Vineet Richariya

Learn More
Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. The impact of phishing is drastic(More)
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR are used. As(More)
Intrusion detection is a process of identifying the Attacks. The main aim of IDS is to identify the Normal and Intrusive activities. In recent years, many researchers are using data mining techniques for building IDS. Here we propose a new approach using data mining technique such as SVM and Particle swarm optimization for attaining higher detection rate.(More)
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine(More)
Intrusion detection is a process of identifying the Attacks in the networks. The main aim of IDS is to identify the Normal and Intrusive activities. In recent years, many researchers are using data mining techniques for building IDS. Due to the non-linearity and quantitative or qualitative network data traffic IDS is complicated. For making the IDS(More)
The conservation of energy and the improvement in lifetime of the network has been a challenging task in Mobile Ad hoc Networks (MANET) due to their dynamic and un-predictable behavior and topology change. A route selection and packet drop due to limited buffer(queue) size are two important factor that causes energy consumption by handling retransmission of(More)