Learn More
There is widespread concern that large-scale malicious attacks on computer networks could cause serious disruption to network services. We present the design of GrIDS Graph-Based Intrusion Detection System. GrIDS collects data about activity on computers and network traac between them. It aggregates this information into activity graphs which reveal the(More)
Recently there has been an influx of work on extending a wireless sensor networks lifetime by distributing source compression and deploying non-homogeneous nodes to handle the aggregation. Both of these mechanisms have been shown to increase the network's lifetime, but they each have requirements that might not be plausible. With distributed source(More)
Mobile Ad-Hoc Networks (MANETS) are dynamic in nature. It is well known fact that dynamic nature of network infrastructure (of MANETS) results in the highly vulnerable to attacks. Among these attacks, routing attack has considerable attention, since it could cause most destructive damage to MANET. A lot of work is going on in the area of Intrusion(More)
  • 1