Intrusion Detection for MANET to Detect Unknown Attacks Using Genetic Algorithm

被引:0
|
作者
Lalli, M. [1 ]
Palanisamy, V. [2 ]
机构
[1] Bharathidasan Univ, Dept Comp Sci, Tiruchirappalli, India
[2] Alagappa Univ, Dept Comp Sci & Engn, Karaikkudi, Tamil Nadu, India
关键词
IDS; Genetic; MANET; Anomaly Detection; Feature Selection;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Traditional intrusion detection have a trouble dealing with lack of secure boundaries, threats from compromised nodes, lack of centralized management facility, restricted power supply and scalability. Due to these issues, we are motivated to propose efficient IDS, which involve a new technique to identify the anomalous activities in mobile ad-hoc networks. During this paper, we propose a Genetic based feature selection and rule evaluation process for anomaly detection. This process is effectively classified with new rules and also increases with high positive rate alarm. The new findings of our proposed work is effectively notice the anomalies with low false positive rate, high detection rate and attain the upper detection accuracy.
引用
收藏
页码:976 / 980
页数:5
相关论文
共 50 条
  • [1] Network Intrusion Detection with Fuzzy Genetic Algorithm for Unknown Attacks
    Jongsuebsuk, P.
    Wattanapongsakorn, N.
    Charnsripinyo, C.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [2] A comprehensive approach to detect unknown attacks via intrusion detection alerts
    Song, Jungsuk
    Ohba, Hayato
    Takakura, Hiroki
    Okabe, Yasuo
    Ohira, Kenji
    Kwon, Yongjin
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 247 - +
  • [3] Intrusion Detection Algorithm for MANET
    Srinivasan, S.
    Alampalayam, S. P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (03) : 36 - 49
  • [4] Genetic Algorithm Technique Used to Detect Intrusion Detection
    Gupta, Payel
    Shinde, Subhash K.
    [J]. ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, 2011, 198 : 122 - 131
  • [5] Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks
    Sibi Chakkaravarthy, S.
    Sangeetha, D.
    Cruz, Meenalosini Vimal
    Vaidehi, V.
    Raman, Balasubramanian
    [J]. IEEE ACCESS, 2020, 8 (08): : 169944 - 169956
  • [6] An Enhanced Intrusion Detection System for Routing Attacks in MANET
    Abirami, K. Rama
    Sumithra, M. G.
    Rajasekaran, J.
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [7] A method to detect network attacks using entropy in the intrusion detection system
    Xia, Qin
    Wang, Zhiwen
    Lu, Ke
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (02): : 14 - 19
  • [8] INTRUSION DETECTION SYSTEM TO DETECT MALICIOUS MISBEHAVIOUR NODES IN MANET
    Vijay, M.
    Sujatha, R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [9] Which algorithm can detect unknown attacks? Comparison of supervise d, unsupervise d and meta-learning algorithms for intrusion detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Puccetti, Tommaso
    Bondavalli, Andrea
    [J]. COMPUTERS & SECURITY, 2023, 127
  • [10] Intrusion Detection System Using Genetic Algorithm
    Benaicha, Salah Eddine
    Saoudi, Lalia
    Guermeche, Salah Eddine Bouhouita
    Lounis, Ouarda
    [J]. 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 564 - 568