Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • Browse DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Laala, Youcef"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    A Reinforcement learning based intrusion detection system for MANETs
    (University of Oum El Bouaghi, 2023) Laala, Youcef; Nasri, Ahlem
    The attention given to mobile ad hoc networks (MANET) is currently significant owing to their potential to significantly influence various real-world applications, including banking, medicine, and even the military sector. With the increasing use of MANETs in various applications, securing these networks against malicious intrusions has become a major concern. Intrusion detection systems (IDS) are among the best solutions to address intrusions and malicious behaviors. However, traditional intrusion detection systems often struggle to cope with the dynamic and decentralized nature of MANETs. In this thesis, we propose a new approach to intrusion detection in MANETs using reinforcement learning (RL). We leverage RL capabilities to enable the system to learn from its interactions with the environment and improve its detection accuracy over time. The obtained results demonstrate its effectiveness in detecting several categories of intrusions while minimizing false positives. Moreover, the system exhibits adaptability and robustness to changes in network conditions and attack strategies.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback