Friday, 1 August 2008

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTERS
Transactions ID Number: 31-262
Full Name: KIRAN SREE POKKULURI
Position: Professor
Age: ON
Sex: Male
Address: S.R.K.Institute of Technology, ENIKEPADU, VIJAYAWADA
Country: INDIA
Tel:
Tel prefix:
Fax:
E-mail address: drkiransree@gmail.com
Other E-mails: profkiran@yahoo.com
Title of the Paper: Power-Aware Hybrid Intrusion Detection System (PHIDS) using Cellular Automata in Wireless Ad Hoc Networks
Authors as they appear in the Paper: P. KIRAN SREE 1 , Dr I Ramesh Babu2, Dr J.V.R.Murty3Dr. R.Ramachandran4, N.S.S.S.N Usha Devi5
Email addresses of all the authors: profkiran@yahoo.com,drirameshbabu@gmail.com,kkdmurty@rediffmail.com,usha_nedunuri@yahoo.com
Number of paper pages: 27
Abstract: Ad hoc wireless network with their changing topology and distributed nature are more prone to intruders. The network monitoring functionality should be in operation as long as the network exists with nil constraints. The efficiency of an Intrusion detection system in the case of an ad hoc network is not only determined by its dynamicity in monitoring but also in its flexibility in utilizing the available power in each of its nodes. In this paper we propose a hybrid intrusion detection system, based on a power level metric for potential ad hoc hosts, which is used to determine the duration for which a particular node can support a network-monitoring node. Power –aware hybrid intrusion detection system focuses on the available power level in each of the nodes and determines the network monitors. Power awareness in the network results in maintaining power for network monitoring, with monitors changing often, since it is an iterative power-optimal solution to identify !
nodes for distributed agent-based intrusion detection. The advantage that this approach entails is the inherent flexibility it provides, by means of considering only fewer nodes for re-establishing network monitors. The detection of intrusions in the network is done with the help of Cellular Automata (CA). The CA's classify a packet routed through the network either as normal or an intrusion. The use of CA's enable in the identification of already occurred intrusions as well as new intrusions.
Keywords: Cellular Automata, Intrusion, Adhoc Networks
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 59.98.116.61