{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:06:32Z","timestamp":1760609192991,"version":"3.40.5"},"reference-count":27,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>The topology changes randomly and dynamically in a mobile adhoc network (MANET). The composite characteristics of MANETs makes it exposed to interior and exterior attacks. Avoidance support techniques like authentication and encryption are appropriate to prevent attacks in MANETs. Thus, an authoritative intrusion detection model is required to prevent from attacks. These attacks can be at either the layers present in the network or can be of a general attack. Many models have been developed for the detection of intrusion and detection. These models aim at any one of the layer present in the network. Therefore, effort has been made to consider either the layers for the detection of intrusion and detection. This article uses a multigranular rough set (MGRS) for the detection of intrusion and detection in MANET. The advantage of MGRS is that it can aim at either the layers present in the network simultaneously by using multiple equivalence relations on the universe. The proposed model is compared with many traditional models and attained higher accuracy.<\/jats:p>","DOI":"10.4018\/ijisp.2019100103","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T14:33:27Z","timestamp":1568385207000},"page":"28-52","source":"Crossref","is-referenced-by-count":4,"title":["A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set"],"prefix":"10.4018","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3943-604X","authenticated-orcid":true,"given":"N. Syed Siraj","family":"Ahmed","sequence":"first","affiliation":[{"name":"VIT University, Vellore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3828-2050","authenticated-orcid":true,"given":"Debi Prasanna","family":"Acharjya","sequence":"additional","affiliation":[{"name":"School of Computing Sciences and Engineering,VIT University, Vellore, India"}]}],"member":"2432","reference":[{"key":"IJISP.2019100103-0","unstructured":"Acharjya, D. P. (2013). Rough computing based information retrieval in knowledge discovery databases. In Information and Knowledge Management-Tools, Techniques and Practices (pp. 123-153)."},{"issue":"4","key":"IJISP.2019100103-1","first-page":"331","article-title":"A rough computing based performance evaluation approach for educational institutions","volume":"7","author":"D. P.Acharjya","year":"2013","journal-title":"International Journal of Software Engineering and Its Applications"},{"issue":"12","key":"IJISP.2019100103-2","first-page":"267","article-title":"Detection of Denial of Service Attacks in Wireless Network using Dominance based Rough Set","volume":"6","author":"N. S. S.Ahmed","year":"2015","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"2","key":"IJISP.2019100103-3","first-page":"45","article-title":"A dominance based rough set approach for the detection of jamming attack","volume":"1","author":"N. S. S.Ahmed","year":"2015","journal-title":"International Journal of Philosophies in Computer Science"},{"key":"IJISP.2019100103-4","doi-asserted-by":"publisher","DOI":"10.1504\/IJCNDS.2017.082105"},{"issue":"3","key":"IJISP.2019100103-5","first-page":"514","article-title":"A new intrusion detection system based on soft computing techniques using neuro-fuzzy classier for packet dropping attack in MANET","volume":"18","author":"A.Chaudhary","year":"2015","journal-title":"International Journal of Network Security"},{"key":"IJISP.2019100103-6","first-page":"345","article-title":"A co-operative intrusion detection system for sleep deprivation attack using neuro-fuzzy classier in mobile ad hoc networks","volume":"2","author":"A.Chaudhary","year":"2015","journal-title":"Computational Intelligence in Data"},{"issue":"3","key":"IJISP.2019100103-7","first-page":"68","article-title":"Flooding attacks prevention in MANET","volume":"1","author":"N. S.Chouhan","year":"2011","journal-title":"International Journal of Computer Technology and Electronics Engineering"},{"key":"IJISP.2019100103-8","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2015.04.04"},{"key":"IJISP.2019100103-9","doi-asserted-by":"publisher","DOI":"10.1080\/03081079008935107"},{"key":"IJISP.2019100103-10","first-page":"22","article-title":"Dynamic Intrusion Detection Method for Mobile Ad Hoc Network using CPDOD Algorithm. International Journal of Computer Applications","author":"F. A.Fattah","year":"2010"},{"issue":"5","key":"IJISP.2019100103-11","first-page":"9395","article-title":"Proposed Lightweight Sybil Attack Detection Technique in MANET, International Journal of Advanced Research in Electrical","volume":"3","author":"R.Garg","year":"2014","journal-title":"Electronics and Instrumentation Engineering"},{"key":"IJISP.2019100103-12","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(01)00147-3"},{"key":"IJISP.2019100103-13","doi-asserted-by":"publisher","DOI":"10.4018\/ijrsda.2014070104"},{"issue":"1","key":"IJISP.2019100103-14","first-page":"42","article-title":"Feature Analysis for Intrusion Detection in Mobile Ad Hoc Networks","volume":"12","author":"P.Kabiri","year":"2011","journal-title":"International Journal of Network Security"},{"key":"IJISP.2019100103-15","first-page":"198","article-title":"A Scheme to Control Flooding of Fake Route Requests in Ad Hoc Networks","author":"J.Kataria","year":"2006","journal-title":"Third International Conference on Computers and Devices for Communications"},{"key":"IJISP.2019100103-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2009.06.011"},{"key":"IJISP.2019100103-17","first-page":"1","article-title":"Intrusion Detection in Mobile Ad Hoc Networks using Classification Algorithms","volume":"5","author":"A.Mitrokotsa","year":"2008","journal-title":"International Journal of Wireless Ad Hoc and Sensor Network"},{"key":"IJISP.2019100103-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.06.016"},{"key":"IJISP.2019100103-19","doi-asserted-by":"publisher","DOI":"10.1007\/BF01001956"},{"key":"IJISP.2019100103-20","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(02)00197-4"},{"key":"IJISP.2019100103-21","first-page":"297","article-title":"Rough Set Method based on Mutli-Granulation","author":"Y. H.Qian","year":"2006","journal-title":"Proceedings of the 5th IEEE Conference on Granular Computing"},{"key":"IJISP.2019100103-22","first-page":"1","article-title":"MGRS: A Multi-Granulation Rough Set","volume":"121","author":"Y. H.Qian","year":"2009","journal-title":"Information Sciences, Elsevier"},{"issue":"6","key":"IJISP.2019100103-23","first-page":"2206","article-title":"Elimination of Jamming Attack in Ad Hoc Environment, International Journal of Science","volume":"4","author":"M.Sharma","year":"2015","journal-title":"Engineering and Technology Research"},{"issue":"3","key":"IJISP.2019100103-24","first-page":"218","article-title":"A Brief Introduction of Different Type of Security Attacks Found in Mobile Ad Hoc Network","volume":"4","author":"S.Shrivastava","year":"2013","journal-title":"International Journal of Computer Science & Engineering Technology"},{"key":"IJISP.2019100103-25","first-page":"44","article-title":"A Survey of Attacks Happened at Different Layers of Mobile Ad Hoc Network and Some Available Detection Techniques","author":"M.Wazid","year":"2011","journal-title":"International Conference on Computer Communication and Networks"},{"key":"IJISP.2019100103-26","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(93)90048-2"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=237209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T09:59:05Z","timestamp":1651831145000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":27,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019100103","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}