Skip to main content

Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks

  • Chapter
  • First Online:
Computer and Information Science

Part of the book series: Studies in Computational Intelligence ((SCI,volume 566))

Abstract

Mobile ad hoc network (MANET) is vulnerable to numerous attacks due to its intrinsic characteristics such as the lack of fixed infrastructure, limited bandwidth and battery power, and dynamic topology. Recently, several unsupervised machine-learning detection techniques have been proposed for anomaly detection in MANETs. As the number of these detection techniques continues to grow, there is a lack of evidence to support the use of one unsupervised detection algorithm over the others. In this paper, we demonstrate a research effort to evaluate the effectiveness and efficiency of different unsupervised detection techniques. Different types of experiments were conducted, with each experiment involves different parameters such as number of nodes, speed, pause time, among others. The results indicate that K-means and C-means deliver the best performance overall. On the other hand, K-means requires the least resource usage while C-means requires the most resource usage among all algorithms being evaluated. The proposed evaluation methodology provides empirical evidence on the choice of unsupervised learning algorithms, and could shed light on the future development of novel intrusion detection techniques for MANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdisc. Rev. Comput. Stat. 2(4), 433–459 (2010)

    Article  Google Scholar 

  2. Alikhany, M., Abadi, M.: A dynamic clustering-based approach for anomaly detection in AODV-based MANETs. In: Proceedings of International Symposium on Computer Networks and Distributed Systems (CNDS), pp. 67–72 (2011)

    Google Scholar 

  3. Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Xiao, Y., Shen, X., Du, S. (eds.) Wireless/Mobile Network Security, pp. 170–196 (2006)

    Google Scholar 

  4. Avram, T., Oh, S., Hariri, S.: Analyzing attacks in wireless ad hoc network with self-organizing maps. In: Proceedings of the 5th Annual CCNSR, pp. 166–175 (2007)

    Google Scholar 

  5. Azer, M. A., El-Kansa, S. M., El-Soudani, M. S.: Security in ad hoc networks from vulnerability to risk management. In: IEEE 3rd International Conference on Emerging Security Information, Systems and Technologies, pp. 203–209 (2009)

    Google Scholar 

  6. Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 1–27 (2011)

    Article  Google Scholar 

  7. Gan, G.: Data Clustering in C++: an object-oriented approach. Chapman & Hall/CRC, Boca Raton (2011)

    Google Scholar 

  8. Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Comput. Surv. 31(3), 264–323 (1999)

    Article  Google Scholar 

  9. Li, W., Joshi, A.: Outlier detection in ad hoc networks using Dempster-Shafer theory. In: Proceedings of the 10th ICMDM, pp. 112–121 (2009)

    Google Scholar 

  10. Mitrokotsa, A., Tsagkaris, M., Douligeris, C.: Intrusion detection in mobile ad hoc networks using classification algorithms. In: Processing of IFIP International Federation for Information, Advances in Ad Hoc Networking, Vol. 265, pp. 133–144 (2008)

    Google Scholar 

  11. Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., Kato, N.: A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Trans. Veh. Technol. 58(5), 2471–2481 (2009)

    Article  Google Scholar 

  12. Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Proc. Ad Hoc Netw. 3(6), 795–819 (2005)

    Article  Google Scholar 

  13. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector routing. RFC 3561 (2003)

    Google Scholar 

  14. Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of the ACM Workshop on Data Mining Applied to Security, pp. 1–14 (2001)

    Google Scholar 

  15. Sadoddin, R., Ghorbani, A.: A comparative study of unsupervised machine learning and data mining techniques for intrusion detection. Machine Learning and Data Mining in Pattern Recognition. In: Perner, P. (ed.) Vol. 4571, pp. 404–418 (2007)

    Google Scholar 

  16. Sun, B., Wu, K., Pooch, U.: Towards adaptive intrusion detection in mobile ad hoc networks. In: Proceedings of IEEE GLOBECOM, pp. 3551–3555 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Dang, B.H., Li, W. (2015). Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks. In: Lee, R. (eds) Computer and Information Science. Studies in Computational Intelligence, vol 566. Springer, Cham. https://doi.org/10.1007/978-3-319-10509-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10509-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10508-6

  • Online ISBN: 978-3-319-10509-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics