Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)
By
Jianhong Zhou
Jianhong Zhou
Search for other works by this author on:
ISBN:
9780791859735
No. of Pages:
970
Publisher:
ASME Press
Publication date:
2011

The nature of mobile computing environment in MANET makes it severely vulnerable to the malicious attacks by intruders. A compromised node can easily launch a denial of service attack by either dropping packets, as in blackhole attack, or by flooding the network with a large number of RREQs to invalid destinations in the network, as in flooding attack, thus trying to sabotage the other nodes or even the whole network. To combat with these adversaries, it is necessary to deploy an intrusion detection and response scheme. IDS with anomaly detection techniques use data mining to capture audit data and reason with the evidence in that data to determine whether the system is under attack. In this paper, a hierarchical data clustering scheme, using data mining for anomaly detection, is proposed for identifying the blackhole and flooding attacks in MANET, by observing the network packets.

Abstract
Keywords
1. Introduction
2. Hierarchical Clustering — BIRCH Algorithm
3. Proposed Scheme
4. Our Cluster Creation Approach
5. Conclusion
References
This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal