计算机科学 ›› 2013, Vol. 40 ›› Issue (Z11): 170-174.

• 信息安全 • 上一篇    下一篇

一种基于机器学习的MANET网络入侵检测性能评估方法研究

蒋一波,王雨晨,王万良,张祯,陈琼   

  1. 浙江工业大学计算机学院 杭州310023;浙江工业大学计算机学院 杭州310023;浙江工业大学计算机学院 杭州310023;浙江工业大学计算机学院 杭州310023;浙江工业大学计算机学院 杭州310023
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受“十二五”国家科技支撑计划:农村小水电高效发电技术(2012BAD10B01)资助

Performance Analysis Method for Intrusion Detection in MANETs Based on Machine Learning Algorithms

JIANG Yi-bo,WANG Yu-chen,WANG Wan-liang,ZHANG Zhen and CHEN Qiong   

  • Online:2018-11-16 Published:2018-11-16

摘要: 移动Ad hoc网络(MANET,Mobile Ad hoc Networks)正得到越来越广泛的应用,相应的网络安全问题也开始得到广泛的关注。研究MANET网络可能遭遇的攻击方式,提出基于机器学习技术的入侵检测性能评估模型,并提出一个综合评价指标,比较了7种机器学习算法在MANET网络入侵检测中的性能表现,对于构建安全有效的MANET网络具有重要的意义。使用GloMoSim仿真工具对MANET网络正常行为及黑洞、洪水、丢包3种入侵行为进行模拟,并详细分析了各种攻击情况下,7种机器学习算法的性能表现。分析结果显示,该评估模型能较好地反映出各种机器学习算法的性能,其中,多层感知器、逻辑回归和支持向量机具有较高的检测率及较低的误报率。

关键词: MANET,入侵检测,机器学习,性能评估

Abstract: Mobile Ad-hoc network (MANET) has become an important technology in recent years and the corresponding security problems is getting more and more attention.This paper proposed a performance analysis model and an integrated evaluation index for intrusion detection based on machine learning algorithms.The experiment simulated three typical anomalous behaviors (Black hole,Flooding and Packet drop) and compared seven well-known machine learning algorithms in detail.The analysis results show that the proposed model could give a well expression to the performance of each algorithm.In particular,MultiLayer Perceptron,Logistic Regression and Support Vector Machine give the best performance and the Logistic Regression and Support Vector Machine also spend very little time to train the classification model.

Key words: MANET,Intrusion detection,Machine learning algorithms,Performance analysis

[1] Indirani G,Selvakumar K.A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET)[J].International Journal of Parallel,Emergent and Distributed Systems,2013(ahead-of-print):1-14
[2] Mechtri L,Djemili F T,Ghanemi S.On the Design of a New Intrusion Detection System for Securing MANET:An Agent-Based Approach[J].International Journal of Advanced Computer Science,2013,3(6)
[3] Tripathi S S,Agrawal S.A Survey on Enhanced Intrusion Detection System in Mobile Ad-hoc Network[J].International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),2012,1(7):44-48
[4] Kahn R.The organization of computer resources into a packetradio network[J].Communications,IEEE Transactions on,1977,25(1):169-178
[5] Jubin J,Tornow J D.The DARPA packet radio network protocols[J].Proceedings of the IEEE,1987,75(1):21-32
[6] Anderson J P.Computer security threat monitoring and surveillance[R].James P.Anderson Company,Fort Washington,Pennsylvania,1980
[7] Denning D E.An intrusion-detection model[J].Software Engineering,IEEE Transactions on,1987(2):222-232
[8] Zhang Y,Lee W,Huang Y A.Intrusion detection techniques for mobile wireless networks[J].Wireless Networks,2003,9(5):545-556
[9] Huang Y,Lee W.A cooperative intrusion detection system forad hoc networks[C]∥Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks.ACM,2003:135-147
[10] Shim W,Kim G,Kim S.A distributed sinkhole detection method using cluster analysis[J].Expert Systems with Applications,2010,37(12):8486-8491
[11] Cheng B C,Tseng R Y.A context adaptive intrusion detection system for MANET[J].Computer Communications,2011,34(3):310-318
[12] 周永浩,李鸥,刘洋.基于SVM的MANET路由层入侵检测[J].计算机应用研究,2010,27(5)
[13] 叶进,李伶强.基于保护流的MANET网MAC层DoS攻击及防御[J].计算机科学,2011,38(4):118-121
[14] 邓立博.MANET入侵检测系统研究与实现[D].哈尔滨:哈尔滨工程大学,2012
[15] Mitrokotsa A,Dimitrakakis C.Intrusion detection in MANET using classification algorithms:The effects of cost and model selection[Z].Ad-hoc Networks,2012

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!