Skip to main content

Table 3 Shows the source, destination and protocol dataset with respect to our test environment of network topology as shown in Fig. 4

From: Intrusion detection systems for wireless sensor networks using computational intelligence techniques

Source

Destination

Protocol

192.168.239.1

192.168.239.1

ARP

192.168.239.254

192.168.239.254

BROWSER

fe80::f9fc:ad11:1e14:b75

192.168.239.255

DHCP

VMware_c0:00:08

224.0.0.22

ICMPv6

VMware_fc:23:ae

224.0.0.251

IGMPv3

 

224.0.0.252

LLMNR

 

239.255.255.250

MDNS

 

Broadcast

NBNS

 

ff02::1:3

SSDP

 

ff02::16

 
 

ff02::fb

 
 

VMware_c0:00:08

 
 

VMware_fc:23:ae

Â