Explore chapters and articles related to this topic
Security Tools
Published in Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta, Information Security and Optimization, 2020
Keshav Kaushik, Rohit Tanwar, A. K. Awasthi
The packet analyzer is the second component of a packet sniffer, which shows all fields of the message. This can be done only when the packet analyzer understands the format and structure of all messages exchanged by communication protocols. In Figure 13.3, various fields of messages exchanged by the HTTP protocol are displayed. The packet analyzer understands the Ethernet frames format and identifies the internet protocol datagram. Finally, the packet analyzer understands the segment structure of TCP and extracts the HTTP message in the segment of TCP.
DIWGAN Optimized with Namib Beetle Optimization Algorithm for Intrusion Detection in Mobile Ad Hoc Networks
Published in IETE Journal of Research, 2023
Bala Krishnasamy, Latha Muthaiah, Johny Elma Kamali Pushparaj, Purnendu Shekhar Pandey
The packet analyzer is a key component of the intrusion detection engine for identifying attack patterns in the system. In an intrusion identification engine that is installed in a network, packets from multiple locations are collected and processed. Since a constant threshold value is ineffective and can produce inaccurate results, packet threshold values may change as MANET users change dynamically. To classify assault patterns, they must be dynamic and adaptive. The thresholding function is used to address this problem. When a packet arrives at the intrusion detection engine, it is then updated. ECSA, or the Enhanced Clonal Selection Algorithm, is used for precise and dynamic thresholding. ECSA is measured continuously. The entropy value is 0 when the outcome of ECSA is sure. Clonal selection is determined through Discrete Random Attribute along a set of outputs that are outputs as and it is calculated by Equation (1) where shows the probability for the outcome of the variable . depends on the mobile devices’ location and temporal data and their communication with nearby nodes. Each repetition includes a check of the packet header information. Table 2 depicts the total count of packet features used by the packet analyzer.