Clustering and Hybrid Genetic Algorithm based Intrusion Detection Strategy

Ad hoc networks face serious security threat due to its inherent weaknesses. Intrusion detection is crucial technology in protecting the security of Ad hoc networks. Recently, Intrusion Detection Systems (IDS) face open issues, such as how to make use of intrusion detection technologies to excavate...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Li (Author), Wan, Pengyuan (Author), Wang, Yingmei (Author), Liu, Songtao (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2014-01-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02332 am a22003013u 4500
001 ijeecs3060_1083
042 |a dc 
100 1 0 |a Liu, Li  |e author 
100 1 0 |e contributor 
700 1 0 |a Wan, Pengyuan  |e author 
700 1 0 |a Wang, Yingmei  |e author 
700 1 0 |a Liu, Songtao  |e author 
245 0 0 |a Clustering and Hybrid Genetic Algorithm based Intrusion Detection Strategy 
260 |b Institute of Advanced Engineering and Science,   |c 2014-01-01. 
520 |a Ad hoc networks face serious security threat due to its inherent weaknesses. Intrusion detection is crucial technology in protecting the security of Ad hoc networks. Recently, Intrusion Detection Systems (IDS) face open issues, such as how to make use of intrusion detection technologies to excavate normal/abnormal behaviors from a lot of initialized data and dig out invasion models later for intrusion detection automatically and effectively. In this paper, we propose an enhanced algorithm combined improved clustering algorithm with Hybrid Genetic Algorithm (HGA), called Enhanced Intrusion Detection Algorithm (EIDA) for intrusion detection in Ad hoc networks. Clustering Algorithm is used to divide the normal/anomalous data from network and system behaviors. Then HGA is used to dig out the invasion rules. Our EIDA is an unsupervised anomaly detection algorithm. The experiment result shows that it is extensible and not sensitive to the sequence of the input data sets. It has the capacity to deal with different types of data and detection rate and false positive rate of intrusion detection has been improved effectively. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3353 
540 |a Copyright (c) 2013 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 1: January 2014; 762-770 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v12.i1 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3060/1083 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3060/1083  |z Get fulltext