[ns] mobile agent intrusion detection (IDS) for MObile ad hoc network (manet)

2006-08-18 Thread *bahareh NTC*

Hi there..
  iam trying to learn NS2 for simulate some IDS FOR manet,,is there any body 
that who could help me to find the best defult source code of differnet IDS in 
NS2 specilly for MANet,,or wireless network??
  ..
  if you give even simple guidline for me that are in the first level of 
learning NS2 is quite usefull
  thank you in adbanve
  BPZ


-
Do you Yahoo!?
 Get on board. You're invited to try the new Yahoo! Mail Beta.

-
Talk is cheap. Use Yahoo! Messenger to make PC-to-Phone calls.  Great rates 
starting at 1¢/min.


[ns] clustering+manet+source code

2006-08-19 Thread *bahareh NTC*

hi all
  is there any body that who knows which kind of clustering algorthm is more 
pupular or more usufull when we have aodv and Network intrusion detection  on 
cluser head and host intrion detection on cluster members for mobile ad hoc 
network??
  ,,,
  thank you
  if you have any refrence about the source code also plz help me by that
   


-
Do you Yahoo!?
 Next-gen email? Have it all with the  all-new Yahoo! Mail Beta.


[ns] how to run source codes in ns2??

2006-09-18 Thread *bahareh NTC*

  how to run NS2??,C++ and TCL language?  hi,
how can i run the defult example source code such as AODV routhing protocol in 
NS2,i am very new in NS2,i try to use tutorial website,but there is no mention 
about how to run the NS2 defults??
..one more quesiton is if i modify some sourcode do i need to modify C++ source 
code plus TCL(or even OTCL) or just one of them is enough??
thank you,
please let me know your email address or next contact.
thank you in advacne
regards 


-
Get your email and more, right on the  new Yahoo.com 


[ns] security of mobile ad hoc netowrk using intrusion detection system?

2006-09-18 Thread *bahareh NTC*

security of mobile ad hoc netowrk using intrusion detection system?  may you 
some one help me to find intrusion detection source code (specific) for mobile 
adhoc netowrk??
so far notting through the internet
iwant to simulate them using NS2,ofcource i prefer C++ and OTCL source code,and 
this intrusion detection is hierarchical mobile agent,anomaly +misuse 
,NIDS+HIDS ,,
one more quetion i found already alot of source code such as snort ,and so 
on,,but they are not specific for mobile ad hoc netowrk,
could you help me please and please let me know how can i continue my contanct 
with you,(your email address)
thank you in advance
regards 


-
Do you Yahoo!?
 Everyone is raving about the  all-new Yahoo! Mail.


[ns] RUNNNNNNNN source code

2006-09-21 Thread *bahareh NTC*

how can we run a simple file from the tcl library defult source code in ns2 
under linux and get out put result as a animated file of NAM??


-
Yahoo! Messenger with Voice. Make PC-to-Phone Calls to the US (and 30+ 
countries) for 2¢/min or less.


[ns] How to simulate and apply snort IDS source code in NS2??

2006-09-22 Thread *bahareh NTC*

Hello dear all
   
  May I ask you ,how to simulate and apply snort IDS open source code In ns2 
for wireless netowork??
  I dont know actually how to use Snort intrusoin detection source code in NS2?
  I want to apply it for my wireless network,but i dont know how?
  Thank you in advance
  regards
   
   


-
Get your email and more, right on the  new Yahoo.com 


[ns] Snort HIDS AND NIDS IN NS2

2006-09-22 Thread *bahareh NTC*

Hello dear all
  actually I am very new in both of ns2 and snort
   
  1.How to simulate and apply snort IDS open source code In ns2 for wireless  
ad hoc network??I dont know is there any way? and how??
Actually ,I dont know  how to use Snort intrusoin detection source code in 
NS2?
  I want to apply it for my wireless network,but i dont know how?

   
  2.Is there any specific IDS for wireless ad hoc  nework?? i read in articles 
but I just start to work,,I dnot know they mention that they used Snort 
Rule-based (Anomaly deteciton)
  basedon my basic information Snort is network based and it use signature 
based detection technique.
  3.So I like to know is there a way to change it to Anomaly based and 
Host-based IDS?? or there are already some open source IDS for my requested 
IDS???
   
  Thank you in advance
  Waitng for  reply
  all the best

regards
   
  bahareh


-
Talk is cheap. Use Yahoo! Messenger to make PC-to-Phone calls.  Great rates 
starting at 1¢/min.


[ns] question about Snort ,ns2,,,more details

2006-09-22 Thread *bahareh NTC*

Hello dear..
  Actually I am very new in both of NS2 and Snort IDS
  May I ask you ,
  How to simulate and apply snort Intrusion detection (IDS) open source code In 
ns2 for wireless  ad hoc network??I dont know is there any way? and how??
I want to apply it for my wireless network,but i dont know how?
  in general how must use the other C++ open source code that can apply for 
real word on NS2??
  Do I need to make TCL file as well?? or just calling that source code is 
enough?

  
...
   
   
  Thank you in advance
  Waitng for your reply
  all the best

regards
   
  bahareh


-
How low will we go? Check out Yahoo! Messenger’s low  PC-to-Phone call rates.


[ns] How we generate packet using echo agent for mobile nodes??

2006-10-21 Thread *bahareh NTC*

Hello dear all,
 I am working on intrusion detection system for
wireless ad hoc network,,
my routing protocol is AODV+(not AODV)... like
wireles-cum-wireless when MANET connected to the
INternet


ok according to this introduction 
I need to add some echo agent as a generator of attack
packet,,but i dont know based on  the NS MANUAL
documention  i add echo agent like that:


#set echoagent [new Agent/ECHO]
#$ns attach-agent $mobile(8) $echoagent
$echoagent set dst_ $mobile(7)
$echoagent set fid_ 0
$echoagent set prio_ 0
$echoagent set flags_ 0
$echoagent set packetSize_ 1024
$echoagent set interval_ 1.5
$echoagent start

###$ns at $val(start-src) $echoagent start
###$ns at $val(stop-src) $echoagent stop
##

and i got the below error may you plz simply let me
know how can i add a echo agent
what is wrong with me??
Thank you in advance

host0 = 0.0.0 = 0
host1 = 0.1.0 = 2048
gw0 = 1.0.0 = 4194304
mobile(3) = 1.0.1 = 4194305
mobile(4) = 1.0.2 = 4194306
mobile(5) = 1.0.3 = 4194307
mobile(6) = 1.0.4 = 4194308
mobile(7) = 1.0.5 = 4194309
mobile(8) = 1.0.6 = 4194310

invalid command name Agent/ECHO
while executing
Agent/ECHO create _o316 
invoked from within
catch $className create $o $args msg
invoked from within
if [catch $className create $o $args msg] {
if [string match __FAILED_SHADOW_OBJECT_ $msg] {
delete $o
return 
}
global errorInfo
error class $...
(procedure new line 3)
invoked from within
new Agent/ECHO
invoked from within
set echoagent [new Agent/ECHO]
(file wired_wireless_ex6.tcl line 207)


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 



[ns] TRACE a 2 node connection in MANET

2006-11-06 Thread *bahareh NTC*

HI dear all,
   
  which command can be used instead of below command to trace a specific 
conncetion between 2 nodes in wireless networks? 
  TRACE_queue /TRACE-LIMIT (in wired network these command can work well  but 
for wireless I got error when I used same command ).

 
-
Want to start your own business? Learn how on Yahoo! Small Business.


[ns] TRACE a 2 node connection in wireless

2006-11-06 Thread *bahareh NTC*

HI dear all,
   
  which command can be used instead of below command to trace a specific 
conncetion between 2 nodes in mobile ad hoc wireless networks? 
  TRACE_queue /TRACE-LIMIT (in wired network these command can work well  but 
for wireless I got error when I used same command ).

 
-
Sponsored Link

$200,000 mortgage for $660/mo - 30/15 yr fixed, reduce debt, home equity - 
Click now for info