Intrusion Detection System in mobile ad hoc network in MAC layer / Nejlevnější knihy
Intrusion Detection System in mobile ad hoc network in MAC layer

Kód: 05285147

Intrusion Detection System in mobile ad hoc network in MAC layer

Autor Tapan Gondaliya

Master's Thesis from the year 2013 in the subject Computer Science - IT-Security, grade: C, Lovely Professional University (School Of Computer Science and Engineering), course: M.Tech(CSE), language: English, abstract: The rapid p ... celý popis

1307


Skladem u dodavatele
Odesíláme za 14-18 dnů
Přidat mezi přání

Mohlo by se vám také líbit

Dárkový poukaz: Radost zaručena

Objednat dárkový poukazVíce informací

Více informací o knize Intrusion Detection System in mobile ad hoc network in MAC layer

Nákupem získáte 131 bodů

Anotace knihy

Master's Thesis from the year 2013 in the subject Computer Science - IT-Security, grade: C, Lovely Professional University (School Of Computer Science and Engineering), course: M.Tech(CSE), language: English, abstract: The rapid proliferation of Mobile ad hoc network has changed the landscape of network security. The recent DOS attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology and cooperative algorithms, lack of centralized monitoring and management point and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective.§There are many intrusion detection techniques have been developed on Ad hoc network but have been turned to be inapplicable in this new environment. Here we need to search for new architecture and mechanisms to protect Mobile Ad hoc network. In the above all technique of intrusion detection is applied on the only one layer and that is probably on routing layer. But here we apply this intrusion detection system in the MAC layer for the more security, efficiency and high speed compare to other technique those whose apply in the network layer.

Parametry knihy

Zařazení knihy Knihy v angličtině Computing & information technology Computer security

1307

Oblíbené z jiného soudku



Osobní odběr Praha, Brno a 12903 dalších

Copyright ©2008-24 nejlevnejsi-knihy.cz Všechna práva vyhrazenaSoukromíCookies


Můj účet: Přihlásit se
Všechny knihy světa na jednom místě. Navíc za skvělé ceny.

Nákupní košík ( prázdný )

Vyzvednutí v Zásilkovně
zdarma nad 1 499 Kč.

Nacházíte se: