Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot

被引:0
|
作者
Mondal A. [1 ]
Goswami R.T. [2 ]
机构
[1] Department of CSE, Techno International Batanagar
[2] Techno International New, Block-DG 1/1, Action Area 1, New Town, Rajarhat, West Bengal, Kolkata
关键词
ad-hoc networks; DDOS; denial of service attack and distributed denial of service attack; DOS; harmful activities; Honeypot; malicious attacks; malware intrusion; new detection and prevention; wireless network;
D O I
10.1504/IJCC.2023.130905
中图分类号
学科分类号
摘要
The traditional security system fails when a novel attack comes into the system. For efficient detection and prevention of malware threats and intrusion prevention framework, which will invigilate entire network activity, known attack identification and performance analysis can be made through it. After identification, it will send information to the concern of administrative authority. Honeypot can be designed as an intrusion detection system. In an ad-hoc network, this Honeypot technology can be used to collect malicious traffic activities. Our strategy is to track and avoid disseminating harmful activities in an ad hoc network utilising Honeypot technologies. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:308 / 323
页数:15
相关论文
共 50 条
  • [1] Detection of malicious node using Improved CONFIDANT Technique in Ad-hoc Networks
    Devi, Nirma
    Sunitha, R.
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 604 - 610
  • [2] Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks
    Zhong, Hong
    Yang, Fan
    Wei, Lu
    Zhang, Jing
    Gu, Chengjie
    Cui, Jie
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT III, 2022, 13473 : 249 - 260
  • [3] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
  • [4] The impact of malicious nodes on the performance of wireless Ad-hoc networks
    Hallani, Houssein
    Shahrestani, Seyed A.
    MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 596 - +
  • [5] Identifying Malicious Nodes in Mobile Ad-Hoc Networks using Polynomial Reduction Algorithm
    Varma, D. Arvind
    Narayanan, M.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1179 - 1184
  • [6] Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks
    Rajendran, Arunkumar
    Balakrishnan, Nagaraj
    Ajay, P.
    AD HOC NETWORKS, 2022, 126
  • [7] Utilizing behaviour history to right malicious nodes in wireless Ad-hoc networks
    Hallani, Houssein
    Shahrestani, Seyed A.
    INFORMATION MANAGEMENT IN THE NETWORKED ECONOMY: ISSUES & SOLUTIONS, 2007, : 81 - 87
  • [8] An Adaptive Real-Time Malicious Node Detection Framework Using Machine Learning in Vehicular Ad-Hoc Networks (VANETs)
    Rashid, Kanwal
    Saeed, Yousaf
    Ali, Abid
    Jamil, Faisal
    Alkanhel, Reem
    Muthanna, Ammar
    SENSORS, 2023, 23 (05)
  • [9] Securing ad-hoc networks using IPSec
    Ghosh, Abhrajit
    Talpade, Rajesh
    Elaoud, Moncef
    Bereschinsky, Michael
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2948 - 2953
  • [10] A partition detection system for mobile ad-hoc networks
    Ritter, H
    Winter, R
    Schiller, J
    2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 489 - 497