메뉴 건너뛰기




Volumn 36, Issue , 2012, Pages 217-225

Evaluation of classification algorithms for intrusion detection in MANETs

Author keywords

Classification algorithms; Genetic Programming; Intrusion detection; MANET; Support Vector Machines

Indexed keywords

BATTLEFIELD COMMUNICATIONS; CLASSIFICATION ALGORITHM; INTRUSION DETECTION SYSTEMS; MALICIOUS ACTIVITIES; MANET; MOBILE NODES; RESOURCE CONSTRAINT; SECURITY MECHANISM; VEHICULAR NETWORKS; WIRED NETWORKS;

EID: 84867868962     PISSN: 09507051     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.knosys.2012.06.016     Document Type: Article
Times cited : (40)

References (32)
  • 1
    • 78751641756 scopus 로고    scopus 로고
    • A context adaptive intrusion detection system for MANET
    • B.-C. Cheng, and R.-Y. Tseng A context adaptive intrusion detection system for MANET Computer Communications 34 2011 310 318
    • (2011) Computer Communications , vol.34 , pp. 310-318
    • Cheng, B.-C.1    Tseng, R.-Y.2
  • 4
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • P. Ning, and K. Sun How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols Ad Hoc Networks 3 2005 795 819
    • (2005) Ad Hoc Networks , vol.3 , pp. 795-819
    • Ning, P.1    Sun, K.2
  • 8
    • 2642515264 scopus 로고    scopus 로고
    • NIST Special Publication on Intrusion Detection Systems
    • National Institute of Standards and Technologies
    • R. Bace, P. Mell, NIST Special Publication on Intrusion Detection Systems, Technical Report, National Institute of Standards and Technologies, 2001.
    • (2001) Technical Report
    • Bace, R.1    Mell, P.2
  • 11
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Y. Zhang, W. Lee, and Y. Huang Intrusion detection techniques for mobile wireless networks Wireless Networks 9 2003 545 556
    • (2003) Wireless Networks , vol.9 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 13
    • 34548323745 scopus 로고    scopus 로고
    • Attack analysis and detection for ad hoc routing protocols
    • E. Jonsson, A. Valdes, M. Almgren, Lecture Notes in Computer Science Springer Berlin/Heidelberg
    • Y.-a. Huang, and W. Lee Attack analysis and detection for ad hoc routing protocols E. Jonsson, A. Valdes, M. Almgren, Proceedings of the Recent Advances in Intrusion Detection Lecture Notes in Computer Science vol. 3224 2004 Springer Berlin/Heidelberg 125 145
    • (2004) Proceedings of the Recent Advances in Intrusion Detection , vol.3224 VOL. , pp. 125-145
    • Huang, Y.-A.1    Lee, W.2
  • 17
    • 78149465598 scopus 로고    scopus 로고
    • Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
    • M.-Y. Su Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems Computer Communications 34 2011 107 117
    • (2011) Computer Communications , vol.34 , pp. 107-117
    • Su, M.-Y.1
  • 19
    • 84856352171 scopus 로고    scopus 로고
    • Power-aware intrusion detection in mobile ad hoc networks
    • Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer Berlin/Heidelberg
    • S. Sen, J.A. Clark, and J.E. Tapiador Power-aware intrusion detection in mobile ad hoc networks Proceeding of the Ad Hoc Networks Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering vol. 28 2010 Springer Berlin/Heidelberg 224 239
    • (2010) Proceeding of the Ad Hoc Networks , vol.28 VOL. , pp. 224-239
    • Sen, S.1    Clark, J.A.2    Tapiador, J.E.3
  • 20
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C. Burges A tutorial on support vector machines for pattern recognition Data Mining and Knowledge Discovery 2 1998 121 167
    • (1998) Data Mining and Knowledge Discovery , vol.2 , pp. 121-167
    • Burges, C.1
  • 25
    • 84856226719 scopus 로고    scopus 로고
    • An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier
    • B. Kavitha, D.S. Karthikeyan, and P.S. Maybell An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier Knowledge-Based Systems 28 2012 88 96
    • (2012) Knowledge-Based Systems , vol.28 , pp. 88-96
    • Kavitha, B.1    Karthikeyan, D.S.2    Maybell, P.S.3
  • 29
    • 34247332710 scopus 로고    scopus 로고
    • Measuring intrusion detection capability: An information-theoretic approach
    • Computer and Communications Security ACM New York, NY, USA
    • G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skorić Measuring intrusion detection capability: an information-theoretic approach Proceedings of the 2006 ACM Symposium on Information Computer and Communications Security 2006 ACM New York, NY, USA 90 101
    • (2006) Proceedings of the 2006 ACM Symposium on Information , pp. 90-101
    • Gu, G.1    Fogla, P.2    Dagon, D.3    Lee, W.4    Skorić, B.5
  • 32
    • 85164392958 scopus 로고
    • A study of cross-validation and bootstrap for accuracy estimation and model selection
    • Morgan Kaufmann Publishers Inc. San Francisco, CA, USA
    • R. Kohavi A study of cross-validation and bootstrap for accuracy estimation and model selection Proceedings of the International Joint Conferences on Artificial Intelligence vol. 2 1995 Morgan Kaufmann Publishers Inc. San Francisco, CA, USA 1137 1145
    • (1995) Proceedings of the International Joint Conferences on Artificial Intelligence , vol.2 VOL. , pp. 1137-1145
    • Kohavi, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.