DSpace Repository

DETECTION AND CLASSIFICATION OF FLOODING ATTACKS IN WIRELESS ADHOC NETWORKS USING MACHINE LEARNING

Show simple item record

dc.contributor.author Shanifa, E
dc.contributor.author Nishanth, N
dc.date.accessioned 2022-10-17T10:02:40Z
dc.date.available 2022-10-17T10:02:40Z
dc.date.issued 2022-07
dc.identifier.uri http://210.212.227.212:8080/xmlui/handle/123456789/250
dc.description.abstract In developing wireless adhoc networks, several sorts of attacks represent serious security problems.Various forms of attacks are currently being carried out against various services and resources, with the goal of compromising their availability, confi dentiality, and integrity. Flooding based Denial of Service attacks has a serious impact on Wireless Local Area Networks. It may result in clients being denied service. This is a severe problem since it compromises one of the services offered by cyber security such as availability. In ad-hoc networks, it is crucial to detect and block such attacks in a timely manner. The objective of this thesis is to accurately detect and categorise flooding attacks such as TCP, UDP, or ICMP. This thesis additionally categorises ad ditional assaults, such as U2R, R2L, and probe .The suggested method utilises various supervised machine learning algorithms, including SVM, KNN, Naive Baye’s, Deci sion Tree, and Random Forest. Classification is performed using the NSL KDD data set. The outcome demonstrated that RF classifier provides the highest performance accuracy en_US
dc.language.iso en en_US
dc.relation.ispartofseries ;TKM20ECCS11
dc.title DETECTION AND CLASSIFICATION OF FLOODING ATTACKS IN WIRELESS ADHOC NETWORKS USING MACHINE LEARNING en_US
dc.type Technical Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account