Downloads provided by UsageCounts
{"references": ["El-Sayed M. El-Alfy, Feras N. Al-Obeidat, \"Multicriterion fuzzy classification method with greedy attribute selection for anomaly-based intrusion detection\", Procedia Computer Science, Elsevier, Volume 34, 2014, Pages 55 \u2013 62.", "Constantinos Kolias, Vasilis Kolias, Georgios Kambouraki, \"TermID: a distributed swarm intelligence-based approach for wireless intrusion detection\", International Journal of Information Security, Springer, 2016, Pages 1\u201316.", "Malik N. Ahmed, Abdul Hanan Abdullah, Omprakash Kaiwartya, \"FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET\", PLoS ONE journal, Volume 11, Issue 6, 2016.", "Ujwala Ravale, Nilesh Marathe and Puja Padiya, \"Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function\" Procedia Computer Science, Elsevier, Volume 45, 2015, Pages 428 \u2013 435.", "Sedigheh Khajouei Nejad, Sam Jabbehdari, Mohammad Hossein Moattara, \" hybrid intrusion detection system using particle Swarm optimization for feature selection\", International Journal of Soft Computing and Artificial Intelligence, Volume 3, Issue 2, 2015, Pages 55-58.", "Khaled Badran and Peter Rockett, \"Multi-class pattern classification using single, multi-dimensional feature-space feature extraction evolved by multi-objective genetic programming and its application to network intrusion detection\", Genetic Programming and Evolvable Machines, Springer, Volume 13, Issue 1, 2012, Pages 33\u201363.", "Alexandros G. Fragkiadakis, Vasilios A. Siris, Nikolaos E. Petroulakis and Apostolos P. Traganitis, \"Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection\", Wireless Communications and Mobile Computing, Wiley communication and mobile computing, Volume 15, Issue 2, 2015, Pages 276\u2013294.", "Chun-Wei Tsai, \"Incremental particle swarm optimization for intrusion detection\", IET Networks, Volume 2, Issue 3, 2013, Pages 124 - 130.", "Amin Hassanzadeh and Radu Stoleru, \"On the optimality of cooperative intrusion detection for resource constrained wireless networks\", computers & security, Elsevier, Volume 34, 2013, Pages 16-35.", "M. Usha and P. Kavitha, \"Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier\", Wireless Networks, 2016, Pages 1\u201316."]}
A wireless ad hoc network (WANET) is a self organizing system connecting the multiple nodes without any centralized access points. In WANET, nodes move randomly and transmit packets to other nodes within the network. Due to their random mobility, different intrusions are presented and thereby reducing the network lifetime. Therefore, Wireless ad-hoc networks need to be secured and utilize essential techniques to identify the misuse behaviors by detecting and classifying the normal and anomalous node. In order to improve the anomaly intrusion detection in WANET, Chi-Squared Distribution based Bootstrap Aggregating with SVM (CD-BASVM) classifier is introduced. The CD-BASVM classifier is used to detect the intrusion and classifying nodes as either normal or anomalous. At first, an optimal feature is selected from the dataset by using Chi-Squared Distribution for intrusion detection and classification. After that, bootstrap aggregating with an SVM classifier is employed to detect an intrusion and classify anomalous and normal nodes in a wireless ad-hoc network. This helps to obtain high anomaly intrusion detection accuracy. Simulation outcomes show that the CD-BASVM improves the performance with different parameters such as Classification time, false positive rate, End to end delay, data packet loss rate and anomaly intrusion detection accuracy compared to state-of-the-art methods.
Wireless ad-hoc network, intrusion detection, chi-squared distribution, Bootstrap Aggregating, SVM classifier, optimal feature selection, normal node, anomalous node.
Wireless ad-hoc network, intrusion detection, chi-squared distribution, Bootstrap Aggregating, SVM classifier, optimal feature selection, normal node, anomalous node.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 19 | |
| downloads | 8 |

Views provided by UsageCounts
Downloads provided by UsageCounts