Design of Network Architecture for Intrusion Detection Using Spanning Tree Multiclass Classifier in Manet
نویسنده
چکیده
Security in mobile ad-hoc network plays a strategic role to ensure high level of protection without any intrusions in computer networks. Most of the intrusions in mobile ad-hoc network are traced and detected by collecting traffic information and classified according to different classification algorithms. With individual traffic classifiers design, packet delay is expected to surely go up with overhead cost rate. These classification processes hosted on mobile ad-hoc network failed to develop multiclass classifier system under varied conditions and minimized the efficiency on detecting intrusions in network architecture. To present mobile ad-hoc network architecture, with multi-classifier intrusion detection system, a mechanism called, Tuning Spanning Tree Multiclass Classifier (TSTMC) is proposed in this paper. The TSTMC mechanism works with multiple classification process in MANET to detect the intruded distribution nodes. First, Multiclass Neural Shannon’s Entropy based approach analyzes the network traffic properties based on the count of source destination pair, packet type, packet size and payload. After analyzing the traffic rate on MANET, the result are used in the next step to construct spanning tree network architecture. Secondly, the spanning tree is constructed with Tuning Tutte polynomial operations where the internal and external traffic over mobile ad-hoc network is classified. Tuning Tutte polynomial operation is used effectively to detect the abnormal activities through tuning spanning tree. Analysis is accomplished for different parameters, including the maximum node velocity and the average multiclass error rate they experience, node density and their true positive rate on detecting abnormal activities, packet delay and classification sensitivity rate. Simulations using NS2 were used to measure the performance of the mechanism to compare it with the performance of two other intrusion models for mobile ad-hoc networks, namely, GP and SSUM. The measured results signify the effectiveness of the proposed mechanism in terms of achieved multiclass error rate, classification sensitivity and low packet delay.
منابع مشابه
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کاملImproving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering
Recently by developing the technology, the number of network-based servicesis increasing, and sensitive information of users is shared through the Internet.Accordingly, large-scale malicious attacks on computer networks could causesevere disruption to network services so cybersecurity turns to a major concern fornetworks. An intrusion detection system (IDS) could be cons...
متن کاملOne Versus All classification in Network Intrusion detection using Decision Tree
One-versus-all (OVA) classification is one of the multiclass classification problems as well as it is a binary classifier. On the basis of this, we propose a network intrusion detecting system for the security of computers and networks. In this paper, we present a new learning algorithm for detection of a network intrusion using one versus all decision tree algorithm, that differentiates attack...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015