Open Access Open Access  Restricted Access Subscription or Fee Access

A connections-constrained model for intrusion detection in Ad-Hoc networks

Hongxia Shi

Abstract


In this paper we proposed a novel adaptive model for developing and implementing intrusion detection systems. The adaptive model is consisted by two parts, each one of which is based on statistical properties of the packets connections. By define the Entropy of joint Packets and Connections, we propose the two-steps of Connections-constrained Detection Mode to perform attacks detection. At a particular connection, the Packets Communication
Monitoring (PCM) module observes packets IP address and collects statistics of Packets and Bytes of connections. The second component is Malicious Behavior Analyse (MBA) module,which analyse the traffic behaviour. Experiment results performed using the DARPA dataset and KDD , which indicate that the proposed approach can significantly reduce the percentage of false positives. The adaptive mode based on Entropy of joint Packets and Connections is a significant advantage in detection speed and performance.

Keywords


Train, Timetable robustness, optimize and control.

Full Text:

PDF


Disclaimer/Regarding indexing issue:

We have provided the online access of all issues and papers to the indexing agencies (as given on journal web site). It’s depend on indexing agencies when, how and what manner they can index or not. Hence, we like to inform that on the basis of earlier indexing, we can’t predict the today or future indexing policy of third party (i.e. indexing agencies) as they have right to discontinue any journal at any time without prior information to the journal. So, please neither sends any question nor expects any answer from us on the behalf of third party i.e. indexing agencies.Hence, we will not issue any certificate or letter for indexing issue. Our role is just to provide the online access to them. So we do properly this and one can visit indexing agencies website to get the authentic information.