Rajeev Bedi - Academia.edu (original) (raw)

Papers by Rajeev Bedi

Research paper thumbnail of Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs

Zenodo (CERN European Organization for Nuclear Research), Nov 1, 2014

Research paper thumbnail of Facial Gesture Recognition for Emotion Detection

Advances in computational intelligence and robotics book series, Jun 30, 2023

Research paper thumbnail of Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing

Cloud computing is the next big thing after internet in the field of information technology; some... more Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay per use model. Even though the cloud continues to grow in popularity, Usability and respectability, Problems with data protection and data privacy and other Security issues play a major setback in the field of Cloud Computing. Privacy and security are the key issue for cloud storage. Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private key encryption to hide the sensitive data of users, and cipher text retrieval. The paper analyzes the feasibility of the applying encryption algorithm for data security and privacy in cloud Storage.

Research paper thumbnail of Reducing Duplicate Content Using XXHASH Algorithm

Users of World Wide Web utilize search engines for information retrieval in web as search engines... more Users of World Wide Web utilize search engines for information retrieval in web as search engines play a vital role in finding information on the web. With the rapid growth of information and the explosion of Web pages from the World Wide Web, it gets harder for search engines to retrieve the information relevant to a user. However, the performance of a web search is greatly affected by flooding of search results with information that is redundant in nature. Removing redundant content is an important data processing operation in search engines and other web applications. The existing architecture of WWW uses URL to identify web pages. A large fraction of the URLs on the web contain duplicate (or near-duplicate) content. Web crawlers rely on URL normalization in order to identify equivalent URLs, which link to the same web pages. Duplicate URLs have brought serious troubles to the whole pipeline of a search engine, from crawling, indexing, to result serving. De-duping URLs is an extremely important problem for search engines, since all the principal functions of a search engine, including crawling, indexing, ranking, and presentation, are adversely impacted by the presence of duplicate URLs. In this we have proposed a new technique for reducing duplicate content during web crawling and saving only unique pages in the database.

Research paper thumbnail of Ensuring QoS in Wireless Body Area Network: A Review

Indian journal of science and technology, Jun 1, 2017

Objectives: Wireless Body Area Networks (WBANs) have gained immense popularity among researchers ... more Objectives: Wireless Body Area Networks (WBANs) have gained immense popularity among researchers and this field has also touched the health sector. In this paper we have analyzed the various methods that are used to ensure the QoS in body nodes in WBANs. Methods/Statistical Analysis: The better functioning nodes with longevity of the battery nodes help to exchange the messages between the nodes uninterruptedly. Various works are presented each for improving the quality of one part or another of the network. The importance of the various methods and how these have benefitted in the better management of the sensor nodes has also been presented. The review of the researches that are undergoing in this field has been given. Findings: The body nodes work more efficiently if the interrupted energy supply is provided to them. Energy can be collected from the body movements also and can prove to be more beneficially limiting the health constraints of removing batteries again and again. Some scheduling algorithms can reduce the interference between the nodes and the routing protocols can manage the data traffic among the WBAN. The power optimizing techniques reduce the power consumption and the data loss. So many techniques provide the much needed quality of service in WBAN. Novelty/Improvement: The paper brings out various techniques which assist in better WBAN thus reinforces the use of wireless sensors in the health domain with better quality.

Research paper thumbnail of Multi Cloud Storage Systems for Resource Constrained Mobile Devices: Comparison and Analysis

World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Aug 7, 2017

Research paper thumbnail of Analysis of Different Privacy Preserving Cloud Storage Frameworks

arXiv (Cornell University), Jan 14, 2012

Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technolo... more Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It also design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficient framework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloud storage framework in which he designed an interaction protocol among participants, use key derivation algorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide the sensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this framework is realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks, running overhead of the system and the privacy security of the frameworks.

Research paper thumbnail of Adaptive Approach to find a Stable Path between Nodes in MANET

MANET stands for Mobile Ad hoc Network. Mobile ad hoc network is an arrangement of wireless nodes... more MANET stands for Mobile Ad hoc Network. Mobile ad hoc network is an arrangement of wireless nodes which are free to move and are not controlled by any centralized mechanism. Nodes in mobile ad hoc network act both as hosts as well as routers. The nodes establish a dynamic network. Due to this dynamic nature of topology, Link Failure problem often degrades the network performance. This paper outlines link failure problem in Mobile Ad hoc Network. A new method has been proposed to eliminate link failure in Mobile ad hoc network by using signal strength parameter in AODV and provide a stable path for data transmission.

Research paper thumbnail of Challenges in Multi-Cloud Storage Systems for Mobile Devices

World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Aug 7, 2017

Research paper thumbnail of A Survey on Image De-noising using Threshold Discrete Wavelets

This paper represents an outline of wavelets and its use in Image De-noising. The wavelets can be... more This paper represents an outline of wavelets and its use in Image De-noising. The wavelets can be used for the removal of noise from digital images. Wavelets are functions that assure certain mathematical necessities and are used in place of data or other functions. Wavelet hypothesis represents possessions by breaking them down into many consistent component pieces, similar to pieces of jigsaw puzzle, when the pieces are scaled and translated wavelets, this breaking down process is wavelet decomposition or wavelet transform. This paper also describes the advantages of wavelets over Fourier Transformation and instead, wavelet transforms have an infinite set of possible basis functions which can be used for de-noising the digitized images.

Research paper thumbnail of Review paper on various clustering protocols used in Wireless Sensor Network (WSN)

Research paper thumbnail of Reinforcement Learning Based Clock Synchronization in WBAN

Asian journal of computer science and technology, Aug 5, 2018

Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN theref... more Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.

Research paper thumbnail of A Novel Approach for Multi-Cloud Storage for Mobile Devices

International Journal of Information Technology and Web Engineering, Apr 1, 2018

Research paper thumbnail of Reinforcement Learning Based Clock Synchronization in WBAN

Asian Journal of Computer Science and Technology, Aug 5, 2018

Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN theref... more Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.

Research paper thumbnail of Data Mining Techniques for Intrusion Detection: A Review

With significant advancement of web, security of system activity is turning into a major issue PC... more With significant advancement of web, security of system activity is turning into a major issue PC system framework. Cyber attacks on system are expanding day-by-day. Intrusion is considered as most pitched attack on system traffic. Intrusion recognition framework has been utilized for finding out intrusion and to protect the security objectives of data from attacks. Data mining systems are utilized to screen and investigate extensive measure of system information and group this system information into anomalous and typical information. Since information originates from different sources, system traffic is substantial. Data mining methods such as classification and clustering are connected to design of intrusion detection framework. A viable Intrusion detection framework requires high recognition rate, low false caution rate and additionally high precision. This paper exhibits the audit on IDS and diverse Data mining methods connected on IDS for the powerful detection of pattern for ...

Research paper thumbnail of Enhancing Cloud Storage Security and Privacy

— The Cloud computing is blend of conventional

Research paper thumbnail of Designing Data Storage Security and Privacy in Cloud

— Cloud computing has certainly created a buzz around the world of it is the next big thing after... more — Cloud computing has certainly created a buzz around the world of it is the next big thing after internet in the field of information technology; some say it’s a metaphor for internet. It is a computing technology based on internet, Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilizing pools of often virtualized resources. Even though the cloud continues to grow in popularity, Usability and respectability, Questions about cloud data protection, data privacy and other Security issues may continue to linger and are cited as the most substantial roadblock for cloud computing uptake. Privacy and security are the key issue for cloud storage. As promising as it is, this paradigm also brings into limelight many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same ...

Research paper thumbnail of A Survey of Duplicate And Near Duplicate Techniques

ABSTRACT---- World Wide Web consists of more than 50 billion pages online. The advent of the Worl... more ABSTRACT---- World Wide Web consists of more than 50 billion pages online. The advent of the World Wide Web caused a dramatic increase in the usage of the Internet. The World Wide Web is a broadcast medium where a wide range of information can be obtained at a low cost. A great deal of the Web is replicate or near- replicate content. Documents may be served in different formats: HTML, PDF, and Text for different audiences. Documents may get mirrored to avoid delays or to provide fault tolerance. The problem of finding relevant documents has become much more prominent due to the presence of duplicate data on the WWW. This redundancy in results increases the users ’ seek time to find the desired information within the search results, while in general most users just want to cull through tens of result pages to find new/different results. This survey paper has a fundamental intention to present an review of the existing literature in duplicate and near duplicate detection of general do...

Research paper thumbnail of A Survey on Detection of Byzantine and Resource Consumption Attacks

In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication a... more In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication among nodes is that the nodes should cooperate with each other. While in the presence of malicious nodes, this need might lead to the severe security concerns. Preventing MANET from such nodes has become an important and challenging security issue since most of the routing protocols are vulnerable to various types of attacks. In this paper we reviewed many research works which have focused on using either proactive or reactive defense mechanisms, intrusion detection systems, routing protocols to detect and prevent resource consumption and byzantine attacks.

Research paper thumbnail of Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs

A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure... more A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure (i.e., routing facilities, such as wired networks and access points), and whose mobile nodes must cooperate among themselves to regulate connectivity and routing. Attacks where adversaries have full control of a number of authenticated devices and behave randomly to disrupt the network are stated as Byzantine attacks. While in resource consumption attack, an attacker tries to consume or waste away resources such as bandwidth, computational power, and battery power of other nodes present in the network. In this context, preventing or detecting malicious nodes launching byzantine and resource consumption attacks is of mere concern. The objective of this paper is to utilize a hybrid mechanism, referred to as Cooperative Bait Detection Scheme, which is based on DSR routing protocol to detect the byzantine and resource consumption attacks.

Research paper thumbnail of Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs

Zenodo (CERN European Organization for Nuclear Research), Nov 1, 2014

Research paper thumbnail of Facial Gesture Recognition for Emotion Detection

Advances in computational intelligence and robotics book series, Jun 30, 2023

Research paper thumbnail of Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing

Cloud computing is the next big thing after internet in the field of information technology; some... more Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay per use model. Even though the cloud continues to grow in popularity, Usability and respectability, Problems with data protection and data privacy and other Security issues play a major setback in the field of Cloud Computing. Privacy and security are the key issue for cloud storage. Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private key encryption to hide the sensitive data of users, and cipher text retrieval. The paper analyzes the feasibility of the applying encryption algorithm for data security and privacy in cloud Storage.

Research paper thumbnail of Reducing Duplicate Content Using XXHASH Algorithm

Users of World Wide Web utilize search engines for information retrieval in web as search engines... more Users of World Wide Web utilize search engines for information retrieval in web as search engines play a vital role in finding information on the web. With the rapid growth of information and the explosion of Web pages from the World Wide Web, it gets harder for search engines to retrieve the information relevant to a user. However, the performance of a web search is greatly affected by flooding of search results with information that is redundant in nature. Removing redundant content is an important data processing operation in search engines and other web applications. The existing architecture of WWW uses URL to identify web pages. A large fraction of the URLs on the web contain duplicate (or near-duplicate) content. Web crawlers rely on URL normalization in order to identify equivalent URLs, which link to the same web pages. Duplicate URLs have brought serious troubles to the whole pipeline of a search engine, from crawling, indexing, to result serving. De-duping URLs is an extremely important problem for search engines, since all the principal functions of a search engine, including crawling, indexing, ranking, and presentation, are adversely impacted by the presence of duplicate URLs. In this we have proposed a new technique for reducing duplicate content during web crawling and saving only unique pages in the database.

Research paper thumbnail of Ensuring QoS in Wireless Body Area Network: A Review

Indian journal of science and technology, Jun 1, 2017

Objectives: Wireless Body Area Networks (WBANs) have gained immense popularity among researchers ... more Objectives: Wireless Body Area Networks (WBANs) have gained immense popularity among researchers and this field has also touched the health sector. In this paper we have analyzed the various methods that are used to ensure the QoS in body nodes in WBANs. Methods/Statistical Analysis: The better functioning nodes with longevity of the battery nodes help to exchange the messages between the nodes uninterruptedly. Various works are presented each for improving the quality of one part or another of the network. The importance of the various methods and how these have benefitted in the better management of the sensor nodes has also been presented. The review of the researches that are undergoing in this field has been given. Findings: The body nodes work more efficiently if the interrupted energy supply is provided to them. Energy can be collected from the body movements also and can prove to be more beneficially limiting the health constraints of removing batteries again and again. Some scheduling algorithms can reduce the interference between the nodes and the routing protocols can manage the data traffic among the WBAN. The power optimizing techniques reduce the power consumption and the data loss. So many techniques provide the much needed quality of service in WBAN. Novelty/Improvement: The paper brings out various techniques which assist in better WBAN thus reinforces the use of wireless sensors in the health domain with better quality.

Research paper thumbnail of Multi Cloud Storage Systems for Resource Constrained Mobile Devices: Comparison and Analysis

World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Aug 7, 2017

Research paper thumbnail of Analysis of Different Privacy Preserving Cloud Storage Frameworks

arXiv (Cornell University), Jan 14, 2012

Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technolo... more Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It also design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficient framework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloud storage framework in which he designed an interaction protocol among participants, use key derivation algorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide the sensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this framework is realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks, running overhead of the system and the privacy security of the frameworks.

Research paper thumbnail of Adaptive Approach to find a Stable Path between Nodes in MANET

MANET stands for Mobile Ad hoc Network. Mobile ad hoc network is an arrangement of wireless nodes... more MANET stands for Mobile Ad hoc Network. Mobile ad hoc network is an arrangement of wireless nodes which are free to move and are not controlled by any centralized mechanism. Nodes in mobile ad hoc network act both as hosts as well as routers. The nodes establish a dynamic network. Due to this dynamic nature of topology, Link Failure problem often degrades the network performance. This paper outlines link failure problem in Mobile Ad hoc Network. A new method has been proposed to eliminate link failure in Mobile ad hoc network by using signal strength parameter in AODV and provide a stable path for data transmission.

Research paper thumbnail of Challenges in Multi-Cloud Storage Systems for Mobile Devices

World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Aug 7, 2017

Research paper thumbnail of A Survey on Image De-noising using Threshold Discrete Wavelets

This paper represents an outline of wavelets and its use in Image De-noising. The wavelets can be... more This paper represents an outline of wavelets and its use in Image De-noising. The wavelets can be used for the removal of noise from digital images. Wavelets are functions that assure certain mathematical necessities and are used in place of data or other functions. Wavelet hypothesis represents possessions by breaking them down into many consistent component pieces, similar to pieces of jigsaw puzzle, when the pieces are scaled and translated wavelets, this breaking down process is wavelet decomposition or wavelet transform. This paper also describes the advantages of wavelets over Fourier Transformation and instead, wavelet transforms have an infinite set of possible basis functions which can be used for de-noising the digitized images.

Research paper thumbnail of Review paper on various clustering protocols used in Wireless Sensor Network (WSN)

Research paper thumbnail of Reinforcement Learning Based Clock Synchronization in WBAN

Asian journal of computer science and technology, Aug 5, 2018

Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN theref... more Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.

Research paper thumbnail of A Novel Approach for Multi-Cloud Storage for Mobile Devices

International Journal of Information Technology and Web Engineering, Apr 1, 2018

Research paper thumbnail of Reinforcement Learning Based Clock Synchronization in WBAN

Asian Journal of Computer Science and Technology, Aug 5, 2018

Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN theref... more Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.

Research paper thumbnail of Data Mining Techniques for Intrusion Detection: A Review

With significant advancement of web, security of system activity is turning into a major issue PC... more With significant advancement of web, security of system activity is turning into a major issue PC system framework. Cyber attacks on system are expanding day-by-day. Intrusion is considered as most pitched attack on system traffic. Intrusion recognition framework has been utilized for finding out intrusion and to protect the security objectives of data from attacks. Data mining systems are utilized to screen and investigate extensive measure of system information and group this system information into anomalous and typical information. Since information originates from different sources, system traffic is substantial. Data mining methods such as classification and clustering are connected to design of intrusion detection framework. A viable Intrusion detection framework requires high recognition rate, low false caution rate and additionally high precision. This paper exhibits the audit on IDS and diverse Data mining methods connected on IDS for the powerful detection of pattern for ...

Research paper thumbnail of Enhancing Cloud Storage Security and Privacy

— The Cloud computing is blend of conventional

Research paper thumbnail of Designing Data Storage Security and Privacy in Cloud

— Cloud computing has certainly created a buzz around the world of it is the next big thing after... more — Cloud computing has certainly created a buzz around the world of it is the next big thing after internet in the field of information technology; some say it’s a metaphor for internet. It is a computing technology based on internet, Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilizing pools of often virtualized resources. Even though the cloud continues to grow in popularity, Usability and respectability, Questions about cloud data protection, data privacy and other Security issues may continue to linger and are cited as the most substantial roadblock for cloud computing uptake. Privacy and security are the key issue for cloud storage. As promising as it is, this paradigm also brings into limelight many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same ...

Research paper thumbnail of A Survey of Duplicate And Near Duplicate Techniques

ABSTRACT---- World Wide Web consists of more than 50 billion pages online. The advent of the Worl... more ABSTRACT---- World Wide Web consists of more than 50 billion pages online. The advent of the World Wide Web caused a dramatic increase in the usage of the Internet. The World Wide Web is a broadcast medium where a wide range of information can be obtained at a low cost. A great deal of the Web is replicate or near- replicate content. Documents may be served in different formats: HTML, PDF, and Text for different audiences. Documents may get mirrored to avoid delays or to provide fault tolerance. The problem of finding relevant documents has become much more prominent due to the presence of duplicate data on the WWW. This redundancy in results increases the users ’ seek time to find the desired information within the search results, while in general most users just want to cull through tens of result pages to find new/different results. This survey paper has a fundamental intention to present an review of the existing literature in duplicate and near duplicate detection of general do...

Research paper thumbnail of A Survey on Detection of Byzantine and Resource Consumption Attacks

In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication a... more In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication among nodes is that the nodes should cooperate with each other. While in the presence of malicious nodes, this need might lead to the severe security concerns. Preventing MANET from such nodes has become an important and challenging security issue since most of the routing protocols are vulnerable to various types of attacks. In this paper we reviewed many research works which have focused on using either proactive or reactive defense mechanisms, intrusion detection systems, routing protocols to detect and prevent resource consumption and byzantine attacks.

Research paper thumbnail of Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs

A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure... more A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure (i.e., routing facilities, such as wired networks and access points), and whose mobile nodes must cooperate among themselves to regulate connectivity and routing. Attacks where adversaries have full control of a number of authenticated devices and behave randomly to disrupt the network are stated as Byzantine attacks. While in resource consumption attack, an attacker tries to consume or waste away resources such as bandwidth, computational power, and battery power of other nodes present in the network. In this context, preventing or detecting malicious nodes launching byzantine and resource consumption attacks is of mere concern. The objective of this paper is to utilize a hybrid mechanism, referred to as Cooperative Bait Detection Scheme, which is based on DSR routing protocol to detect the byzantine and resource consumption attacks.