Research Article
A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
Table 1
Intrusion detection results of wireless mobile network.
| Node serial number | The method of this paper | Reference [11] method | Reference [12] method | Actual results |
| 1 | Normal node | Normal node | Normal node | Normal node | 2 | Intrusion node | Intrusion node | Normal node | Intrusion node | 3 | Normal node | Normal node | Normal node | Normal node | 4 | Intrusion node | Intrusion node | Intrusion node | Intrusion node | 5 | Normal node | Normal node | Normal node | Normal node | 6 | Intrusion node | Normal node | Intrusion node | Intrusion node | 7 | Normal node | Normal node | Normal node | Normal node | 8 | Normal node | Normal node | Normal node | Normal node | 9 | Normal node | Normal node | Normal node | Normal node | 10 | Normal node | Normal node | Normal node | Normal node |
|
|