Exploring Machine Learning Algorithms for Malicious Node Detection Using Cluster-Based Trust Entropy

被引:0
|
作者
Kanthimatih, S. [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai 600127, India
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Entropy; Ad hoc networks; Routing; Mobile computing; Accuracy; Open systems; Magnetic heads; Backpropagation; Neural networks; Random forests; Support vector machines; Back propagation neural networks; entropy; geographic routing; random forest; support vector machines; ATTACK DETECTION;
D O I
10.1109/ACCESS.2024.3465843
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has, over the decades, ushered in a dramatic transformation across a range of sectors, including network security. Security experts agree that the potential of machine learning algorithms will be indispensable in detecting all kinds of attacks and maximize accuracy when compared to traditional detection methods. In Wireless ad hoc networks that monitor real-time systems, security remains a concern. Selective forwarding and Denial-of-Service (DoS) are the most common Wireless Sensor Network (WSN) security attacks, resulting in systems making incorrect decisions with negative consequences. Further, the dynamic nature of ad hoc networks creates security issues that hamper effective data communication. While numerous methods have been suggested in the literature to address these issues, there remains a gap for more robust solutions. This paper proposes a novel trust entropy model approach that applies machine learning to significantly improve network security. The proposed cluster-based trust entropy method avoids malicious nodes in routing and re-routing packets effectively along alternate paths. In addition, a new dataset is created from the network simulation results of the proposed method. This dataset serves as the base for applying machine learning algorithms, resulting in exceptionally high detection accuracy. This novel approach not only solves the security concerns, but also raises the standard for accuracy and reliability in Wireless Adhoc Networks.
引用
收藏
页码:137913 / 137925
页数:13
相关论文
共 50 条
  • [1] Cluster-based multiple malicious node detection using honeypot-AODV in MANETs
    Sampada, H. K.
    Shobha, K. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (01) : 1 - 29
  • [2] Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
    L. Gandhimathi
    G. Murugaboopathi
    Wireless Personal Communications, 2021, 117 : 1209 - 1222
  • [3] Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
    Gandhimathi, L.
    Murugaboopathi, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1209 - 1222
  • [4] Adaptive security design with malicious node detection in cluster-based sensor networks
    Hsieh, Meng-Yen
    Huang, Yueh-Min
    Chao, Han-Chieh
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2385 - 2400
  • [5] Cluster-based attacks prevention algorithm for autonomous vehicles using machine learning algorithms
    Sankaranarayanan, R.
    Umadevi, K. S.
    Bhavani, N. P. G.
    Jos, Bos Mathew
    Haldorai, Anandakumar
    Babu, D. Vijendra
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [6] Identifying Malicious Node Using Trust Value in Cluster Based MANET (IMTVCM)
    Annadurai, P.
    Vijayalaksmi, S.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1150 - 1158
  • [7] Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs
    Gu, Ke
    Dong, XinYing
    Li, Xiong
    Jia, WeiJia
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (03): : 1245 - 1263
  • [8] Detection analysis of malicious cyber attacks using machine learning algorithms
    Karthika, R. A.
    Maheswari, M.
    MATERIALS TODAY-PROCEEDINGS, 2022, 68 : 26 - 34
  • [9] Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms
    Singh, Jagsir
    Singh, Jaswinder
    INFORMATION AND SOFTWARE TECHNOLOGY, 2020, 121
  • [10] Detection of Malicious Software by Analyzing Distinct Artifacts Using Machine Learning and Deep Learning Algorithms
    Ashik, Mathew
    Jyothish, A.
    Anandaram, S.
    Vinod, P.
    Mercaldo, Francesco
    Martinelli, Fabio
    Santone, Antonella
    ELECTRONICS, 2021, 10 (14)