Evaluation of Feature Reduction using Principal Component Analysis and Sequential Pattern Matching for Manet

In Mobile Ad hoc Networks (MANETs) there are some security problems because of portability, element topology changes, and absence of any framework. In MANETs, it is of extraordinary significance to identify inconsistency and malignant conduct. With a specific end goal to recognize malignant assaults by means of interruption identification frameworks and dissect the information set, we have to choose some components. Thus, highlight determination assumes basic part in recognizing different assaults. In the writing, there are a few recommendations to choose such elements. For the most part, Principal Component Analysis (PCA) breaks down the information set and the chose highlights. In this paper, we have gathered a list of capabilities from some cutting edge works in the writing. Really, our reproduction demonstrates this list of capabilities identify inconsistency conduct more precise. Likewise, interestingly, we utilize PCA for investigating the information set. In contrast to PCA, our results show Sequential pattern mining (SPM) cannot be affected by outlier data within the network. The  normal and attack states are simulated and the results are analyzed using NS2 simulator.

[1]  Wang Chunlei,et al.  A framework for network security situation awareness based on knowledge discovery , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[2]  Wang Rui-lian,et al.  Comprehensive Evaluation to Distribution Network Planning Schemes Using Principal Component Analysis Method , 2014 .

[3]  Yasir Saleem,et al.  Network Simulator NS-2 , 2015 .

[4]  Mia Hubert,et al.  LIBRA: a MATLAB library for robust analysis , 2005 .

[5]  Palash Kumar Kundu,et al.  Identification and Classification of Power System Faults using Ratio Analysis of Principal Component Distances , 2014 .

[6]  Senthilnayaki Balakrishnan,et al.  Intrusion Detection System Using Feature Selection and Classification Technique , 2014 .

[7]  Amr M. Gody,et al.  Relevant Feature Selection Model Using Data Mining for Intrusion Detection System , 2014, ArXiv.

[8]  Meysam Alikhani,et al.  Dynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs , 2013 .

[9]  Ajith Abraham,et al.  Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..

[10]  Neelam Sharma,et al.  INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .

[11]  Mahdi Abadi,et al.  An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  G. Mohankumar Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks , 2010 .

[13]  Mehdi Berenjkoub,et al.  An unsupervised anomaly detection engine with an efficient feature set for AODV , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).