A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs.
Zulfiqar Ali ZardariJingsha HeNafei ZhuKhalid Hussain MohammadaniMuhammad Salman PathanMuhammad Iftikhar HussainMuhammad Qasim MemonPublished in: Future Internet (2019)
Keyphrases
- attack detection
- intrusion detection system
- intrusion detection
- multistage
- network security
- computer networks
- cyber attacks
- anomaly detection
- attack scenarios
- network traffic
- connected dominating set
- network attacks
- network intrusion detection
- cyber security
- network intrusion detection systems
- distributed intrusion detection
- dominating set
- computer systems
- product recommendation
- ad hoc networks
- routing protocol
- misuse detection
- data mining techniques
- knowledge discovery