2008
DOI: 10.1016/j.inffus.2007.03.001
|View full text |Cite
|
Sign up to set email alerts
|

Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0
1

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(37 citation statements)
references
References 43 publications
0
36
0
1
Order By: Relevance
“…The method is based on the calculation of projection distances using multidimensional statistics and the Principal Component Analysis (PCA) to determine the axis that expresses the most relevant data correlations. Cabrera et al [12] propose a method to detect attacks on AODV and OLSR protocols. The method consists of three hierarchical and distributed intrusion detection modules based on pattern recognition and classifier fusion.…”
Section: Related Workmentioning
confidence: 99%
“…The method is based on the calculation of projection distances using multidimensional statistics and the Principal Component Analysis (PCA) to determine the axis that expresses the most relevant data correlations. Cabrera et al [12] propose a method to detect attacks on AODV and OLSR protocols. The method consists of three hierarchical and distributed intrusion detection modules based on pattern recognition and classifier fusion.…”
Section: Related Workmentioning
confidence: 99%
“…The term PðU ¼ ujY ¼ yÞ will be represented by another parameter, the component weight. 4 Finally, we must separately estimate PðY ¼ yÞ from the data, thus obtaining the conditional probability given the observations:…”
Section: Discussionmentioning
confidence: 99%
“…Bose et al [2] proposed a cooperative and distributed intrusion detection system that uses data from the MAC, routing and application layers, coupled with a Bayesian classifier. Cabrera et al [4] use an ensemble of classifiers obtained by training multiple C 4.5 classifiers and evaluate them on a MANET network for two types of attacks. Abdel-Fattah et al [1] use the Conformal Predictor k-nearest neighbour and the Distance based Outlier Detection (CPDOD) algorithms to perform intrusion detection in MANETs against three types of attacks while Shim et al [32] have used a cluster analysis technique in order to detect Sinkhole attacks in MANETs [12].…”
Section: Related Workmentioning
confidence: 99%
“…Research on developing innovative, hybrid or ensemble based classifiers [1]- [4], feature selection techniques [5]- [8], and on the training dataset. Research on dataset is minimal.…”
Section: Related Workmentioning
confidence: 99%