The Intrusion Detection Model Based on the Fuzzy Judgment in Ad Hoc Network

被引:0
|
作者
Liu Shi-rui [1 ]
Li Zhe [1 ]
机构
[1] Northeastern Univ, Sch Informat Sci & Engn, Shenyang, Peoples R China
关键词
Ad Hoc network; Distributed intrusion detection; Log; Fuzzy judgment; Dynamic classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The problem of security in communication has been researched to Ad Hoc network in this paper, and it also has been proposed a distributed intrusion detection model which is based on the fuzzy judgment. The judging rules of the aggressive behavior are summarized in this model according to the different offensive features in routing layer. Moreover, the log is established according to IP packets in routing layer, and the fuzzy evaluation to the data is carried on. On the base of this, a way to enhance the correct rate of the detection by joint detection mechanism of multi-point cooperation has been introduced in this paper. To distribute the network resource dynamically and reasonably, all nodes are treated dynamically with safety classification. Taking AODV routing protocol as an example, the working mechanism of the model is introduced, and the software NS2 is used to put up network simulation platform. The experimental results show that the detection model can guarantee the network security better.
引用
收藏
页码:2886 / 2889
页数:4
相关论文
共 50 条
  • [31] A deep learning-based intrusion detection approach for mobile Ad-hoc network
    Rahma Meddeb
    Farah Jemili
    Bayrem Triki
    Ouajdi Korbaa
    [J]. Soft Computing, 2023, 27 : 9425 - 9439
  • [32] Intrusion detection system for vehicular ad hoc network attacks based on machine learning techniques
    Ali, Wasim A.
    Roccotelli, Michele
    Boggia, Gennaro
    Fanti, Maria Pia
    [J]. INFORMATION SECURITY JOURNAL, 2024, 33 (06): : 659 - 677
  • [33] A deep learning-based intrusion detection approach for mobile Ad-hoc network
    Meddeb, Rahma
    Jemili, Farah
    Triki, Bayrem
    Korbaa, Ouajdi
    [J]. SOFT COMPUTING, 2023, 27 (14) : 9425 - 9439
  • [34] An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis
    K. Bala
    S. Jothi
    A. Chandrasekar
    [J]. Cluster Computing, 2019, 22 : 15205 - 15212
  • [35] Network intrusion detection model based on fuzzy support vector machine
    Long, Yanjun
    Ouyang, Jianquan
    Sun, Xinwen
    [J]. Journal of Networks, 2013, 8 (06) : 1387 - 1394
  • [36] Intrusion detection in wireless ad hoc networks
    Mishra, A
    Nadkarni, K
    Patcha, A
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 48 - 60
  • [37] A Review on Cross Layer Intrusion Detection System in Wireless Ad Hoc Network
    Marve, Trupti K.
    Sambhe, Nilesh U.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [38] An Intrusion Detection System in Ad Hoc Networks: A Social Network Analysis Approach
    Wang, Wei
    Man, Hong
    Liu, Yu
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 825 - 829
  • [39] Performance Evaluation of Intrusion Detection Approach for Mobile Ad-hoc Network
    Soni, Sonal
    Parihar, Arjun
    Panse, Trishna
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [40] Intelligent hierarchical intrusion detection system for secure wireless ad hoc network
    Fu, P
    Zhang, DY
    Wang, L
    Duan, ZX
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 482 - 487