Mobile Adhoc Network Risk Profiles-An overview of Existing Network Traffic Datasets to determine Ideal Axiom Criteria

Jedidiah Aqui
Jedidiah Aqui
Michael Hosein
Michael Hosein

Send Message

To: Author

Mobile Adhoc Network Risk Profiles-An overview of Existing Network Traffic Datasets to determine Ideal Axiom Criteria

Article Fingerprint

ReserarchID

CSTNWSZ7BR6

Mobile Adhoc Network Risk Profiles-An overview of Existing Network Traffic Datasets to determine Ideal Axiom Criteria Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

Abstract

A Mobile Adhoc networks also known as MANET or Wireless Adhoc Network is a network that usually has aroutable networking environment on top of a Link Layer ad hoc network. It consist of a set of mobile nodes connected wirelessly in a self-configured, self-healing network without having a fixed infrastructure. Recent studies and fieldwork have pointed in the direction of making MANETS a publicly viable option in the event of another world event/crisis such as the recent COVID-19 pandemic. As opposed to their traditional military and emergency uses, this has become a focal point due to the evident strain that was observed on mainstream Internet Service Providers as substantial adjustments had to be made to facilitate a new ‘working-from-home’ public. A primary aspect that must be considered before public adoption is addressing the issue of MANET risk and Security which leads into identifying and classifying risks associated with MANETS.

Generating HTML Viewer...

References

22 Cites in Article
  1. Michael Hosein,Laura Bigram (2013). An Educational Bluetooth Quizzing Application in Android.
  2. M Hosein (2015). Using Wireless Technology for Quick Distribution of Wireless and Mobile Course Notes and Other Resources.
  3. D Granger,M Hosein (2018). WI-FI DIRECT AS A MOBILE STUDENT QUIZZING PLATFORM-A Case Study.
  4. M Hosein,Ramdass (2022). Wi-fi Direct Applications within a Post Covid Classroom-Bridging the Gap between Fully Online and Face to Face Learning.
  5. Jedidiah Aqui,Michael Hosein (2021). Investigating Simultaneous Wireless Connections for a Quiz Management System-A Case Study.
  6. Jedidiah Aqui,Michael Hosein (2021). An Approach to Establishing Simultaneous Server-Side Connections for NFC/Bluetooth enabled Quiz Management Systems.
  7. Jedidiah Aqui,Michael Hosein (2021). A Probabilistic determination of Resilience of QMS’s Simultaneous Server-Side Connections Approaches/Methodologies.
  8. H Michael,A Jedidiah (2022). Mobile Adhoc Networks -An Overview of Risk Identification, Intrusion Detection and Machine Learning Techniques used.
  9. J Aqui,M Hosein (2022). Mobile Ad-hoc Networks Topic Modelling and Dataset Querying.
  10. A Jedidiah,H Michael (2022). Mobile Adhoc Networks -Establishing Initial Risk Profiles utilizing ML Techniques.
  11. Juan Rojas,Adrian Pekar,Alvaro Rendon,Juan Corrales (2020). Smart User Consumption Profiling: Incremental Learning-Based OTT Service Degradation.
  12. Tatcha Sudtasan,Hitoshi Mitomo (2016). The Internet of Things as an accelerator of advancement of broadband networks: A case of Thailand.
  13. V Carela-Espan˜ol (2014). Network traffic classification?: From theory to practice.
  14. Iman Sharafaldin,Arash Habibi Lashkari,Ali Ghorbani (2018). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
  15. Carson Brown,Alex Cowperthwaite,Abdulrahman Hijazi,Anil Somayaji (2009). Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT.
  16. S Mishra (2022). Network intrusion detection system.
  17. N Moustafa,J Slay (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems.
  18. Nour Moustafa,Jill Slay (2016). The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set.
  19. Nour Moustafa,Jill Slay,Gideon Creech (2019). Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks.
  20. N Moustafa,G Creech,J Slay (2017). Big Data Analytics for Intrusion Detection System: Statistical decision-making using finite Dirichlet mixture models.
  21. Aikaterini Mitrokotsa,Christos Dimitrakakis (2013). Intrusion detection in MANET using classification algorithms: The effects of cost and model selection.
  22. Gulab Sah,Sweety Singh,Subhasish Banerjee (2022). Intrusion Detection System Using Classification Algorithms with Feature Selection Mechanism over Real-time Data Traffic.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Jedidiah Aqui. 2026. \u201cMobile Adhoc Network Risk Profiles-An overview of Existing Network Traffic Datasets to determine Ideal Axiom Criteria\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 23 (GJCST Volume 23 Issue E3).

Download Citation

Adhoc network security risks and traffic data analysis for mobile wireless networks.
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification ACM: C.2.1
C.2.3
C.4
Version of record

v1.2

Issue date
December 25, 2023

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 1859
Total Downloads: 62
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Mobile Adhoc Network Risk Profiles-An overview of Existing Network Traffic Datasets to determine Ideal Axiom Criteria

Jedidiah Aqui
Jedidiah Aqui
Michael Hosein
Michael Hosein

Research Journals