IEEE Transactions on Software Engineering - Special issue on computer security and privacy
C4.5: programs for machine learning
C4.5: programs for machine learning
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Black hole attack in mobile Ad Hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)
Security for Wireless Ad--hoc Networks
Security for Wireless Ad--hoc Networks
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
ICSNC '08 Proceedings of the 2008 Third International Conference on Systems and Networks Communications
Functions and structure of a packet radio station
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
The WEKA data mining software: an update
ACM SIGKDD Explorations Newsletter
Recent developments and experimental guidelines in mobile ad-hoc networks
International Journal of Wireless and Mobile Computing
A routing-profitable MAC protocol for Mobile Ad Hoc Networks
International Journal of Wireless and Mobile Computing
A distributed sinkhole detection method using cluster analysis
Expert Systems with Applications: An International Journal
A Context Adaptive Intrusion Detection System for MANET
Computer Communications
Intrusion detection using neural based hybrid classification methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Expert Systems with Applications: An International Journal
A two-tier intrusion detection system for mobile ad hoc networks – a friend approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
QoS routing protocols for mobile ad hoc networks: a survey
International Journal of Wireless and Mobile Computing
Research on a multi-agent based group awareness model
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Mobile Ad-hoc network MANET has become an important technology in recent years and the corresponding security problems are getting more and more attention. In this paper, we apply seven well-known machine learning algorithms to detect intrusions in MANETs. We have generated training data under various simulation parameters. We also propose a new measure method which uses five new features to represent the network traffic. The analysis results show that the multilayer perceptron, logistic regression and Support Vector Machine SVM have the best performance and the logistic regression and SVM also get very little time to train the classification model.