2019
DOI: 10.1109/tla.2019.8931198
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System in Ad Hoc Networks with Artificial Neural Networks and Algorithm K-Means

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Most existing algorithms simply categorise data using the trained model, which might lead to suboptimal detection results because of the inherent biases in the model. In this work, k-NN classifier [37] is used which is based on the ratio of data distribution in order to address the aforementioned issue. The k-NN approach for classifying data essentially determines the category of test data by determining which of the training set's k closest neighbours occurs more often.…”
Section: Artificial Neural Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…Most existing algorithms simply categorise data using the trained model, which might lead to suboptimal detection results because of the inherent biases in the model. In this work, k-NN classifier [37] is used which is based on the ratio of data distribution in order to address the aforementioned issue. The k-NN approach for classifying data essentially determines the category of test data by determining which of the training set's k closest neighbours occurs more often.…”
Section: Artificial Neural Networkmentioning
confidence: 99%
“…Blackhole Attack This work focuses is on securing networks against network attacks and chooses blackhole attack optimization as an example case for our experiments in an IoT environment. In [39] is an optimisation algorithm used in conjunction with the ANN [37] method to discover these malicious nodes. This optimization alogirthm includes following steps:…”
Section: Enhancement Using Detection Modulementioning
confidence: 99%
See 1 more Smart Citation
“…With the increasing complexity of the network environment, detection systems have gradually shifted from rule-and expert-based methods to machine-learning-based methods, such as decision trees [3], support vector machines [4], XGBoost [5], neural networks [6], and so on. XGBoost, as one of the supervised learning models, still has unique advantages in the scenario of limited training samples, short training time, and lack of parameter tuning knowledge when neural networks, especially deep neural networks, are becoming more and more popular.…”
Section: Introductionmentioning
confidence: 99%