{"title":"Hybrid data mining approach for intrusion detection using modified AODV algorithm","authors":"M. Shashikant, Sumit K. Shrivastava","doi":"10.1109/MITE.2013.6756315","DOIUrl":null,"url":null,"abstract":"Ad-hoc networks are collection of self-organized, autonomous nodes (routers) and capable to communicate directly with neighbors' node through broadcast packet in within transmission range. Ad hoc network has a primary concern to provide protected communication between mobile nodes. In transmission channel, nodes can be a malicious node and compromise or breaches service, which makes security extremely challenging. Our major focus is to discuss the feasibility of monitoring the nodes of different networks, and analyze it for providing better security. Data mining techniques used to classify for large aggregate data according classification rules and patterns, to detect or identify malicious node. In this paper Idea is based on k-Mediods clustering algorithm to form cluster with high detection rate based on intrusion behavior or normal behavior.","PeriodicalId":284844,"journal":{"name":"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MITE.2013.6756315","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Ad-hoc networks are collection of self-organized, autonomous nodes (routers) and capable to communicate directly with neighbors' node through broadcast packet in within transmission range. Ad hoc network has a primary concern to provide protected communication between mobile nodes. In transmission channel, nodes can be a malicious node and compromise or breaches service, which makes security extremely challenging. Our major focus is to discuss the feasibility of monitoring the nodes of different networks, and analyze it for providing better security. Data mining techniques used to classify for large aggregate data according classification rules and patterns, to detect or identify malicious node. In this paper Idea is based on k-Mediods clustering algorithm to form cluster with high detection rate based on intrusion behavior or normal behavior.