Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA

被引:39
作者
Joseph, John Felix Charles [1 ]
Lee, Bu-Sung [2 ]
Das, Amitabha [3 ]
Seet, Boon-Chong [4 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Div Comp Commun, Ctr Multimedia & Networks CEMNET, Singapore, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Ctr Multimedia & Networks CEMNET, Singapore, Singapore
[3] Infosys Technol Ltd, SETLabs, Convergence Lab, Bangalore, Karnataka, India
[4] Auckland Univ Technol, Dept Elect & Elect Engn, Auckland, New Zealand
关键词
Cross-layer design; routing attacks; ad hoc networks; intrusion detection; sinking; INTRUSION DETECTION;
D O I
10.1109/TDSC.2009.48
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The uniqueness of security vulnerabilities in ad hoc networks has given rise to the need for designing novel intrusion detection algorithms, different from those present in conventional networks. In this work, we propose an autonomous host-based intrusion detection system for detecting malicious sinking behavior. The proposed detection system maximizes the detection accuracy by using cross-layer features to define a routing behavior. For learning and adaptation to new attack scenarios and network environments, two machine learning techniques are utilized. Support Vector Machines (SVMs) and Fisher Discriminant Analysis (FDA) are used together to exploit the better accuracy of SVM and faster speed of FDA. Instead of using all cross-layer features, features from MAC layer are associated/correlated with features from other layers, thereby reducing the feature set without reducing the information content. Various experiments are conducted with varying network conditions and malicious node behavior. The effects of factors such as mobility, traffic density, and the packet drop ratios of the malicious nodes are analyzed. Experiments based on simulation show that the proposed cross-layer approach aided by a combination of SVM and FDA performs significantly better than other existing approaches.
引用
收藏
页码:233 / 245
页数:13
相关论文
共 27 条
[1]  
Anjum Farooq., 2007, SECURITY WIRELESS AD
[2]  
[Anonymous], 1973, Pattern Classification and Scene Analysis
[3]  
[Anonymous], P 29 ANN C IEEE IND
[4]  
BRUTCH P, 2003, P 2003 S APPL INT WO
[5]   A tutorial on Support Vector Machines for pattern recognition [J].
Burges, CJC .
DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) :121-167
[6]   Detecting network intrusions via a statistical analysis of network packet characteristics [J].
Bykova, M ;
Ostermann, S ;
Tjaden, B .
PROCEEDINGS OF THE 33RD SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2001, :309-314
[7]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[8]  
Christianini N., 2000, INTRO SUPPORT VECTOR, P189
[9]  
CLAUSEN T, 2003, 3626 RFC INT SOC
[10]  
DENG H, 2003, P IEEE VEH TECHN C V, V3, P2147