Performance analysis of machine learning algorithms for intrusion detection in MANETs

被引:0
作者
机构
[1] College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou
来源
Jiang, Y. (jyb106@zjut.edu.cn) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 06期
关键词
Intrusion detection; Machine learning algorithms; MANETs; Mobile Ad-hoc networks;
D O I
10.1504/IJWMC.2013.057396
中图分类号
学科分类号
摘要
Mobile Ad-hoc network (MANET) has become an important technology in recent years and the corresponding security problems are getting more and more attention. In this paper, we apply seven well-known machine learning algorithms to detect intrusions in MANETs. We have generated training data under various simulation parameters. We also propose a new measure method which uses five new features to represent the network traffic. The analysis results show that the multilayer perceptron, logistic regression and Support Vector Machine (SVM) have the best performance and the logistic regression and SVM also get very little time to train the classification model. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:501 / 507
页数:6
相关论文
共 39 条
  • [11] Devi V.A., Bhuvaneswaran R.S., Agent based cross layer intrusion detection system for MANET, Advances in Network Security and Applications, 196, pp. 427-440, (2011)
  • [12] Djenouri D., Mahmoudi O., Bouamama M., Llewellyn-Jones D., Merabti M., On securing MANET routing protocol against control packet dropping, Proceedings of the International Conference on Pervasive Services, pp. 100-108, (2007)
  • [13] Dow C.R., Lin P.J., Chen S.C., Lin J.H., Recent developments and experimental guidelines in mobile ad-hoc networks, International Journal of Wireless and Mobile Computing, 4, 2, pp. 105-115, (2010)
  • [14] Ghaemi H., Gonabad I., Estimating differential item functioning through logistic regression, Modern Journal of Language Teaching Methods, 1, 3, (2011)
  • [15] Govindarajan M., Chandrasekaran R.M., Network intrusion detection using naive bayes, Computer Networks, 55, 8, pp. 1662-1671, (2007)
  • [16] Gulati M.K., Kumar K., QoS routing protocols for mobile ad hoc networks: A survey, International Journal of Wireless and Mobile Computing, 5, 2, pp. 107-118, (2012)
  • [17] Hall M., Frank E., Holmes G., Pfahringer B., Reutemann P., Witten I.H., The WEKA data mining software: An update, ACM SIGKDD Explorations Newsletter, 11, 1, pp. 10-18, (2009)
  • [18] Huang Y.A., Fan W., Lee W., Philip S.Y., Cross-feature analysis for detecting ad-hoc routing anomalies, Proceedings of the 23rd International Conference on Distributed Computing Systems, pp. 478-487, (2003)
  • [19] Huang Y.A., Lee W., A cooperative intrusion detection system for ad hoc networks, Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), pp. 135-147, (2003)
  • [20] Jubin J., Tornow J.D., The DARPA packet radio network protocols, Proceedings of the IEEE, 75, 1, pp. 21-32, (1987)