DATA MINING IN MANET
2
Author(s):
SHASHI , DR. SHVETA CHHABRA.
Vol - 5, Issue- 3 ,
Page(s) : 74 - 77
(2014 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
Data mining is very interesting and useful trend in computer networks. They have been much interest in applying data mining in MANETs The intrusion detection system of MANET can use data mining based architecture. This paper provides relation of data mining to MANET by intrusion detection system. This architecture also improves the efficiency and scalability of the IDS. We also present on architecture consisting of sensors, detectors, a data warehouse and model generation components.
- Cliftom C, and G.Gengo [2000] “Developing custom Intrusion Detection Filters using Data mining ‘, 2000 military communications International, Los Angeles. California October 22-25.
- Dharalukshmi, Dr. M. Rajaram “A Reliable and secure name work for detection and Isolation of malicious nodes in MANET”, IJCSNC International Journal of computer science and network security vol.8 No.10, October 2008.
- Domingos, P, and G, Hulten [2000]. Mining High speed data streams”, in proceedings of the sixth ACM STGKDD Conference on knowledge Discovery and Data Mining p.71-80.
- Kejun Liu, Jing Deng, Member, IEEE, Promod K Varshney ,fellow ,IEEE and Kashyap Balakrishnan member, IEEE, “An Acknowledgment –Based approach for the diction of Routing Misbehavior in MANETs” IEEE Transactions on Mobile computing. VOL.6 No 5.May, 2007.
- Lee, W. and S, Stolfo [1998].”Data mining Approaches for Intrusion Detection “, in proceedings of the 7th USENIX security symposium, San Antonio, TX.
- M.Conti and S.Giordano Mulihop ad hoc networking. The theory communications Magazine, IEEE,45(4): 78-86.April 2007
- Tomas krag and Sebastian Buettrich “wireless Mesh Networking “o’ Reilly wireless Dev center
|