Narrow your search
Listing 1 - 4 of 4
Sort by

Book
A study of black hole attack solutions
Authors: --- --- ---
ISBN: 0128053674 0128053798 9780128053799 9780128053676 Year: 2016 Publisher: Waltham, MA Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method


Book
A machine-learning approach to phishing detection and defense
Authors: --- ---
ISBN: 0128029463 0128029277 1322480850 9781322480855 9780128029466 9780128029275 Year: 2014 Publisher: Amsterdam Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organiza


Digital
A machine-learning approach to phishing detection and defense
Authors: --- ---
ISBN: 1322480850 9781322480855 9780128029466 0128029463 Year: 2014 Publisher: Amsterdam Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.

Keywords


Digital
A study of black hole attack solutions : on AODV routing protocol in MANET
Authors: --- --- ---
ISBN: 9780128053799 0128053798 Year: 2016 Publisher: Waltham, MA Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Annotation

Keywords

Listing 1 - 4 of 4
Sort by