DocumentCode :
261049
Title :
Intrusion detection in mobile AdHoc networks using machine learning approach
Author :
Poongothai, T. ; Duraiswamy, K.
Author_Institution :
Dept. of Inf. Technol., K.S.R Coll. of Eng., Tiruchengode, India
fYear :
2014
fDate :
27-28 Feb. 2014
Firstpage :
1
Lastpage :
5
Abstract :
Mobile ad hoc networking (MANET) has become a key technology in recent years because of the increased usage of wireless devices and their ability to provide temporary and instant wireless networking in situations like flooding and defense. In spite of their attractive applications, MANET poses high security problems compared to conventional wired and wireless networks due to its unique characteristics such as lack of central coordination, dynamic topology, temporary network life and wireless nature of communication. Attack prevention measures, such as the use of encryption and authentication techniques, have been proposed as a first line of defense to reduce the risk of security problems. However such risks cannot be completely eliminated, there is a strong need of intrusion detection systems (IDS) as a second line of defense for securing MANET. Intrusion detection on MANET is a challenging task due to its unique characteristics such as open medium, dynamic topology, lack of centralized management and highly resource constrained nodes. Conventional intrusion detection system developed for wired networks cannot be directly applied to MANET. It needs to be redesigned to suit the ad hoc technology. The proposed system introduces new architecture that uses machine learning approach to maximize the detection accuracy. Proposed IDS architecture uses the combination of Rough Set Theory (RST) and Support Vector Machine (SVM) to make use of the excellent accuracy of SVM and better performance of RST.
Keywords :
learning (artificial intelligence); mobile ad hoc networks; rough set theory; security of data; support vector machines; IDS architecture; MANET; RST; SVM; ad hoc technology; attack prevention measures; authentication techniques; centralized management; dynamic topology; encryption; highly resource constrained nodes; instant wireless networking; intrusion detection systems; machine learning; mobile ad hoc networking; mobile ad hoc networks; rough set theory; security problems; support vector machine; temporary network life; wired networks; wireless devices; Approximation methods; Intrusion detection; Mobile ad hoc networks; Set theory; Support vector machines; Training; Intrusion Detection; Machine Learning; Mobile ad hoc Networks; Rough Set Theory and Support Vector Machine; Security issues;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-3835-3
Type :
conf
DOI :
10.1109/ICICES.2014.7033949
Filename :
7033949
Link To Document :
بازگشت