• DocumentCode
    261049
  • Title

    Intrusion detection in mobile AdHoc networks using machine learning approach

  • Author

    Poongothai, T. ; Duraiswamy, K.

  • Author_Institution
    Dept. of Inf. Technol., K.S.R Coll. of Eng., Tiruchengode, India
  • fYear
    2014
  • fDate
    27-28 Feb. 2014
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Mobile ad hoc networking (MANET) has become a key technology in recent years because of the increased usage of wireless devices and their ability to provide temporary and instant wireless networking in situations like flooding and defense. In spite of their attractive applications, MANET poses high security problems compared to conventional wired and wireless networks due to its unique characteristics such as lack of central coordination, dynamic topology, temporary network life and wireless nature of communication. Attack prevention measures, such as the use of encryption and authentication techniques, have been proposed as a first line of defense to reduce the risk of security problems. However such risks cannot be completely eliminated, there is a strong need of intrusion detection systems (IDS) as a second line of defense for securing MANET. Intrusion detection on MANET is a challenging task due to its unique characteristics such as open medium, dynamic topology, lack of centralized management and highly resource constrained nodes. Conventional intrusion detection system developed for wired networks cannot be directly applied to MANET. It needs to be redesigned to suit the ad hoc technology. The proposed system introduces new architecture that uses machine learning approach to maximize the detection accuracy. Proposed IDS architecture uses the combination of Rough Set Theory (RST) and Support Vector Machine (SVM) to make use of the excellent accuracy of SVM and better performance of RST.
  • Keywords
    learning (artificial intelligence); mobile ad hoc networks; rough set theory; security of data; support vector machines; IDS architecture; MANET; RST; SVM; ad hoc technology; attack prevention measures; authentication techniques; centralized management; dynamic topology; encryption; highly resource constrained nodes; instant wireless networking; intrusion detection systems; machine learning; mobile ad hoc networking; mobile ad hoc networks; rough set theory; security problems; support vector machine; temporary network life; wired networks; wireless devices; Approximation methods; Intrusion detection; Mobile ad hoc networks; Set theory; Support vector machines; Training; Intrusion Detection; Machine Learning; Mobile ad hoc Networks; Rough Set Theory and Support Vector Machine; Security issues;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Communication and Embedded Systems (ICICES), 2014 International Conference on
  • Conference_Location
    Chennai
  • Print_ISBN
    978-1-4799-3835-3
  • Type

    conf

  • DOI
    10.1109/ICICES.2014.7033949
  • Filename
    7033949