The Research of Perceptron Based Intrusion Detection System

Gang Shi, YuLiang Zhao

Abstract


In this research, it uses an AODV routing protocol for the analysis. It explains the route discovery phase in the AODV protocol and highlight the vulnerabilities in it that can be exploited by an attacker. It then investigates the impact of a malicious route flood attack on the network. It use an AODV routing protocol for our analysis, explains the route discovery phase in the AODV protocol and highlight the vulnerabilities in it that can be exploited by an attacker. It then investigates the impact of a malicious route flood attack on the network.


DOI
10.12783/dtetr/apetc2017/10907

Full Text:

PDF

Refbacks

  • There are currently no refbacks.