Algorithms for clustering data
Algorithms for clustering data
Verisim: Formal Analysis of Network Simulations
IEEE Transactions on Software Engineering
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Ensemble Methods in Machine Learning
MCS '00 Proceedings of the First International Workshop on Multiple Classifier Systems
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Combining Pattern Classifiers: Methods and Algorithms
Combining Pattern Classifiers: Methods and Algorithms
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Detailed DoS attacks in wireless networks and countermeasures
International Journal of Ad Hoc and Ubiquitous Computing
McPAD: A multiple classifier system for accurate payload-based anomaly detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
DDoS detection and traceback with decision tree and grey relational analysis
International Journal of Ad Hoc and Ubiquitous Computing
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
ANMP: ad hoc network management protocol
IEEE Journal on Selected Areas in Communications
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Ad hoc on-demand distance vector AODV is a widely used routing protocol for mobile ad hoc networks that fully trusts all participants and has no security considerations. As a result, malicious nodes can violate the protocol and disrupt the network operations. In this paper, a protocol-based anomaly detection method in ad hoc networks with AODV routing protocol is proposed. In doing so, we use a step-by-step approach for modelling the normal behaviour of AODV, and utilise a combination of support vector data description SVDD and mixture of Gaussians MoGs one-class classifiers to classify any deviation from the normal behaviour as an anomaly. These two classifiers are chosen among six utilised classifiers according to their diversity and better accuracy. Simulation results demonstrate the effectiveness of the proposed method for detecting many types of attacks e.g., wormhole, blackhole, rushing and denial of service DoS.