مقاله انگلیسی رایگان در مورد سیستم تشخیص نفوذ هوشمند برای شناسایی گره مخرب توسط رمزنگاری – اسپرینگر ۲۰۱۷

مقاله انگلیسی رایگان در مورد سیستم تشخیص نفوذ هوشمند برای شناسایی گره مخرب توسط رمزنگاری – اسپرینگر ۲۰۱۷

 

مشخصات مقاله
انتشار مقاله سال ۲۰۱۷
تعداد صفحات مقاله انگلیسی ۱۳ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه اسپرینگر
نوع مقاله ISI
عنوان انگلیسی مقاله Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
ترجمه عنوان مقاله سیستم تشخیص نفوذ هوشمند برای شناسایی گره های مخرب توسط رمزنگاری منحنی در MANET
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی کامپیوتر و فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، شبکه های کامپیوتری
مجله محاسبه خوشه ای – Cluster Computing
دانشگاه IKG PTU – Kapurthala – Punjab – India
کلمات کلیدی سیستم تشخیص نفوذ هوشمند مبتنی بر اعتماد چند منظوره، شبکه های ad hoc موبایل (MANETs)، مدیریت اعتماد، الگوریتم رمزنگاری منحنی بیضی (ECC) و گره مخرب
کلمات کلیدی انگلیسی Multilevel trust based intelligent intrusion detection system, Mobile ad hoc networks (MANETs), Trust management, Elliptic curve cryptography (ECC) algorithm and malicious node
کد محصول E6668
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
۱ Introduction

MANETs have different aspects like security, IP addressing, routing, multiple access, service for handling wireless network communications. Network security is one of the major concerns in deploying the MANET applications, and thus, it gains interest among the researchers. In this section, the most important analysis is carried out in designing the secure framework, which would prevent the network from the attackers. Generally, MANETs are vulnerable in the operational functionality [1]; Interlopers can compromise the network activities by attacking any part of the network layers and Physical MAC; particularly, it affects network layer because of its poor routing algorithms, low-level batteries of the nodes, limited computational capacity of the nodes and undefined physical network location and short time nature of services in the wireless network [2]. Moreover, criterion followed for the measures of information security such as cryptography and key management scheme, have not given entire protection to the network [3]. Therefore, IDPS (intrusion and prevention system) are largely utilized to enhance the MANET security. An IDS is a combination of software and physical components, which highlights the system activities in order to identify undesirable activities and issues (Fig. 1). For example, illicit and destructive activity, that captures the activities of security policy failure and also identifies dissatisfactory level in the security mechanism [4]. IDS are mainly used for securing the network organization systems. The volatile development of the network frameworks can make the data exchange between the networks and computer, which is very crucial issues in the developing networking technology [5]. Meanwhile, it is a very difficult task to identify the attacker in the network which becomes hazardous in the network security, so, it needs to establish the proper procedure or protocol for security [6]. Intrusion generally refers to system attackers, which is causing vulnerable to various services such as hacking the information on the applications layer, host-based attack leads to login unapproved data or sensitive data that turns to be malware, viruses, worms and Trojan horses [7]. These types of attackers try to affect the confidentiality, integrity and accessibility of resources. Intrusions can also deny the administration’s activities, system network by neglecting responses to without reveal about the information being stolen or lost. Intrusion detection systems used for identifying unapproved resource utilization of a system and also discovers attackers on a system framework or networks.

ثبت دیدگاه