Proceedings of the Second ACM Conference on Wireless Network Security 2009
DOI: 10.1145/1514274.1514289
|View full text |Cite
|
Sign up to set email alerts
|

A grammatical evolution approach to intrusion detection on mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…GE-based Intrusion Detection Systems With success of GP in generating programs capable of recognizing malicious activities in MANETs, GE, potentially more universal and adjustable than GP, has also found its applicability in IDS implementations. In a GE-based approach [29], a BNF considers mobility and packet-related features to discover dropping, flooding, and route disruption attacks with a fitness function based on the number of correctly detected attacks and false positives. A medium mobility MANET is used as a training environment.…”
Section: Grammatical Evolutionmentioning
confidence: 99%
“…GE-based Intrusion Detection Systems With success of GP in generating programs capable of recognizing malicious activities in MANETs, GE, potentially more universal and adjustable than GP, has also found its applicability in IDS implementations. In a GE-based approach [29], a BNF considers mobility and packet-related features to discover dropping, flooding, and route disruption attacks with a fitness function based on the number of correctly detected attacks and false positives. A medium mobility MANET is used as a training environment.…”
Section: Grammatical Evolutionmentioning
confidence: 99%
“…Our system has considered particularly on sleep deprivation attack based features. Table 1 show the list of selected features that are observed from each node in MANETs in respect of AODV routing protocol and data are collected periodically by each node based on the selected features [7]. The unusual decrements in the battery power that is used up by each node may be signals of sleep deprivation attack.…”
Section: Selection Of Features and Datasetmentioning
confidence: 99%
“…Moreover, we will present the consequence of µ based on the performance metrics i.e. true positive rate and false positive rate [7].…”
Section: Simulation Of Manets With Sleep Deprivationmentioning
confidence: 99%
“…This process can be used to construct programs to the provided language described by the BNF grammar. This method has been used in many cases, such as function regression problems [7,8], credit classification [9], intrusion detection in computer networks [10], monitoring of water quality [11], mathematical problems [12], composition of music [13], the construction of neural networks [14,15], producing numeric constants [16], computer games [17,18], estimation of energy consumption [19], combinatorial optimization [20], cryptography [21], the production of decision trees [22], automatic circuit design [23], etc.…”
Section: Introductionmentioning
confidence: 99%
“…x = [9, 8,6,4,16,10,17,23,8,14] with N = 3. The constant N denotes the number of initial features in the used dataset.…”
mentioning
confidence: 99%