2014 Iranian Conference on Intelligent Systems (ICIS) 2014
DOI: 10.1109/iraniancis.2014.6802607
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…The experimental results demonstrated that it is more efficient when compared to similar approaches [87].…”
Section: Other Ai Applicationsmentioning
confidence: 92%
See 1 more Smart Citation
“…The experimental results demonstrated that it is more efficient when compared to similar approaches [87].…”
Section: Other Ai Applicationsmentioning
confidence: 92%
“…They identified relevant requirements for an ideal cloud based IDPS: autonomic computing selfmanagement, ontology, risk management, and fuzzy theory [24]. Barani (2014) proposed GAAIS -a dynamic intrusion detection method for Mobile ad hoc Networks based on genetic algorithm and artificial AIS. GAAIS is self-adaptable to network topology changes.…”
Section: Other Ai Applicationsmentioning
confidence: 99%
“…In the work [22], a methodology named Genetic Algorithm (GA) and Artificial Immune System (AIS) (GAAIS) is proposed, for dynamic intrusion recognition in AODV-based MANETs. The execution of GAAIS is evaluated for recognizing a couple of sorts of directing attacks reenacted using the NS2 test framework, for instance, Flooding, Blackhole, Neighbor, Surging, and Wormhole.…”
Section: Comparative Study Of Defense Approaches In Current Scenariomentioning
confidence: 99%
“…Dilek et al [12] discussed Artificial Intelligence (AI) techniques to detect cyber-attacks like DDoS. In [13] both AI and Genetic Algorithm (GA) are used in order to have protection from different attacks. Intrusion detection methods in IoT [14], [17] and cyber security mechanisms [15], botnet control traffic detection [16], attack detection in Wireless Sensor Networks (WSNs) [18], Hybrid approach in attack detection in MANET [19] and detection methods for virtual jamming methods [20] are other solutions found in literature.…”
Section: Figure 1: Ddos Flooding Attack Scenario [21]mentioning
confidence: 99%