) Networks Insights from Patents
Future Cisco + Ericsson Internet of Things (IoT) Networks Insights from PatentsFuture Cisco + Ericsson Internet of Things (IoT) Networks Insights from Patents
Future Cisco + Ericsson Internet of Things (IoT) Networks Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Book Review : TGC5 Transformative Telco Technologies
Book Review : TGC5 Transformative Telco TechnologiesBook Review : TGC5 Transformative Telco Technologies
Book Review : TGC5 Transformative Telco TechnologiesSadiq Malik
 
Bluetooth based employee mobile tracking using android application
Bluetooth based employee mobile tracking using android applicationBluetooth based employee mobile tracking using android application
Bluetooth based employee mobile tracking using android applicationShakas Technologies
 
Implementing energy efficient technique for defens against gray hole and blac...
Implementing energy efficient technique for defens against gray hole and blac...Implementing energy efficient technique for defens against gray hole and blac...
Implementing energy efficient technique for defens against gray hole and blac...Shakas Technologies
 
Power of Pixels - Abridged
Power of Pixels - AbridgedPower of Pixels - Abridged
Power of Pixels - AbridgedRanajoy Roy
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...Amir Shokri
 
Machine-to-Machine communicatioN AKASH
Machine-to-Machine communicatioN AKASHMachine-to-Machine communicatioN AKASH
Machine-to-Machine communicatioN AKASHAkash Pandey
 
White Paper: Understanding the Networked Society – new logics for an age of e...
White Paper: Understanding the Networked Society – new logics for an age of e...White Paper: Understanding the Networked Society – new logics for an age of e...
White Paper: Understanding the Networked Society – new logics for an age of e...Ericsson
 
What does the AI spectrum mean for 5G? - C&T RF Antennas Inc
What does the AI spectrum mean for 5G? - C&T RF Antennas IncWhat does the AI spectrum mean for 5G? - C&T RF Antennas Inc
What does the AI spectrum mean for 5G? - C&T RF Antennas IncAntenna Manufacturer Coco
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Mohammad Khatib
 
Mobile Web Services for Distributed In-Network Communications and Computations
Mobile Web Services for Distributed In-Network Communications and ComputationsMobile Web Services for Distributed In-Network Communications and Computations
Mobile Web Services for Distributed In-Network Communications and ComputationsDr. Fahad Aijaz
 
Capstone Team Presentation Deck -The Vicious Circle of Smart Grid Security
Capstone Team Presentation Deck -The Vicious Circle of Smart Grid SecurityCapstone Team Presentation Deck -The Vicious Circle of Smart Grid Security
Capstone Team Presentation Deck -The Vicious Circle of Smart Grid Securityreuben_mathew
 
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5GDean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5GDean Bubley
 
WiFi Opportunities & Challenges: Positioning vs. 5G
WiFi Opportunities & Challenges: Positioning vs. 5GWiFi Opportunities & Challenges: Positioning vs. 5G
WiFi Opportunities & Challenges: Positioning vs. 5GDean Bubley
 
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum ConferenceDean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum ConferenceDean Bubley
 
VistaMilk Communication Technologies Research
VistaMilk Communication Technologies ResearchVistaMilk Communication Technologies Research
VistaMilk Communication Technologies ResearchWalton Institute
 
Digital Economy Over Digital Infrastructure 2016
Digital Economy Over Digital Infrastructure 2016Digital Economy Over Digital Infrastructure 2016
Digital Economy Over Digital Infrastructure 2016Nia Kurnianingsih
 

What's hot (20)

Future Cisco + Ericsson Internet of Things (IoT) Networks Insights from Patents
Future Cisco + Ericsson Internet of Things (IoT) Networks Insights from PatentsFuture Cisco + Ericsson Internet of Things (IoT) Networks Insights from Patents
Future Cisco + Ericsson Internet of Things (IoT) Networks Insights from Patents
 
Book Review : TGC5 Transformative Telco Technologies
Book Review : TGC5 Transformative Telco TechnologiesBook Review : TGC5 Transformative Telco Technologies
Book Review : TGC5 Transformative Telco Technologies
 
Bluetooth based employee mobile tracking using android application
Bluetooth based employee mobile tracking using android applicationBluetooth based employee mobile tracking using android application
Bluetooth based employee mobile tracking using android application
 
Implementing energy efficient technique for defens against gray hole and blac...
Implementing energy efficient technique for defens against gray hole and blac...Implementing energy efficient technique for defens against gray hole and blac...
Implementing energy efficient technique for defens against gray hole and blac...
 
Power of Pixels - Abridged
Power of Pixels - AbridgedPower of Pixels - Abridged
Power of Pixels - Abridged
 
6.abstract
6.abstract6.abstract
6.abstract
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...
 
Machine-to-Machine communicatioN AKASH
Machine-to-Machine communicatioN AKASHMachine-to-Machine communicatioN AKASH
Machine-to-Machine communicatioN AKASH
 
White Paper: Understanding the Networked Society – new logics for an age of e...
White Paper: Understanding the Networked Society – new logics for an age of e...White Paper: Understanding the Networked Society – new logics for an age of e...
White Paper: Understanding the Networked Society – new logics for an age of e...
 
What does the AI spectrum mean for 5G? - C&T RF Antennas Inc
What does the AI spectrum mean for 5G? - C&T RF Antennas IncWhat does the AI spectrum mean for 5G? - C&T RF Antennas Inc
What does the AI spectrum mean for 5G? - C&T RF Antennas Inc
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129
 
Mobile Web Services for Distributed In-Network Communications and Computations
Mobile Web Services for Distributed In-Network Communications and ComputationsMobile Web Services for Distributed In-Network Communications and Computations
Mobile Web Services for Distributed In-Network Communications and Computations
 
IoT - Quick Look
IoT - Quick LookIoT - Quick Look
IoT - Quick Look
 
Capstone Team Presentation Deck -The Vicious Circle of Smart Grid Security
Capstone Team Presentation Deck -The Vicious Circle of Smart Grid SecurityCapstone Team Presentation Deck -The Vicious Circle of Smart Grid Security
Capstone Team Presentation Deck -The Vicious Circle of Smart Grid Security
 
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5GDean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
 
WiFi Opportunities & Challenges: Positioning vs. 5G
WiFi Opportunities & Challenges: Positioning vs. 5GWiFi Opportunities & Challenges: Positioning vs. 5G
WiFi Opportunities & Challenges: Positioning vs. 5G
 
Mousa
MousaMousa
Mousa
 
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum ConferenceDean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
 
VistaMilk Communication Technologies Research
VistaMilk Communication Technologies ResearchVistaMilk Communication Technologies Research
VistaMilk Communication Technologies Research
 
Digital Economy Over Digital Infrastructure 2016
Digital Economy Over Digital Infrastructure 2016Digital Economy Over Digital Infrastructure 2016
Digital Economy Over Digital Infrastructure 2016
 

Similar to A study on secure intrusion detection system in wireless mane ts to increase the performance of eaack

An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingShakas Technologies
 
Effects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodesEffects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodesShakas Technologies
 
An innovative approach of hds2 routing protocol in manet
An innovative approach of hds2 routing protocol in manetAn innovative approach of hds2 routing protocol in manet
An innovative approach of hds2 routing protocol in manetShakas Technologies
 
Detecting and avoiding of worm hole attack and collaborative blackhole attack...
Detecting and avoiding of worm hole attack and collaborative blackhole attack...Detecting and avoiding of worm hole attack and collaborative blackhole attack...
Detecting and avoiding of worm hole attack and collaborative blackhole attack...Shakas Technologies
 
Cloud intrusion detection method based on stacked contractive auto encoder an...
Cloud intrusion detection method based on stacked contractive auto encoder an...Cloud intrusion detection method based on stacked contractive auto encoder an...
Cloud intrusion detection method based on stacked contractive auto encoder an...Shakas Technologies
 
A collaborative security framework for software defined wireless sensor networks
A collaborative security framework for software defined wireless sensor networksA collaborative security framework for software defined wireless sensor networks
A collaborative security framework for software defined wireless sensor networksShakas Technologies
 
An autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networksAn autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networksShakas Technologies
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcway Technologies
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane tsEcway Technologies
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecway
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane tsEcway Technologies
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane tsecwayerode
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecway
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcway Technologies
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Shakas Technologies
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane tsEcwaytech
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcwaytech
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcwaytech
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane tsEcwayt
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcwayt
 

Similar to A study on secure intrusion detection system in wireless mane ts to increase the performance of eaack (20)

An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computing
 
Effects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodesEffects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodes
 
An innovative approach of hds2 routing protocol in manet
An innovative approach of hds2 routing protocol in manetAn innovative approach of hds2 routing protocol in manet
An innovative approach of hds2 routing protocol in manet
 
Detecting and avoiding of worm hole attack and collaborative blackhole attack...
Detecting and avoiding of worm hole attack and collaborative blackhole attack...Detecting and avoiding of worm hole attack and collaborative blackhole attack...
Detecting and avoiding of worm hole attack and collaborative blackhole attack...
 
Cloud intrusion detection method based on stacked contractive auto encoder an...
Cloud intrusion detection method based on stacked contractive auto encoder an...Cloud intrusion detection method based on stacked contractive auto encoder an...
Cloud intrusion detection method based on stacked contractive auto encoder an...
 
A collaborative security framework for software defined wireless sensor networks
A collaborative security framework for software defined wireless sensor networksA collaborative security framework for software defined wireless sensor networks
A collaborative security framework for software defined wireless sensor networks
 
An autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networksAn autonomic in network query processing for urban sensor networks
An autonomic in network query processing for urban sensor networks
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

A study on secure intrusion detection system in wireless mane ts to increase the performance of eaack

  • 1. 2020 – 2021 #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 Mo: +91 9500218218 / +91 8220150373 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com A Study on Secure Intrusion Detection System in Wireless MANETs to Increase the Performance of Eaack Abstract : The migrationto wirelessnetworkfromwirednetworkhasbeena global trendin the past few decades. The mobilityandscalabilitybroughtbywirelessnetworkmadeitpossibleinmanyapplications.Amongall the contemporarywirelessnetworks,MobileAdhocNetwork(MANET) isone of the mostimportantand unique applications.Onthe contraryto traditional networkarchitecture,MANETdoesnotrequire afixed networkinfrastructure;everysingle nodeworksasbothatransmitterandareceiver.Nodescommunicate directlywitheachotherwhentheyare bothwithinthe same communicationrange.Otherwise,theyrely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical missionapplicationslike military use oremergencyrecovery.However,the openmedium and wide distributionof nodesmake MANETvulnerable tomaliciousattackers.Inthiscase,itiscrucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expandingMANETsintoindustrialapplications.Toadjusttosuch trend,we stronglybelievethatitisvital to address its potential security issues. In this paper, we propose and implement a new intrusion- detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Comparedtocontemporaryapproaches,EAACKdemonstrateshighermalicious-behavior-detectionrates in certain circumstances while does not greatly affect the network performances.