Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot

被引:0
|
作者
Mondal A. [1 ]
Goswami R.T. [2 ]
机构
[1] Department of CSE, Techno International Batanagar
[2] Techno International New, Block-DG 1/1, Action Area 1, New Town, Rajarhat, West Bengal, Kolkata
关键词
ad-hoc networks; DDOS; denial of service attack and distributed denial of service attack; DOS; harmful activities; Honeypot; malicious attacks; malware intrusion; new detection and prevention; wireless network;
D O I
10.1504/IJCC.2023.130905
中图分类号
学科分类号
摘要
The traditional security system fails when a novel attack comes into the system. For efficient detection and prevention of malware threats and intrusion prevention framework, which will invigilate entire network activity, known attack identification and performance analysis can be made through it. After identification, it will send information to the concern of administrative authority. Honeypot can be designed as an intrusion detection system. In an ad-hoc network, this Honeypot technology can be used to collect malicious traffic activities. Our strategy is to track and avoid disseminating harmful activities in an ad hoc network utilising Honeypot technologies. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:308 / 323
页数:15
相关论文
共 50 条
  • [1] Effects of Malicious Attacks in Mobile Ad-hoc Networks
    Kanthe, Ashok M.
    Simunic, Dina
    Prasad, Ramjee
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 1 - 5
  • [2] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [3] Detection of malicious node using Improved CONFIDANT Technique in Ad-hoc Networks
    Devi, Nirma
    Sunitha, R.
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 604 - 610
  • [4] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
  • [5] Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders
    Hoang, Tiep M.
    Trinh van Chien
    Thien van Luong
    Chatzinotas, Symeon
    Ottersten, Bjoern
    Hanzo, Lajos
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1010 - 1023
  • [6] A Novel Approach for Malicious Nodes Detection in Ad-hoc Networks Based on Cellular Learning Automata
    Aghababa, Amir Bagheri
    Fathinavid, Amirhosein
    Salari, Abdolreza
    Zavareh, Seyedeh Elaheh Flaghayegh
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 82 - 88
  • [7] Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks
    Jo, Minho
    Han, Longzhe
    Kim, Dohoon
    In, Hoh Peter
    IEEE NETWORK, 2013, 27 (03): : 46 - 50
  • [8] CDAI: a novel collaborative detection approach for impersonation attacks in vehicular ad-hoc networks
    Pougajendy, Jayashree
    Parthiban, Arun Raj Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5547 - 5562
  • [9] Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm
    Chandrasekar, V.
    Shanmugavalli, V.
    Mahesh, T. R.
    Shashikumar, R.
    Borah, Naiwrita
    Kumar, V. Vinoth
    Guluwadi, Suresh
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [10] A Cross-Layer based Hidden Marko(C-HMM) Model for Detection and Prevention of Malicious Attacks in Wireless Ad-hoc Networks
    Jagadeesan, S.
    Manjula, R.
    Johnpeter, T.
    2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,