Full Length Article
DOI: https://doi.org/10.54216/IJWAC.090105
Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network
A novel honey pot deception trace back model, or honey pot IDS, is offered. The system is located on the server, which is the site of network intrusion deceptions. From there, it keeps an eye on all incoming traffic and uses nodes that carry out network weight age studies to continuously weigh the data. For every client connected to the server, it serves as a construct to look at the packet analysis and transmission path to which the IP processed the intrusion detection system. This LF-IDS detects intrusions using both anomaly-based and rule-based intrusion detection methods. By gathering and examining the packets from incoming traffic, the system initially collects data on the packet agent monitoring system. The trespasser is led to a honey pot that will be constructed as a mitigation site.
M. Gautham,
D. Chitra,
B. Samitha
visibility
2252
download
2447