2012
DOI: 10.1016/j.proeng.2012.06.330
|View full text |Cite
|
Sign up to set email alerts
|

An Effective IDS for MANET Using Forward Feature Selection and Classification Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…In their framework, N supervised classifiers were built in N prepared clusters so each classifier met a relatively easy learning problem. Feature selection algorithms or the descending dimension algorithms were also usually used before supervised learning algorithms to increase the efficiency of training [11], [12]. In recent years, deep learning methods such as CNN and SAE have been tried to be applied in intrusion detection system.…”
Section: Related Workmentioning
confidence: 99%
“…In their framework, N supervised classifiers were built in N prepared clusters so each classifier met a relatively easy learning problem. Feature selection algorithms or the descending dimension algorithms were also usually used before supervised learning algorithms to increase the efficiency of training [11], [12]. In recent years, deep learning methods such as CNN and SAE have been tried to be applied in intrusion detection system.…”
Section: Related Workmentioning
confidence: 99%
“…Simulations have shown that the proposed system performs well under different attack scenarios with low network degradations. Another intrusion detection system was proposed in [42]. The proposed intrusion detection system was based on forward feature selection and classification algorithms.…”
Section: Counter Measuresmentioning
confidence: 99%
“…Most of today’s applications are real-time applications, which need to deliver data at the right time and with the use of available resources. Any activity in a computer system that violates the security or availability of resources can be classified as an intrusion [ 1 ]. Preventive and reactive approaches are applied by most security solutions, in order to protect MANET’s routing protocol, services and applications.…”
Section: Introductionmentioning
confidence: 99%