Revealing of Reducing Manners in Ad Hoc Networks with Crosslayer Approach Using SVM and FDA in Distributed Architecture
DOI:
https://doi.org/10.51983/ajcst-2012.1.1.1666Keywords:
Cross-layer designs, routing attacks, Ad hoc networks, intrusion detection, sinkingAbstract
Ad hoc network is a structure less network with independent nodes. In the ad hoc network, the nodes have to cooperate for services like routing and data forwarding. The routing attacks in ad hoc networks have given rise to the need for designing novel intrusion detection algorithms, different from those present in conventional networks. In this work, distributed intrusion detection system (IDS) have proposed for detecting malicious sinking behavior in ad hoc network. Detection process of that sinking behavior node is very important to do the further forwarding process in network. Intrusion detection system use linear classifiers for training the intrusion detection model. Cross -layer approach is involved to increase the accuracy of intrusion detection process in ad hoc network. A machine learning algorithm in non linear manner named as Support Vector Machine (SVM) involved for training the detection system and used together with Fisher Discriminant Analysis (FDA). The proposed cross-layer approach aided by a combination of SVM and FDA reduces the feature set of MAC layer without reducing information content.
References
P. Brutch and C. Ko, “Challenges in Intrusion Detection for Wireless Ad- Hoc Networks,” Proc. 2003 Symp. Applications and the Internet Workshops, 2003.
C.J.C. Burges, “A Tutorial on Support Vector Machines for Pattern Recognition,” Data Mining and Knowledge Discovery, vol. 2, no. 2, pp. 121-167, 1998.
A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion Detection in Wireless Ad Hoc Networks,” IEEE Wireless Comm., vol. 11, no. 1, pp. 48-60, Feb. 2004.
Y.A. Huang and W. Lee, “Attack Analysis and Detection for Ad Hoc Routing Protocols,” Proc. Symp. Recent Advances in Intrusion Detection, pp. 125-145, 2004.
M. Little, “TEALab: A Testbed for Ad Hoc Networking Security Research,” Proc. IEEE Military Comm. Conf. 2005 (MILCOM ’05), 2005.
P. Papadimitratos and Z. Haas, “Secure Routing for Mobile Ad hoc Networks,” Proc. SCS Comm. Networks and Distributed Systems Modeling and Simulation Conf. (CNDS ’02), 2002.
G. Thamilarasu et al., “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad Hoc Networks,” Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems 2005, 2005.
F. Anjum and P. Mouchtaris, Security for Wireless Ad Hoc Networks. Wiley, 2007.
Y. Liu, Y. Li, and H. Man, “Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks,” Proc. First Int’l Conf. Security and Privacy for Emerging Areas in Comm. Networks 2005 (SecureComm ’05), 2005.
H. Deng, Q.-A. Zeng, and D.P. Agrawal, “SVM-Based Intrusion Detection System for Wireless Ad Hoc Networks,” Proc. IEEE 58th Vehicular Technology Conf. 2003 (VTC ’03-Fall), vol. 3, pp. 2147- 2151, 2003.
Y. Liu, Y. Li, and H. Man, “MAC Layer Anomaly Detection in Ad Hoc Networks,” Proc. Sixth Ann. IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005.
P. Ning and K. Sun, “How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-Hoc Routing Protocols,” Ad Hoc Networks, vol. 3, no. 6, pp. 795-819, 2005.
R.O. Duda, P.E. Hart, and D.G. Stork, Pattern Classification, second ed. Wiley Inter-Science Publication, 2000.
V.N. Vapnik, Statistical Learning Theory. Wiley, 1998.
P.-W. Yau and C.J. Mitchell, “Security Vulnerabilities in Ad Hoc Networks,” Proc. Seventh Int’l Symp. Comm. Theory and Applications (ISCTA ’03), 2003.
M. Bykova, S. Ostermann, and B. Tjaden, “Detecting Network Inrusions via a Statistical Analysis of Network Packet Characteristics,” Proc. 33rd Southeastern Symp. System Theory, 2001.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.