Computer Science ›› 2013, Vol. 40 ›› Issue (Z11): 170-174.

Previous Articles     Next Articles

Performance Analysis Method for Intrusion Detection in MANETs Based on Machine Learning Algorithms

JIANG Yi-bo,WANG Yu-chen,WANG Wan-liang,ZHANG Zhen and CHEN Qiong   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Mobile Ad-hoc network (MANET) has become an important technology in recent years and the corresponding security problems is getting more and more attention.This paper proposed a performance analysis model and an integrated evaluation index for intrusion detection based on machine learning algorithms.The experiment simulated three typical anomalous behaviors (Black hole,Flooding and Packet drop) and compared seven well-known machine learning algorithms in detail.The analysis results show that the proposed model could give a well expression to the performance of each algorithm.In particular,MultiLayer Perceptron,Logistic Regression and Support Vector Machine give the best performance and the Logistic Regression and Support Vector Machine also spend very little time to train the classification model.

Key words: MANET,Intrusion detection,Machine learning algorithms,Performance analysis

[1] Indirani G,Selvakumar K.A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET)[J].International Journal of Parallel,Emergent and Distributed Systems,2013(ahead-of-print):1-14
[2] Mechtri L,Djemili F T,Ghanemi S.On the Design of a New Intrusion Detection System for Securing MANET:An Agent-Based Approach[J].International Journal of Advanced Computer Science,2013,3(6)
[3] Tripathi S S,Agrawal S.A Survey on Enhanced Intrusion Detection System in Mobile Ad-hoc Network[J].International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),2012,1(7):44-48
[4] Kahn R.The organization of computer resources into a packetradio network[J].Communications,IEEE Transactions on,1977,25(1):169-178
[5] Jubin J,Tornow J D.The DARPA packet radio network protocols[J].Proceedings of the IEEE,1987,75(1):21-32
[6] Anderson J P.Computer security threat monitoring and surveillance[R].James P.Anderson Company,Fort Washington,Pennsylvania,1980
[7] Denning D E.An intrusion-detection model[J].Software Engineering,IEEE Transactions on,1987(2):222-232
[8] Zhang Y,Lee W,Huang Y A.Intrusion detection techniques for mobile wireless networks[J].Wireless Networks,2003,9(5):545-556
[9] Huang Y,Lee W.A cooperative intrusion detection system forad hoc networks[C]∥Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks.ACM,2003:135-147
[10] Shim W,Kim G,Kim S.A distributed sinkhole detection method using cluster analysis[J].Expert Systems with Applications,2010,37(12):8486-8491
[11] Cheng B C,Tseng R Y.A context adaptive intrusion detection system for MANET[J].Computer Communications,2011,34(3):310-318
[12] 周永浩,李鸥,刘洋.基于SVM的MANET路由层入侵检测[J].计算机应用研究,2010,27(5)
[13] 叶进,李伶强.基于保护流的MANET网MAC层DoS攻击及防御[J].计算机科学,2011,38(4):118-121
[14] 邓立博.MANET入侵检测系统研究与实现[D].哈尔滨:哈尔滨工程大学,2012
[15] Mitrokotsa A,Dimitrakakis C.Intrusion detection in MANET using classification algorithms:The effects of cost and model selection[Z].Ad-hoc Networks,2012

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!