International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 106    Submit Your Rating     Cite This   Download        Certificate

DATA MINING IN MANET

    2 Author(s):  SHASHI , DR. SHVETA CHHABRA.

Vol -  5, Issue- 3 ,         Page(s) : 74 - 77  (2014 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Data mining is very interesting and useful trend in computer networks. They have been much interest in applying data mining in MANETs The intrusion detection system of MANET can use data mining based architecture. This paper provides relation of data mining to MANET by intrusion detection system. This architecture also improves the efficiency and scalability of the IDS. We also present on architecture consisting of sensors, detectors, a data warehouse and model generation components.

order online

  1. Cliftom C, and G.Gengo [2000] “Developing custom Intrusion Detection Filters using Data mining ‘, 2000 military communications International, Los Angeles. California October 22-25.
  2. Dharalukshmi, Dr. M. Rajaram “A Reliable and secure name work for detection and Isolation of malicious nodes in MANET”, IJCSNC International Journal of computer science and network security vol.8 No.10, October 2008.
  3. Domingos, P, and G, Hulten [2000]. Mining High speed data streams”, in proceedings of the sixth ACM STGKDD Conference on knowledge Discovery and Data Mining p.71-80.
  4. Kejun Liu, Jing Deng, Member, IEEE, Promod K Varshney ,fellow ,IEEE and Kashyap Balakrishnan member, IEEE, “An Acknowledgment –Based approach for the diction of Routing Misbehavior in MANETs” IEEE Transactions on Mobile computing. VOL.6 No 5.May, 2007.
  5. Lee, W. and S, Stolfo [1998].”Data mining Approaches for Intrusion Detection “, in proceedings of the 7th USENIX security symposium, San Antonio, TX. 
  6. M.Conti and S.Giordano Mulihop ad hoc networking. The theory communications Magazine, IEEE,45(4): 78-86.April 2007
  7. Tomas krag and Sebastian Buettrich “wireless Mesh Networking “o’ Reilly wireless Dev center 

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details