SlideShare a Scribd company logo
Sundarapandian et al. (Eds): CoNeCo,WiMo, NLP, CRYPSIS, ICAIT, ICDIP, ITCSE, CS & IT 07,
pp. 95–101, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2409
MODEL FOR INTRUSION DETECTION
SYSTEM
Neha Rani1
, Pankaj Sharma2
and Ashok Kumar Sinha3
1
Department of CSE, ABES Engineering College,
Ghaziabad (U.P.), India.
nehachandel83@gmail.com
2
Department of IT, Sr. Asst. Professor,
ABES Engineering College, Ghaziabad (U.P.), India.
sharma1.pk@gmail.com
3
Department of IT, Head of Department,
ABES Engineering College, Ghaziabad (U.P.), India.
aksinha@abes.ac.in
ABSTRACT
Advancement in wireless communications lead more and more mobile wireless networks e.g.,
mobile networks [mobile ad hoc networks (MANETs)], wireless sensor networks, etc. Some of
the challenges in MANET include: Dynamic network topology, Speed, Bandwidth, computation
capability, Scalability, Quality of service, Secure and Reliable routing. One of the most
important challenges in mobile wireless networks is the Secure and reliable routing and the
main characteristic of MANET with respect to security is the lack of clear line of defence.
Therefore, the SP routing problem in MANET turns into dynamic optimization problem. In this
paper, a path detection algorithm and a model to detect intruders that is misbehaving nodes in
the alternative paths is proposed.
KEYWORDS
Mobile Ad Hoc Network (MANET), Intrusion Detection System (IDS), Shortest Path (SP),
Genetic Algorithm (GA).
1. INTRODUCTION
A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes forming a
temporary/short-lived network where all nodes are free to move about arbitrarily and where all
the nodes configure themselves. This type of networks is suited in situations where a fixed
infrastructure is not available. A few areas of application are Military communications, Search
and rescue operations, ecommerce, home and enterprise networking etc. In MANET, each node
acts both as a router and as a host & even the topology of network may also change rapidly. In the
absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary
network functionality. Mobile networking is one of the most important technologies supporting
pervasive computing. Generally there are two distinct approaches for enabling wireless mobile
units to communicate with each other [3]:
Infrastructured: Wireless mobile networks have traditionally been based on the cellular concept
and relied on good infrastructure support, in which mobile devices communicate with access
points like base stations connected to the fixed network infrastructure.
96 Computer Science & Information Technology ( CS & IT )
Infrastructureless: As to infrastructureless approach, the mobile wireless network is commonly
known as an adhoc network or Mobile ad hoc network (MANET).
There are many existing routing protocols available for MANET and those can be categorized as
table driven approach (proactive) and on demand routing protocols (reactive) [6]. The reactive
routing protocol a route is established only when a source node wants a route to destination node.
2. SECURITY IN MANET
This section discusses some security goals and challenges that the field of ad hoc networking
faces [1].
2.1. Security Goals
(a) Availability: It ensures that network will provide all services. Denial of Service is an attack to
availability.
(b) Confidentiality: It ensures that certain information is never leaked to unauthorised user.
(c) Integrity: It enables that the message send by source received by destination without being
modified or corrupted.
(d) Authentication: It allows users to be sure about the identity of other to whom it is
communicating.
(e) Non-repudiation: It enables the sender of the message not to deny of sending the message and
the receiver of the message cannot refuse from receiving it.
(f) Access and usage control: It ensures that access to information is controlled by the ad hoc
network.
2.2. Security Challenges
The main security challenges that ad hoc networks face have been thoroughly analysed in the
literature [1].
2.2.1. Link attacks
It includes attacks like
• Passive eavesdropping
• Message replay
• Message corruption.
s
R
Figure 1: Ad hoc network example.
.
Source
Destination
Computer Science & Information Technology ( CS & IT ) 97
2.2.2. Dynamic nature
2.2.3. Active Routing Attacks
These kinds of attacks are very difficult to identify. Some of them are given below:
• Black Hole
• Routing Table Overflow
• Resource Consumption
2.2.4. Scalability
2.2.5. Secure routing
2.2.6. Quality of Service
3. COMPARISION OF EXISTING PATH COMPUTING ALGORITHM WITH
PROPOSED ALGORITHM
At present there are number of adhoc routing protocols that follow dijkstra’s approach. This
section is considering another algorithm, Floyd Warshall algorithm to find optimal path. The
comparison of warshall’s algorithm with Dijkstra’s algorithm is presented as follows.
• Dijkstra's finds the optimal route from one node to all other nodes and Floyd-Warshall
finds the optimal route for all node pairings.
• Dijkstra's runtime is O(E + VlogV) where Floyd's is O(V3
). Running Dijkstra for all
nodes (represented as number of vertices) gives O(VE + V^2logV). If E = O(V^2), then
the two are theoretically identical, with Floyd being faster in practice. Moreover, Floyd-
Warshall does very few operations in the inner-loop so in practice Floyd-Warshall runs
faster than Dijkstra for All-Pairs Shortest Path.
• Basically, Dijkstra’s algorithm is applied when there are as many edges as there are nodes
i.e. E=O(V), and run Floyd’s algorithm is used if we expect to have almost complete
graphs i.e. E=O(V^2).
4. OPTIMIZING THE RESULTANT PATH OBTAINED FROM THE
PROPOSED ALGORITHM WITH GENETIC ALGORITHM
Genetic Algorithm (GA), first introduced by John Holland in the early seventies, is the search
algorithm based on the mechanics of natural selection process (biological evolution). The GA
design involves several key components: genetic representation, population initialization, fitness
function, selection scheme, crossover and mutation [4]. A routing path contains of sequence of
nodes in network. The genetic algorithm is applied to paths that is been obtained from the
proposed algorithm (in the next section). A routing path is encoded by a string of 0’s and 1’s. The
length of the string should not be more than the number of nodes present in the network.
4.1. Population Initialization
In GA each chromosome represents a potential solution and this can contain more than one
solution initially [7]. The paths obtained from route discovery phase are considered as initial
chromosomes.
98 Computer Science & Information Technology ( CS & IT )
4.2. Fitness Function
For a given solution, the quality is determined by the fitness function. Each chromosome is given
a measure of fitness via a fitness function called as evaluation or objective function. The fitness of
a chromosome determines its ability to survive and produce offspring. Our aim is to find the
optimum path with lowest delay time. The fitness of each chromosome can be calculated as,[5 ]
Where,
Ch= chromosome fitness value,
RF=the delay time taken by each chromosome,
COn = the cost of the path from source s to destination d.
The above fitness function is been maximized and involves only shortest path and delay
constraint.
4.3. Selection scheme
Selection plays an important role in improving the average quality of the population by passing
the high-quality chromosomes to the next generation. The selection of chromosome is based on
the fitness value.
4.4. Crossover
The generations of the new solutions are developed by two basic recombination operators-
crossover and mutation. Crossover includes combining of parent chromosomes to produce
children chromosomes. It combines the fittest chromosomes and passes superior gene to next
generation.
.
eq 1
1 0 0 1 1
0 0 1 0 1
Fig 2: Initial chromosomes
1
0
0
0
0
1
0
1
1
1
Fig 3: Offsprings produced after crossover
Computer Science & Information Technology ( CS & IT ) 99
4.5. Mutation
Mutation includes altering some genes in chromosome. Mutation helps a GA keep away from
local optima [2].
5. STEPS FOR IMPLEMENTING THE PROPOSED MODEL
This section presents the pseudocode of the proposed algorithm and the steps to be taken to
optimize the path obtained using GA.
5.1. Pseudocode for computing shortest path
#dist (i,j) is best distance so far from vertex i to
vertex j.
#k is the intermediate vertex
#Start with single edge paths.
For i=1 to n do
For j=1 to n do
dist (i,j) = weight(i,j)
For k=1 to n do
For i=1 to n do
For j=1 to n do
if (dist(i,k) + dist(k,j) < dist(i,j)) then
#shortest path
dist (i,j) = dist(i,k)+ dist(k,j)
5.2. Steps taken to optimize the path obtained using GA
In this subsection a flowchart is presented that depicts the step to be taken to optimize the path
obtained using Genetic algorithm.
Fig 4: Child after mutation
1 0 1 0 1
0 0 1 0 1
100 Computer Science & Information Technology ( CS & IT )
Define cost function, cost, variables
Generate initial population
Decode chromosomes
Find cost for each chromosome
Select mates
Mutation
Mating
Convergence Check
Select GA parameters
Check
whether path
is optimized?
Done (store and
record the path)
YES
NO
Fig 5: Flowchart of a binary GA
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Step 10
Computer Science & Information Technology ( CS & IT ) 101
6. THE NEED AND SIGNIFICANCE OF PROPOSED MODEL
The need of proposed model is to remove the challenges of MANET such as security and reliability.
The proposed model can compute appropriate route for communication and capable to obtain optimal,
secure and reliable route. This model can be implemented for MANET routing environment that will
be secure, reliable, optimal for several real life environment such as disaster management, rescue
operations, military battlefield etc.
7. CONCLUSION
MANET is a self-organizing and self-configuring multihop wireless network, which has a wide usage
nowadays. MANETs are an wide area for research with lots of practical applications. However,
MANETs are vulnerable to attacks due to their dynamic topology, open medium etc. Thus security
issue is becoming a main concern in the applications of MANET. According to the model It can be
seen that after passing through the various steps of GA the information regarding the shortest path is
optimized and provides the best and optimal path which will consider the problem of finding optimum
path with least cost and least delay by using Genetic algorithm. It is hypothesized that the resultant
path is more optimal and reliable with minimum of the malicious or misbehaving node in the system.
REFERENCES
[1] Haas, Z.J, Zhou, L. 1999 .Securing Ad hoc Networks. IEEE, Networks Magazine, Vol. 13, no 6, Nov.
/Dec., 1999.
[2] Ahn, C. W. and Ramakrishna, R.S. 2002. A genetic algorithm for shortest path routing problem and the
sizing of populations. IEEE Trans. Evol. Comput. vol. 6, no. 6, pp. 566–579, Dec. 2002.
[3] Jun-Zhao Sun. Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing.
MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu, University of Oulu, Finland.
[4] Yang, S., Cheng, H., and Wang, F. , Member IEEE. 2010. Genetic Algorithms with Immigrants and
Memory Schemes for Dynamic Shortest Path Routing Problems in Mobile Ad Hoc Networks. In
proc. IEEE transactions on systems, man, and cybernetics part C: applications and reviews, vol. 40,
no. 1, January 2010, pp. 52-63.
[5] Manikandan, K.., Saleem Durai, M.A., Suresh Kumar D. 2011. Secure On-Demand Routing Protocol
for MANET using Genetic Algorithm. International Journal of Computer Applications (0975 – 8887)
Volume 19– No.8, April 2011.
[6] Yu, K.M, Yu, C.W, Yan, S.F. 2009. An Ad Hoc Routing Protocol with Multiple Backup Routes. In
Proc. Springer Science+Business Media LLC. 1November 2009
[7] Randy L.Haupt, Sue Ellen Haupt (2004) 2nd
Edition, Practical Genetic Algorithms, A JOHN WILEY &
SONS, INC., Publication.
Authors
Neha Rani is currently pursuing M-Tech in Computer Science and Engineering from ABES Engineering
College, affiliated to Maha Maya Technical University, Ghaziabad (U.P.) India and pursued her M.C.A.
from A.K.G. Engineering College affiliated to Uttar Pradesh Technical University, Ghaziabad (U.P.) India.
Her area of interest includes Mobile Ad hoc network and Genetic algorithm.
Pankaj Kumar Sharma is working as a Senior Asst. professor in Department of Information Technology,
ABES Engineering College, Ghaziabad (U.P.) India and pursued M.tech in Computer Science and
Engineering from Uttar Pradesh Technical university, Lucknow, India. He has authored many international
and national journal papers to his credit. His research interests include Mobile Ad hoc Network, fuzzy
logic. He was the recipient of academic excellence award in M.tech.
Ashok Kumar Sinha is working as a Head of Department in Department of Information Technology,
ABES Engineering College, Ghaziabad (U.P.) India and pursued PhD in Computer Science and
Engineering from IIT, Delhi. He has authored many international and national journal papers to his credit.
His research interests include Artificial Intelligence, fuzzy logic, Mobile Ad hoc network, Digital Image
processing and Cloud Computing.

More Related Content

What's hot

Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
CSCJournals
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
cscpconf
 
Investigations on Hybrid Learning in ANFIS
Investigations on Hybrid Learning in ANFISInvestigations on Hybrid Learning in ANFIS
Investigations on Hybrid Learning in ANFIS
IJERA Editor
 
Presentation2 2000
Presentation2 2000Presentation2 2000
Presentation2 2000
suvobgd
 
Evolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation Models
Evolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation ModelsEvolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation Models
Evolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation Models
Editor IJCATR
 
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
ijnlc
 
Towards a formal analysis of the multi-robot task allocation problem using se...
Towards a formal analysis of the multi-robot task allocation problem using se...Towards a formal analysis of the multi-robot task allocation problem using se...
Towards a formal analysis of the multi-robot task allocation problem using se...
journalBEEI
 
Estimating markov model parameters from statistical analysis of speech packet...
Estimating markov model parameters from statistical analysis of speech packet...Estimating markov model parameters from statistical analysis of speech packet...
Estimating markov model parameters from statistical analysis of speech packet...
Alexander Decker
 
An Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalAn Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity Removal
Waqas Tariq
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
IRJET Journal
 
Development of Quranic Reciter Identification System using MFCC and GMM Clas...
Development of Quranic Reciter Identification System  using MFCC and GMM Clas...Development of Quranic Reciter Identification System  using MFCC and GMM Clas...
Development of Quranic Reciter Identification System using MFCC and GMM Clas...
IJECEIAES
 
Defuzzification
DefuzzificationDefuzzification
Defuzzification
Dr. C.V. Suresh Babu
 
SYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITION
SYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITIONSYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITION
SYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITION
csandit
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
eSAT Publishing House
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
eSAT Journals
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programming
eSAT Publishing House
 

What's hot (16)

Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
Performance Comparison of Automatic Speaker Recognition using Vector Quantiza...
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
Investigations on Hybrid Learning in ANFIS
Investigations on Hybrid Learning in ANFISInvestigations on Hybrid Learning in ANFIS
Investigations on Hybrid Learning in ANFIS
 
Presentation2 2000
Presentation2 2000Presentation2 2000
Presentation2 2000
 
Evolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation Models
Evolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation ModelsEvolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation Models
Evolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation Models
 
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
 
Towards a formal analysis of the multi-robot task allocation problem using se...
Towards a formal analysis of the multi-robot task allocation problem using se...Towards a formal analysis of the multi-robot task allocation problem using se...
Towards a formal analysis of the multi-robot task allocation problem using se...
 
Estimating markov model parameters from statistical analysis of speech packet...
Estimating markov model parameters from statistical analysis of speech packet...Estimating markov model parameters from statistical analysis of speech packet...
Estimating markov model parameters from statistical analysis of speech packet...
 
An Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalAn Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity Removal
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
Development of Quranic Reciter Identification System using MFCC and GMM Clas...
Development of Quranic Reciter Identification System  using MFCC and GMM Clas...Development of Quranic Reciter Identification System  using MFCC and GMM Clas...
Development of Quranic Reciter Identification System using MFCC and GMM Clas...
 
Defuzzification
DefuzzificationDefuzzification
Defuzzification
 
SYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITION
SYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITIONSYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITION
SYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITION
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programming
 

Similar to MODEL FOR INTRUSION DETECTION SYSTEM

Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
Iasir Journals
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
cscpconf
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
IJCSIS Research Publications
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
Alexander Decker
 
D03601023026
D03601023026D03601023026
D03601023026
theijes
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
cscpconf
 
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
dbpublications
 
Mobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategyMobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategy
Alexander Decker
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
cscpconf
 
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
csandit
 
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic FlowUsing Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
IJCSIS Research Publications
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
50120140504021
5012014050402150120140504021
50120140504021
IAEME Publication
 
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh NetworkRobustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Association of Scientists, Developers and Faculties
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
IJECEIAES
 
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
IJECEIAES
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Saad Bare
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
eSAT Publishing House
 
40120140507001
4012014050700140120140507001
40120140507001
IAEME Publication
 
40120140507001
4012014050700140120140507001
40120140507001
IAEME Publication
 

Similar to MODEL FOR INTRUSION DETECTION SYSTEM (20)

Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
D03601023026
D03601023026D03601023026
D03601023026
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
 
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
 
Mobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategyMobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategy
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
 
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
 
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic FlowUsing Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
50120140504021
5012014050402150120140504021
50120140504021
 
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh NetworkRobustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack ...
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
40120140507001
4012014050700140120140507001
40120140507001
 
40120140507001
4012014050700140120140507001
40120140507001
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
cscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
cscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
cscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
cscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
cscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
cscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
cscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
cscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
cscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
cscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
cscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
cscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 

Recently uploaded (20)

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 

MODEL FOR INTRUSION DETECTION SYSTEM

  • 1. Sundarapandian et al. (Eds): CoNeCo,WiMo, NLP, CRYPSIS, ICAIT, ICDIP, ITCSE, CS & IT 07, pp. 95–101, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2409 MODEL FOR INTRUSION DETECTION SYSTEM Neha Rani1 , Pankaj Sharma2 and Ashok Kumar Sinha3 1 Department of CSE, ABES Engineering College, Ghaziabad (U.P.), India. nehachandel83@gmail.com 2 Department of IT, Sr. Asst. Professor, ABES Engineering College, Ghaziabad (U.P.), India. sharma1.pk@gmail.com 3 Department of IT, Head of Department, ABES Engineering College, Ghaziabad (U.P.), India. aksinha@abes.ac.in ABSTRACT Advancement in wireless communications lead more and more mobile wireless networks e.g., mobile networks [mobile ad hoc networks (MANETs)], wireless sensor networks, etc. Some of the challenges in MANET include: Dynamic network topology, Speed, Bandwidth, computation capability, Scalability, Quality of service, Secure and Reliable routing. One of the most important challenges in mobile wireless networks is the Secure and reliable routing and the main characteristic of MANET with respect to security is the lack of clear line of defence. Therefore, the SP routing problem in MANET turns into dynamic optimization problem. In this paper, a path detection algorithm and a model to detect intruders that is misbehaving nodes in the alternative paths is proposed. KEYWORDS Mobile Ad Hoc Network (MANET), Intrusion Detection System (IDS), Shortest Path (SP), Genetic Algorithm (GA). 1. INTRODUCTION A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary/short-lived network where all nodes are free to move about arbitrarily and where all the nodes configure themselves. This type of networks is suited in situations where a fixed infrastructure is not available. A few areas of application are Military communications, Search and rescue operations, ecommerce, home and enterprise networking etc. In MANET, each node acts both as a router and as a host & even the topology of network may also change rapidly. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. Mobile networking is one of the most important technologies supporting pervasive computing. Generally there are two distinct approaches for enabling wireless mobile units to communicate with each other [3]: Infrastructured: Wireless mobile networks have traditionally been based on the cellular concept and relied on good infrastructure support, in which mobile devices communicate with access points like base stations connected to the fixed network infrastructure.
  • 2. 96 Computer Science & Information Technology ( CS & IT ) Infrastructureless: As to infrastructureless approach, the mobile wireless network is commonly known as an adhoc network or Mobile ad hoc network (MANET). There are many existing routing protocols available for MANET and those can be categorized as table driven approach (proactive) and on demand routing protocols (reactive) [6]. The reactive routing protocol a route is established only when a source node wants a route to destination node. 2. SECURITY IN MANET This section discusses some security goals and challenges that the field of ad hoc networking faces [1]. 2.1. Security Goals (a) Availability: It ensures that network will provide all services. Denial of Service is an attack to availability. (b) Confidentiality: It ensures that certain information is never leaked to unauthorised user. (c) Integrity: It enables that the message send by source received by destination without being modified or corrupted. (d) Authentication: It allows users to be sure about the identity of other to whom it is communicating. (e) Non-repudiation: It enables the sender of the message not to deny of sending the message and the receiver of the message cannot refuse from receiving it. (f) Access and usage control: It ensures that access to information is controlled by the ad hoc network. 2.2. Security Challenges The main security challenges that ad hoc networks face have been thoroughly analysed in the literature [1]. 2.2.1. Link attacks It includes attacks like • Passive eavesdropping • Message replay • Message corruption. s R Figure 1: Ad hoc network example. . Source Destination
  • 3. Computer Science & Information Technology ( CS & IT ) 97 2.2.2. Dynamic nature 2.2.3. Active Routing Attacks These kinds of attacks are very difficult to identify. Some of them are given below: • Black Hole • Routing Table Overflow • Resource Consumption 2.2.4. Scalability 2.2.5. Secure routing 2.2.6. Quality of Service 3. COMPARISION OF EXISTING PATH COMPUTING ALGORITHM WITH PROPOSED ALGORITHM At present there are number of adhoc routing protocols that follow dijkstra’s approach. This section is considering another algorithm, Floyd Warshall algorithm to find optimal path. The comparison of warshall’s algorithm with Dijkstra’s algorithm is presented as follows. • Dijkstra's finds the optimal route from one node to all other nodes and Floyd-Warshall finds the optimal route for all node pairings. • Dijkstra's runtime is O(E + VlogV) where Floyd's is O(V3 ). Running Dijkstra for all nodes (represented as number of vertices) gives O(VE + V^2logV). If E = O(V^2), then the two are theoretically identical, with Floyd being faster in practice. Moreover, Floyd- Warshall does very few operations in the inner-loop so in practice Floyd-Warshall runs faster than Dijkstra for All-Pairs Shortest Path. • Basically, Dijkstra’s algorithm is applied when there are as many edges as there are nodes i.e. E=O(V), and run Floyd’s algorithm is used if we expect to have almost complete graphs i.e. E=O(V^2). 4. OPTIMIZING THE RESULTANT PATH OBTAINED FROM THE PROPOSED ALGORITHM WITH GENETIC ALGORITHM Genetic Algorithm (GA), first introduced by John Holland in the early seventies, is the search algorithm based on the mechanics of natural selection process (biological evolution). The GA design involves several key components: genetic representation, population initialization, fitness function, selection scheme, crossover and mutation [4]. A routing path contains of sequence of nodes in network. The genetic algorithm is applied to paths that is been obtained from the proposed algorithm (in the next section). A routing path is encoded by a string of 0’s and 1’s. The length of the string should not be more than the number of nodes present in the network. 4.1. Population Initialization In GA each chromosome represents a potential solution and this can contain more than one solution initially [7]. The paths obtained from route discovery phase are considered as initial chromosomes.
  • 4. 98 Computer Science & Information Technology ( CS & IT ) 4.2. Fitness Function For a given solution, the quality is determined by the fitness function. Each chromosome is given a measure of fitness via a fitness function called as evaluation or objective function. The fitness of a chromosome determines its ability to survive and produce offspring. Our aim is to find the optimum path with lowest delay time. The fitness of each chromosome can be calculated as,[5 ] Where, Ch= chromosome fitness value, RF=the delay time taken by each chromosome, COn = the cost of the path from source s to destination d. The above fitness function is been maximized and involves only shortest path and delay constraint. 4.3. Selection scheme Selection plays an important role in improving the average quality of the population by passing the high-quality chromosomes to the next generation. The selection of chromosome is based on the fitness value. 4.4. Crossover The generations of the new solutions are developed by two basic recombination operators- crossover and mutation. Crossover includes combining of parent chromosomes to produce children chromosomes. It combines the fittest chromosomes and passes superior gene to next generation. . eq 1 1 0 0 1 1 0 0 1 0 1 Fig 2: Initial chromosomes 1 0 0 0 0 1 0 1 1 1 Fig 3: Offsprings produced after crossover
  • 5. Computer Science & Information Technology ( CS & IT ) 99 4.5. Mutation Mutation includes altering some genes in chromosome. Mutation helps a GA keep away from local optima [2]. 5. STEPS FOR IMPLEMENTING THE PROPOSED MODEL This section presents the pseudocode of the proposed algorithm and the steps to be taken to optimize the path obtained using GA. 5.1. Pseudocode for computing shortest path #dist (i,j) is best distance so far from vertex i to vertex j. #k is the intermediate vertex #Start with single edge paths. For i=1 to n do For j=1 to n do dist (i,j) = weight(i,j) For k=1 to n do For i=1 to n do For j=1 to n do if (dist(i,k) + dist(k,j) < dist(i,j)) then #shortest path dist (i,j) = dist(i,k)+ dist(k,j) 5.2. Steps taken to optimize the path obtained using GA In this subsection a flowchart is presented that depicts the step to be taken to optimize the path obtained using Genetic algorithm. Fig 4: Child after mutation 1 0 1 0 1 0 0 1 0 1
  • 6. 100 Computer Science & Information Technology ( CS & IT ) Define cost function, cost, variables Generate initial population Decode chromosomes Find cost for each chromosome Select mates Mutation Mating Convergence Check Select GA parameters Check whether path is optimized? Done (store and record the path) YES NO Fig 5: Flowchart of a binary GA Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10
  • 7. Computer Science & Information Technology ( CS & IT ) 101 6. THE NEED AND SIGNIFICANCE OF PROPOSED MODEL The need of proposed model is to remove the challenges of MANET such as security and reliability. The proposed model can compute appropriate route for communication and capable to obtain optimal, secure and reliable route. This model can be implemented for MANET routing environment that will be secure, reliable, optimal for several real life environment such as disaster management, rescue operations, military battlefield etc. 7. CONCLUSION MANET is a self-organizing and self-configuring multihop wireless network, which has a wide usage nowadays. MANETs are an wide area for research with lots of practical applications. However, MANETs are vulnerable to attacks due to their dynamic topology, open medium etc. Thus security issue is becoming a main concern in the applications of MANET. According to the model It can be seen that after passing through the various steps of GA the information regarding the shortest path is optimized and provides the best and optimal path which will consider the problem of finding optimum path with least cost and least delay by using Genetic algorithm. It is hypothesized that the resultant path is more optimal and reliable with minimum of the malicious or misbehaving node in the system. REFERENCES [1] Haas, Z.J, Zhou, L. 1999 .Securing Ad hoc Networks. IEEE, Networks Magazine, Vol. 13, no 6, Nov. /Dec., 1999. [2] Ahn, C. W. and Ramakrishna, R.S. 2002. A genetic algorithm for shortest path routing problem and the sizing of populations. IEEE Trans. Evol. Comput. vol. 6, no. 6, pp. 566–579, Dec. 2002. [3] Jun-Zhao Sun. Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing. MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu, University of Oulu, Finland. [4] Yang, S., Cheng, H., and Wang, F. , Member IEEE. 2010. Genetic Algorithms with Immigrants and Memory Schemes for Dynamic Shortest Path Routing Problems in Mobile Ad Hoc Networks. In proc. IEEE transactions on systems, man, and cybernetics part C: applications and reviews, vol. 40, no. 1, January 2010, pp. 52-63. [5] Manikandan, K.., Saleem Durai, M.A., Suresh Kumar D. 2011. Secure On-Demand Routing Protocol for MANET using Genetic Algorithm. International Journal of Computer Applications (0975 – 8887) Volume 19– No.8, April 2011. [6] Yu, K.M, Yu, C.W, Yan, S.F. 2009. An Ad Hoc Routing Protocol with Multiple Backup Routes. In Proc. Springer Science+Business Media LLC. 1November 2009 [7] Randy L.Haupt, Sue Ellen Haupt (2004) 2nd Edition, Practical Genetic Algorithms, A JOHN WILEY & SONS, INC., Publication. Authors Neha Rani is currently pursuing M-Tech in Computer Science and Engineering from ABES Engineering College, affiliated to Maha Maya Technical University, Ghaziabad (U.P.) India and pursued her M.C.A. from A.K.G. Engineering College affiliated to Uttar Pradesh Technical University, Ghaziabad (U.P.) India. Her area of interest includes Mobile Ad hoc network and Genetic algorithm. Pankaj Kumar Sharma is working as a Senior Asst. professor in Department of Information Technology, ABES Engineering College, Ghaziabad (U.P.) India and pursued M.tech in Computer Science and Engineering from Uttar Pradesh Technical university, Lucknow, India. He has authored many international and national journal papers to his credit. His research interests include Mobile Ad hoc Network, fuzzy logic. He was the recipient of academic excellence award in M.tech. Ashok Kumar Sinha is working as a Head of Department in Department of Information Technology, ABES Engineering College, Ghaziabad (U.P.) India and pursued PhD in Computer Science and Engineering from IIT, Delhi. He has authored many international and national journal papers to his credit. His research interests include Artificial Intelligence, fuzzy logic, Mobile Ad hoc network, Digital Image processing and Cloud Computing.