Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks

被引:0
|
作者
Vetrichelvi [1 ]
Rajaram [1 ]
Vanitha [1 ]
Mohankumar, G. [1 ]
机构
[1] Pk Coll Engn & Technol, Dept ECE, Coimbatore 641659, Tamil Nadu, India
关键词
Feature selection; intrusion detection; MANET; PCA; STR;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Mobile Ad-hoc network( MANET) has become a very important technology, research concerning its security problem, especially, in intrusion detection has attracted many researchers. Feature selection methodology plays a central role in the data analysis process. The proposed features are tested in network operating conditions. PCA is used to analyze the selected features. This is because, redundant and irrelevant features often reduce performance of the detection system. STR belongs to hierarchical routing protocol and does not attempt to consistently maintain routing information in every node. Furthermore, through the use of tree's intrinsic routing function, the STR protocol exhibits hybrid behavior and better performance of normalized routing load in large, mobile, ad hoc networks
引用
收藏
页码:215 / 219
页数:5
相关论文
共 50 条
  • [1] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [2] A Study on Intrusion Detection System of Mobile Ad-hoc Networks
    Sindhuja, S.
    Vadivel, R.
    [J]. SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 307 - 316
  • [3] Collaborative techniques for intrusion detection in mobile ad-hoc networks
    Marchang, Ningrinla
    Datta, Raja
    [J]. AD HOC NETWORKS, 2008, 6 (04) : 508 - 523
  • [4] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
  • [5] Intrusion detection using mobile agent in ad-hoc networks
    Xia, Y
    Li, RF
    Li, KL
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3383 - 3388
  • [6] Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
    Cretu, Gabriela F.
    Parekh, Janak J.
    Wang, Ke
    Stolfo, Salvatore J.
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 635 - 639
  • [7] Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
    Ponnusamy, Vasaki
    Humayun, Mamoona
    Jhanjhi, N. Z.
    Yichiet, Aun
    Almufareh, Maram Fahhad
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 1199 - 1215
  • [8] Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushanta
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2016, 19 (02): : 782 - 799
  • [9] Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks
    Chandran, R. S. Ambili
    Bhanu, S. Mary Saira
    [J]. INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 458 - 460
  • [10] A Behavioural Theory for Intrusion Detection System in Mobile Ad-hoc Networks
    Yadav, Parul
    Gaur, Manish
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPILATION, COMPUTING AND COMMUNICATIONS (HP3C 2018), 2018, : 51 - 60