Intrusion detection in Mobile Ad hoc Networks using classification algorithms

被引:0
|
作者
Mitrokotsa, Aikaterini [1 ]
Tsagkaris, Manolis [2 ]
Douligeris, Christos [2 ]
机构
[1] Vrije Univ Amsterdam, Dept Comp Sci, De Boelelaan 1081A, NL-1081 HV Amsterdam, Netherlands
[2] Univ Piraeus, Dept Informat, Piraeus 18534, Greece
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian Mixture Model (GMM), the Naive Bayes classifier and the Support Vector Machine (SVM). The performance of the classification algorithms is evaluated under different traffic conditions and mobility patterns for the Black Hole, Forging, Packet Dropping, and Flooding attacks. The results indicate that Support Vector Machines exhibit high accuracy for almost all simulated attacks and that Packet Dropping is the hardest attack to detect.
引用
收藏
页码:133 / +
页数:2
相关论文
共 50 条
  • [1] An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques
    Ganapathy, S.
    Yogesh, P.
    Kannan, A.
    [J]. ADVANCES IN POWER ELECTRONICS AND INSTRUMENTATION ENGINEERING, 2011, 148 : 117 - 122
  • [2] Intrusion detection using mobile agent in ad-hoc networks
    Xia, Y
    Li, RF
    Li, KL
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3383 - 3388
  • [3] Intrusion detection using mobile agents in wireless ad hoc networks
    Kachirski, O
    Guha, R
    [J]. IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, : 153 - 158
  • [4] Using mobile agents for intrusion detection in wireless ad hoc networks
    Hijazi, A
    Nasser, N
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 362 - 366
  • [5] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    [J]. Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859
  • [6] Distributed intrusion detection for mobile ad hoc networks
    Yi, P
    Jiang, YC
    Zhong, YP
    Zhang, SY
    [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 94 - 97
  • [7] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [8] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping
    Jiang Xinghao
    Wu Yue
    Liu Ning
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 851 - 859
  • [9] A novel intrusion detection method for mobile ad hoc networks
    Yi, P
    Zhong, YP
    Zhang, SY
    [J]. ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 1183 - 1192
  • [10] Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks
    Sen, Sevil
    Clark, John A.
    [J]. PRICAI 2008: TRENDS IN ARTIFICIAL INTELLIGENCE, 2008, 5351 : 1053 - 1058