International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Detection Of Dos Attacks Through Evidence Collection Using Dempster-Shafer Theory

Author :Shradha S. Ippakayal, Geetanjali S. Dhaygude, Vinaya P. Kalyanshetty, M.N.Ingole

Article Citation :Shradha S. Ippakayal ,Geetanjali S. Dhaygude ,Vinaya P. Kalyanshetty ,M.N.Ingole , (2015 ) " Detection Of Dos Attacks Through Evidence Collection Using Dempster-Shafer Theory " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 141-143, Volume-3, Issue-6

Abstract : MANETs has been experiencing exponential growth in the past decade. Due to their vulnerability to various attack makes extremely prominent for its distributed and independent nature. Among these various DOS attacks black hole, grey hole, and co-operative black hole attack may collapse the network, and this may become a major threat in MANETs. Here we are using Dempster-Shafer evidence based theory to collect various evidences for various nodes in the network against black hole and grey hole attack. For detecting malicious node we used Direct Trust Value (DTV) to detect a single black hole attack. DTV is calculated for each node that exists in the network and then that value is compared against predetermined threshold, if the calculated value is less then predetermined threshold then the node is malicious node. Keywords- Mobile Ad-hoc network, grey hole attack, Black hole attack, Packet forwarding.

Type : Research paper

Published : Volume-3, Issue-6


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2375   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 76
| Published on 2015-06-17
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY