2014 IEEE International Conference on Computational Intelligence and Computing Research 2014
DOI: 10.1109/iccic.2014.7238505
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection for MANET to detect unknown attacks using Genetic algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Game Theory can also be used for trust management between the nodes participating in detection of threats in the system. Genetic Algorithms have a better detection rate as shown in [36,37,38] than Evolution Strategies [35] although both technologies follow a similar apporach. GA algorithms are behaving effectively, from resources allocation and execution time [18], for feature reduction.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Game Theory can also be used for trust management between the nodes participating in detection of threats in the system. Genetic Algorithms have a better detection rate as shown in [36,37,38] than Evolution Strategies [35] although both technologies follow a similar apporach. GA algorithms are behaving effectively, from resources allocation and execution time [18], for feature reduction.…”
Section: Discussionmentioning
confidence: 99%
“…This indicates that the Evolutionary approach GA follows is effective against detecting different types of attacks as well as different variations of the same attack. Also, GA is able to detect other types of (D)DoS attacks such as Grayhole and packet GT [32] (D)DoS Attacks Prevention GT [33] (D)DoS Attacks Prevention EA [34] SIP Flooding Attacks 82.17% and 77.00% ES [35] Darpa (D)DoS attacks No Results GA [36] Blackhl. & Packt.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation