Decision Tree based AIS strategy for Intrusion Detection in MANET

被引:0
|
作者
Jim, Lincy Elizebeth [1 ]
Chacko, Jim [2 ]
机构
[1] Melbourne Inst Technol, Melbourne, Vic, Australia
[2] La Trobe Financial Serv, Melbourne, Vic, Australia
关键词
MANET; Cheat Node; Decision Tree; Artificial Immune System; Intrusion Detection System;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Ad hoc Networks (MANETs) are wireless networks that are void of fixed infrastructure as the communication between nodes are dependent on the liaison of each node in the network. The efficacy of MANET in critical scenarios like battlefield communications, natural disaster require new security strategies and policies to guarantee the integrity of nodes in the network. Due to the inherent frailty of MANETs, new security measures need to be developed to defend them. Intrusion Detection strategy used in wired networks are unbefitting for wireless networks due to reasons not limited to resource constraints of participating nodes and nature of communication. Nodes in MANET utilize multi hop communication to forward packets and this result in consumption of resources like battery and memory. The intruder or cheat nodes decide to cooperate or non-cooperate with other nodes. The cheat nodes reduce the overall effectiveness of network communications such as reduced packet delivery ratio and sometimes increase the congestion of the network by forwarding the packet to wrong destination and causing packets to take more times to reach the appropriate final destination. In this paper a decision tree based artificial immune system (AIS) strategy is utilized to detect such cheat nodes thereby improving the efficiency of packet delivery.
引用
收藏
页码:1191 / 1195
页数:5
相关论文
共 50 条
  • [1] Intrusion Detection System Based on Multi-Strategy Pruning Algorithm of the Decision Tree
    Wang, Huaibin
    Chen, Boting
    [J]. PROCEEDINGS OF 2013 IEEE INTERNATIONAL CONFERENCE ON GREY SYSTEMS AND INTELLIGENT SERVICES (GSIS), 2013, : 445 - 447
  • [2] An Intrusion Detection Algorithm Based on Decision Tree Technology
    Wang, Juan
    Yang, Qiren
    Ren, Dasen
    [J]. 2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 333 - 335
  • [3] Decision Tree based Support Vector Machine for Intrusion Detection
    Mulay, Snehal A.
    Devale, P. R.
    Garje, G. V.
    [J]. 2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 59 - 63
  • [4] Evolutionary Decision Tree-Based Intrusion Detection System
    Azad, Chandrashekhar
    Mehta, Ashok Kumar
    Jha, Vijay Kumar
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING AND COMMUNICATION SYSTEMS, MCCS 2018, 2019, 556 : 271 - 282
  • [5] Fuzzy based intrusion detection system in MANET
    Edwin Singh C.
    Celestin Vigila S.M.
    [J]. Measurement: Sensors, 2023, 26
  • [6] Fuzzy Based Intrusion Detection Systems in MANET
    Balan, Vishnu E.
    Priyan, M. K.
    Gokulnath, C.
    Devi, Usha G.
    [J]. BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 109 - 114
  • [7] Log-based Intrusion Detection for MANET
    Alattar, Mouhannad
    Sailhan, Francoise
    Bourgeois, Julien
    [J]. 2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 697 - 702
  • [8] A weighted decision tree-based fast intrusion detection model
    Tian, Jun-feng
    Guo, Huai-yu
    Ma, Guo-fu
    [J]. IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 115 - 120
  • [9] Improvement of intrusion detection by using decision tree based on protocol analysis
    Li, Liang
    Li, Hanju
    Li, Ming
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (12): : 37 - 39
  • [10] Decision Tree Applied in Web-based Intrusion Detection System
    Wei, Mingjun
    Liu, Yufang
    Chen, Xuebin
    Li, Jianmin
    [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 110 - 113