International Journal of Wireless and Ad Hoc Communication
IJWAC
2692-4056
10.54216/IJWAC
https://www.americaspg.com/journals/show/1439
2019
2019
Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence
Faculty of Artificial Intelligence, Egyptian Russian University (ERU), Cairo, Egypt
Mahmoud
Mahmoud
Faculty of Computers and Information, Sadat Academy for Management Sciences, Cairo, Egypt & French University in Cairo, Egypt
Nabil M.
Eldakhly
A wireless sensor network, also known as a WSN, is made up of thousands of minuscule sensor nodes that are connected to one another in order to monitor, track, and organize data collected in an unattended environment in the most prominent location. Due to its one-of-a-kind qualities, it has, the wireless sensor network is gaining traction in a variety of sectors and put to use in a wide range of applications, including surveillance, healthcare, and industry. These networks exposed to a variety of security flaws and major threats because of their dynamic design and deployment in an unsupervised environment. Cybercriminals prey on individuals who utilize the internet as well as organizations in order to get sensitive information. The hackers were able to access critical data on the company's systems, such as login information, credit card details, and bank account numbers. Phishing attacks are a sort of cyberattack in which hackers trick internet users into believing their websites are authentic in order to collect the users' private information. The purpose of these attacks is to steal this information. Malware assaults begin with the covert installation of malicious software on corporate servers or user PCs via the use of the internet. The attackers then continue to steal every piece of information that kept on the targeted server or computer. Malware used in an ever-increasing number of attacks these days. An incursion into a network is a kind of attack in which the perpetrator seeks to take possession of all of the network's resources. Approaches based on heuristic analysis and visual resemblance used, regardless of whether they are blacklisted or whitelisted.
2023
2023
18
33
10.54216/IJWAC.060202
https://www.americaspg.com/articleinfo/20/show/1439