移动Ad-Hoc网络中EAACK、TSTMC、AB-UBTM和HSCT入侵检测性能分析综述

Dr. V. Umadevi
{"title":"移动Ad-Hoc网络中EAACK、TSTMC、AB-UBTM和HSCT入侵检测性能分析综述","authors":"Dr. V. Umadevi","doi":"10.30534/ijccn/2018/01732018","DOIUrl":null,"url":null,"abstract":"An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review on the Performance Analysis of EAACK, TSTMC, AB-UBTM and HSCT for Intrusion Detection in Mobile Ad-Hoc Network\",\"authors\":\"Dr. V. Umadevi\",\"doi\":\"10.30534/ijccn/2018/01732018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error\",\"PeriodicalId\":313852,\"journal\":{\"name\":\"International Journal of Computing, Communications and Networking\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computing, Communications and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30534/ijccn/2018/01732018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing, Communications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30534/ijccn/2018/01732018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

提出了一种基于自适应多类分类器(TSTMC)机制的入侵检测网络结构设计方法。在移动自组网中使用Tuning Tutte多项式运算构建生成树,提高了MANET中异常节点的分类率。采用广度优先搜索的基于生成树的分类方法降低了检测异常活动的时间复杂度,显著降低了数据包延迟率。为了提高自组织网络中不同移动节点的安全级别,设计了不间断贝叶斯时间移动算法。自适应增强算法利用成功概率和失败因子来提高资源利用率。其次,根据节点分类状态设计了不间断贝叶斯时间移动算法(UBTM),提高了信任准确率。混合对称密码技术是基于SP-AES算法和MD5-MAR的两种对称密码技术的新颖混合而成的。该技术减少了分组延迟时间,提高了移动自组网中异常活动的真阳性率。对入侵检测系统进行了优化生成树多类分类器(TSTMC)机制、不间断贝叶斯时间移动网络(AB-UBTM)自适应增强、混合对称密码技术(HSCT)和增强自适应确认(EAACK)方法的实验。,等,2013。用于分析移动网络入侵的参数包括安全性、数据包延迟时间、真阳性率、信任准确性、资源利用率、分类灵敏度和多类错误
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Review on the Performance Analysis of EAACK, TSTMC, AB-UBTM and HSCT for Intrusion Detection in Mobile Ad-Hoc Network
An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Comparative Analysis of Deadlock Detection Algorithm based on Blockchain A Framework for Meta-Learning in Dynamic Adaptive Streaming over HTTP OnionAider: A Model Driven Decision Support System for Weather and Pest-Occurrence Prediction in Onion Cultivation Digital Citizenship and its Role in Achieving the Vision of Kingdom of Saudi Arabia 2030 The Effective Role of using Kahoot Application in Supporting University Education in Saudi Universities: Case Study on King Abdulaziz University Jeddah, Saudi Arabia
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1