Research Article

A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing

Table 1

Intrusion detection results of wireless mobile network.

Node serial numberThe method of this paperReference [11] methodReference [12] methodActual results

1Normal nodeNormal nodeNormal nodeNormal node
2Intrusion nodeIntrusion nodeNormal nodeIntrusion node
3Normal nodeNormal nodeNormal nodeNormal node
4Intrusion nodeIntrusion nodeIntrusion nodeIntrusion node
5Normal nodeNormal nodeNormal nodeNormal node
6Intrusion nodeNormal nodeIntrusion nodeIntrusion node
7Normal nodeNormal nodeNormal nodeNormal node
8Normal nodeNormal nodeNormal nodeNormal node
9Normal nodeNormal nodeNormal nodeNormal node
10Normal nodeNormal nodeNormal nodeNormal node