The Research of Perceptron Based Intrusion Detection System
Abstract
In this research, it uses an AODV routing protocol for the analysis. It explains the route discovery phase in the AODV protocol and highlight the vulnerabilities in it that can be exploited by an attacker. It then investigates the impact of a malicious route flood attack on the network. It use an AODV routing protocol for our analysis, explains the route discovery phase in the AODV protocol and highlight the vulnerabilities in it that can be exploited by an attacker. It then investigates the impact of a malicious route flood attack on the network.
DOI
10.12783/dtetr/apetc2017/10907
10.12783/dtetr/apetc2017/10907
Full Text:
PDFRefbacks
- There are currently no refbacks.