Professional Documents
Culture Documents
Pro Zaa PDF
Pro Zaa PDF
by Zekarias Mulugeta
ID no (SGSE/0460/12)
presentation Mar,2020
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET1 / 20
Outline
1 Introduction
2 statment of the problem
3 objective
4 Literature Review
5 Methodology
6 Significance
7 Scope and limitation.
8 conclusion
9 conclusion
10 Reference
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET2 / 20
Introduction background
introduction
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET3 / 20
Introduction
overview
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET4 / 20
Introduction overview
cont.....
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET5 / 20
statment of the problem
objective
General Objective
The main objective of this research is to Increase identification of
cheat node mechanism for successful application area of mobile ad
hoc network..
Specific Objective
Decrease risk of mobile ad hoc network application area.
To control packet lose between communication nodes.
To design quick identification of cheat nod.
Increase trust between communications of MANET
Increase network performance effectiveness.
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET7 / 20
Literature Review Literature Review
Literature Review
LincyEliebth and Jim Chacko [1] proposed decision tree and fuzzy
logic
=> for secure application increase packet delivery ratio.
The authors [2] proposed single and multiple attack scenarios
=>using behavioral analysis and distributed trust algorithm
identify 4 major attack in MANET .
Drs.Gopalakrishnan and Dr.A Rajesh [3]
=>proposed cluster formation and cluster agent selection with
intrusion detection map
=>proving its efficiency over different loads, traffics and security
levels from other DRINA and OEERP
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET8 / 20
Literature Review overview
cont.....
(wollo university) An optimized decision tree based approach for intrusion presentation
detection system
Mar,2020
In MANET9 / 20
Methodology Methodology
Methodology
cont.....
cont.....
design Methodology
The procedure that focuses step by step the way to maximize
identification of cheat node in MANETs
cont..
Significance
used for :-
==> Enables for mobile ad hoc network application more efficient .
==> Enables to maximize the cooperation between nods.
==>To improve network security using quick cheat node
identification mechanism
==> To enable enhancing packet delivery ratio between nodes.
The proposed system does not consider the power issue related
to each node because to include this it is time consume and
complex.
It focus only increasing selfish node identification by using source
and intermediate node as vindictive to increase node cooperation
and efficient application in mobile ad hoc network.
work plan
work plan
budget
Reference
[1] Lincy Eliebth and Jim Chacko “decision tree based AIS
strategy for Intrusion Detection in MANET,”2019 IEE Region 10
conference (TENCON 2019)
Reference I
Reference II