Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/574562
Title: | A Secure Multiphase Detection And Analysis of Malicious Node Behaviour in MANETs |
Researcher: | Deepthi,V S |
Guide(s): | Vagdevi, S |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2022 |
Abstract: | MANETs, or mobile ad hoc networks, are said to be decentralized with fewer infrastructures, with each device acting as a forwarding router and sending packets as routers do in the network. Whenever there is a need for data transfer, the node will identify its neighboring nodes and the data will transfer to the destination through them. Due to its major characteristics like its dynamic topology and insecure medium, it is prone to various categories of attacks. newlineThe most prevalent well-accepted and best routing mechanism which are having large usage in MANET is an AODV, an on-demand, routing. In many situations, an AODV standard is influenced by many attacks wherein the node intends to send fictitious routing reply information stating to the respective sender that it is having a very direct path to the receiver, but rather the intention is to drop the packet. These categories of attacks are called black-hole attacks. newlineIn this report, MANET s performance is investigated by considering single and also multiple Blackhole attacker nodes. And further, the intrusion detection system for identifying the blackhole attack is analyzed. The proposed methodologies are implemented in NS-2.35 and NS-3.25 platforms and the outcomes are discussed by considering various network configurations like average goodput, delay from end to end, the overall count of lost packets, and jitter. Results also demonstrated that the testing is carried out by using both UDP packets and TCP packets. newlineFurther, the various types of attacks are predicted by leveraging several machine learning methods and algorithms, and the capability of the learning approaches like accuracy , precision, and recall are analyzed with its results. As a result, the detection rates of Black hole attacks are discussed by changing the network settings like the count of attacker nodes, number of nodes, mobility range, energy consumption, and bandwidth. Different types of attacks are classified and learning model parameters are compared against the traditional machine learning ap |
Pagination: | 110 |
URI: | http://hdl.handle.net/10603/574562 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 31.83 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 210.2 kB | Adobe PDF | View/Open | |
03_content.pdf | 110.58 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 84.89 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 701.62 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 70.16 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 124.53 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 123.95 kB | Adobe PDF | View/Open | |
08_chapter 5.pdf | 29.71 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 176.91 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 527.16 kB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 288.78 kB | Adobe PDF | View/Open | |
13_chapter 8.pdf | 846.52 kB | Adobe PDF | View/Open | |
14_chapter 9.pdf | 29.74 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 72.67 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: