2020
DOI: 10.11591/ijece.v10i3.pp2701-2709
|View full text |Cite
|
Sign up to set email alerts
|

A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET

Abstract: Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…Our algorithm defines and uses the concept of the average delay of a path (π·π‘’π‘™π‘Žπ‘¦ 𝑖 ). The average delay of a path is the summary delay of all links on that path, determined as in (2):…”
Section: π»π‘œπ‘π‘π‘œπ‘’π‘›π‘‘ = [π»π‘œπ‘π‘šπ‘–π‘› π»π‘œπ‘π‘šπ‘Žπ‘₯]mentioning
confidence: 99%
See 1 more Smart Citation
“…Our algorithm defines and uses the concept of the average delay of a path (π·π‘’π‘™π‘Žπ‘¦ 𝑖 ). The average delay of a path is the summary delay of all links on that path, determined as in (2):…”
Section: π»π‘œπ‘π‘π‘œπ‘’π‘›π‘‘ = [π»π‘œπ‘π‘šπ‘–π‘› π»π‘œπ‘π‘šπ‘Žπ‘₯]mentioning
confidence: 99%
“…Moreover, mobile devices are equipped with the Machine to machine (M2M) modules, which can communicate directly between devices without based on pre-installed infrastructure (the principle of mobile ad-hoc networks (MANETs) formation) [1]. In reality, MANETs was shaped in the 1980s as an organization of mobile radio devices which is self-established and self-configuring parameters to communicate in-network more conveniently [2]. In recent years, MANETs have series of applications for humanity in many areas such as smart agriculture, smart retail, intelligent transportation system, green energy and IoT ecosystems, indicated in [3]- [16].…”
Section: Introductionmentioning
confidence: 99%
“…Based on intelligence, these various activities are structured to construct a paradigm that generally classifies and discriminates between "normal" and "malicious" samples, such as attacks and standard packets. With the exponential growth in the use of Deep Learning Models [41], the sophistication of attack strategy tools is enhanced.…”
Section: Deep Learningmentioning
confidence: 99%
“…The MST is principally used to solve a problem of a lowest cost(weight) to cover all nodes in an undirected graph. Certain applications include routing protocol evaluation in computer/communication networks [14], cluster analysis [15] and civil network strategy planning [16]. In weighted graphs, the MST reflects a spanning tree graph which develops minimum cost/weight than other trees on the equivalent graph.…”
Section: Minimum Spanning Tree (Mst)mentioning
confidence: 99%