Self Adaptive Intrusion Detection Technique Using Data Mining Concept in an Ad-hoc Network

Abstract The Intrusion Detection System mainly adopted from the traditional Wired Network or Distributed Network cannot provide a satisfying solution to the increasing security threats in an Ad-Hoc Network. Adhoc-Network due to its typical infrastructure less technical background, implementing an effective security solution for it is extremely challenging. Moreover due to its vulnerable nature attackers consistently try new attack mechanism which generally goes undetected for the system that uses pattern matching to detect traces os intrusion behavior in the incoming data. The paper aims at providing IDS based on self learning technique where the system when comes across an unknown data pattern classifies it as an attack or non attack after comparing and considering its variation from an attack free scenario.

[1]  Sumita Mishra,et al.  A cross-layer based intrusion detection approach for wireless ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[2]  Solane Duque,et al.  Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS) , 2015, Complex Adaptive Systems.

[3]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[4]  Omar Bilalovic,et al.  Usage of data mining techniques for analyzing network intrusions , 2014, 2014 X International Symposium on Telecommunications (BIHTEL).

[5]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[6]  Ketan Sanjay Desale,et al.  Efficient Intrusion Detection System Using Stream Data Mining Classification Technique , 2015, 2015 International Conference on Computing Communication Control and Automation.

[7]  Gulshan Kumar,et al.  Survey on Data Mining Techniques in Intrusion Detection , 2012 .

[8]  Balaraman Ravindran,et al.  Adaptive network intrusion detection system using a hybrid approach , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).

[9]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[10]  M. Hemalatha,et al.  Effective approach toward Intrusion Detection System using data mining techniques , 2014 .

[11]  M. McNeese,et al.  idsNETS: An experimental platform to study situation awareness for intrusion detection analysts , 2012, 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support.

[12]  Bu-Sung Lee,et al.  Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs , 2007, 2007 15th IEEE International Conference on Networks.