Modeling of Support Vector Machine for Intrusion Detection System in Ad-hoc Networks Using R Programming

被引:1
|
作者
Yadav, Parul [1 ,2 ]
Yadav, Brijesh Singh [1 ,2 ]
机构
[1] Inst Engn & Technol, Lucknow 226021, Uttar Pradesh, India
[2] Uttar Pradesh Rajya Vidyut Utpadan Nigam Ltd, Lucknow 226001, Uttar Pradesh, India
来源
PROCEEDINGS OF THIRD DOCTORAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE, DOSCI 2022 | 2023年 / 479卷
关键词
ANOMALY DETECTION;
D O I
10.1007/978-981-19-3148-2_65
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the emerging demand of ad-hoc networks which are self-deployable and infra-structureless in nature, security of ad-hoc networks has become a vital issue. In ad-hoc networks, a challenging security problem is the presence of intruders. These intruders can disrupt the network traffic, choke bandwidth, cause network congestion, and consume limited resources of nodes by making byzantine type attacks. Modeling of a system that detects such intruders in the network has become a hot research area. In this paper, we propose a framework for such an innovative system to detect intruders in the network with relatively low false alarm rates. Novelty of our paper includes that we propose a framework that has two modules. In the first module, we design a simulator in C++ to simulate behavior of nodes and to monitor as well as capture details related to parameters of nodes and traces of packets sent or received by nodes in networks. This simulator uses a statistical decentralized approach for creating a labeled data set. In the second module, we model a comprehensive security scheme using R programming that models pre-processing, detection, and response system by which such intruders, exhibiting byzantine type attacks, can be detected with high accuracy. Our framework is based upon a supervised classification technique in machine learning. It implements a support vector machine (SVM)-based intrusion detection system and uses a labeled data set, recorded by our simulator, as training data set for the learning of the model/framework. In this paper, the performance of our proposed framework that is based on anomaly detection technique is evaluated and the results indicate that the proposed framework exhibits high accuracy and low false alarm rate for detecting the intruders in ad-hoc networks.
引用
收藏
页码:759 / 770
页数:12
相关论文
共 50 条
  • [41] Zone-based clustering for intrusion detection architecture in ad-hoc networks
    Kim, Il-Yong
    Kim, Yoo-Sung
    Kim, Ki-Chang
    MANAGEMENT OF CONVERGENCE NETWORKS AND SERVICES, PROCEEDINGS, 2006, 4238 : 253 - 262
  • [42] An efficient intrusion detection in resource-constrained mobile ad-hoc networks
    Bouhaddi, Myria
    Radjef, Mohammed Said
    Adi, Kamel
    COMPUTERS & SECURITY, 2018, 76 : 156 - 177
  • [43] Design network intrusion detection system using support vector machine
    Ajdani, Mahdi
    Ghaffary, Hamidreza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (03)
  • [44] A Distributed Intrusion Detection System for Wireless Ad Hoc Networks
    Sen, Jaydip
    Ukil, Arijit
    Bera, Debasish
    Pal, Arpan
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 363 - 368
  • [45] HIDS: Honesty-rate based Collaborative Intrusion Detection System for mobile ad-hoc networks
    Sen, Poly
    Chaki, Nabendu
    Chaki, Rituparna
    SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, : 121 - +
  • [46] Intrusion Detection System-Based Security Mechanism for Vehicular Ad-Hoc Networks for Industrial IoT
    Singh, Saurabh
    Sharma, Sparsh
    Sharma, Surbhi
    Alfarraj, Osama
    Yoon, Byungun
    Tolba, Amr
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 83 - 92
  • [47] Performance evaluation of ad-hoc on demand distance vector (AODC) in mobile ad-hoc networks
    Tung, Ye
    Rahman, Quazi Shahriar
    Al-Khatib, Mazen
    Alsharif, Salim
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 458 - +
  • [48] Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming
    Pozi, Muhammad Syafiq Mohd
    Sulaiman, Md Nasir
    Mustapha, Norwati
    Perumal, Thinagaran
    NEURAL PROCESSING LETTERS, 2016, 44 (02) : 279 - 290
  • [49] Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming
    Muhammad Syafiq Mohd Pozi
    Md Nasir Sulaiman
    Norwati Mustapha
    Thinagaran Perumal
    Neural Processing Letters, 2016, 44 : 279 - 290
  • [50] Teachers' support with ad-hoc collaborative networks
    Cortez, C
    Nussbaum, M
    López, X
    Rodríguez, P
    Santelices, R
    Rosas, R
    Marianov, V
    JOURNAL OF COMPUTER ASSISTED LEARNING, 2005, 21 (03) : 171 - 180