Performance analysis of machine learning algorithms for intrusion detection in MANETs

被引:0
作者
机构
[1] College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou
来源
Jiang, Y. (jyb106@zjut.edu.cn) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 06期
关键词
Intrusion detection; Machine learning algorithms; MANETs; Mobile Ad-hoc networks;
D O I
10.1504/IJWMC.2013.057396
中图分类号
学科分类号
摘要
Mobile Ad-hoc network (MANET) has become an important technology in recent years and the corresponding security problems are getting more and more attention. In this paper, we apply seven well-known machine learning algorithms to detect intrusions in MANETs. We have generated training data under various simulation parameters. We also propose a new measure method which uses five new features to represent the network traffic. The analysis results show that the multilayer perceptron, logistic regression and Support Vector Machine (SVM) have the best performance and the logistic regression and SVM also get very little time to train the classification model. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:501 / 507
页数:6
相关论文
共 39 条
  • [1] Albers P., Camp O., Percher J.M., Jouga B., Me L., Puttini R., Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches, Proceedings of the 1st International Workshop on Wireless Information Systems, pp. 1-12, (2002)
  • [2] Al-Shurman M., Yoo S.-M., Park S., Black-hole attack in mobile ad hoc networks, Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96-97, (2004)
  • [3] Anderson J.P., Computer Security Threat Monitoring and Surveillance, 17, (1980)
  • [4] Anjum F., Mouchtaris P., Security for Wireless Ad Hoc Networks, (2007)
  • [5] Bajaj L., Takai M., Ahuja R., Tang K., Bagrodia R., Gerla M., GloMoSim: A Scalable Network Simulation Environment, (1999)
  • [6] Burchfiel J., Tomlinson R., Beeler M., Functions and structure of a packet radio station, AFIPS Conference Proceedings, pp. 245-251, (1975)
  • [7] Chaba Y., Singh Y., Aneja P., Performance analysis of disable ip broadcast technique for prevention of flooding-based DDoS attack in MANET, Journal of Networks, 4, 3, pp. 178-183, (2009)
  • [8] Cheng B.C., Tseng R.Y., A context adaptive intrusion detection system for MANET, Computer Communications, 34, 3, pp. 310-318, (2011)
  • [9] Darji M., Trivedi B., Secure leader election algorithm optimized for power saving using mobile agents for intrusion detection in MANET, Recent Trends in Computer Networks and Distributed Systems Security, 335, pp. 54-63, (2012)
  • [10] Denning D.E., An intrusion-detection model, IEEE Transactions on Software Engineering, 13, 2, pp. 222-232, (1987)