Affiliation:
1. Government Arts College (Autonomous), India
Abstract
Network security has become more important and the growing rate of network attacks together with hacker, cracker, and criminal enterprises are increasing, that impact to the availability, confidentiality, and integrity of vital information data. In order to understand and defend against network attacks, it is necessary to understand the kind of attack. This chapter focuses on the provisioning of a method for the analysis and categorization of both computer and network attacks, thus providing assistance in combating new attacks, improving computer and network security as well as providing consistency in language when describing attacks. Attacks are thus attempts by unauthorized individuals to access or modify information, to deceive the system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. During this chapter we tend to area unit providing the elucidation against black hole attack that relies on fuzzy rule in case study section.
Reference39 articles.
1. Al-Shurman & Yoo. (2004). Black Hole Attack in Mobile Ad Hoc Networks. ACMSE’04.
2. An on-demand secure routing protocol resilient to byzantine failures
3. A Trust Based Model to Mitigate Black Hole Attacks in DSR Based Manet;N.Bhalaji;European Journal of Scientific Research,2011
4. Biswas & Ali. (2007). Security Threats in Mobile Ad-Hoc Network. (Master Thesis). Blekinge Institute of Technology Sweden.
5. Cross-Layered Security Analysis of Wireless Ad Hoc Networks;A.Cardenas;Proc. of 24th Army Science Conference,2004
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献