Abstract
Mobile ad hoc network (MANET) is vulnerable to numerous attacks due to its intrinsic characteristics such as the lack of fixed infrastructure, limited bandwidth and battery power, and dynamic topology. Recently, several unsupervised machine-learning detection techniques have been proposed for anomaly detection in MANETs. As the number of these detection techniques continues to grow, there is a lack of evidence to support the use of one unsupervised detection algorithm over the others. In this paper, we demonstrate a research effort to evaluate the effectiveness and efficiency of different unsupervised detection techniques. Different types of experiments were conducted, with each experiment involves different parameters such as number of nodes, speed, pause time, among others. The results indicate that K-means and C-means deliver the best performance overall. On the other hand, K-means requires the least resource usage while C-means requires the most resource usage among all algorithms being evaluated. The proposed evaluation methodology provides empirical evidence on the choice of unsupervised learning algorithms, and could shed light on the future development of novel intrusion detection techniques for MANETs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdisc. Rev. Comput. Stat. 2(4), 433–459 (2010)
Alikhany, M., Abadi, M.: A dynamic clustering-based approach for anomaly detection in AODV-based MANETs. In: Proceedings of International Symposium on Computer Networks and Distributed Systems (CNDS), pp. 67–72 (2011)
Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Xiao, Y., Shen, X., Du, S. (eds.) Wireless/Mobile Network Security, pp. 170–196 (2006)
Avram, T., Oh, S., Hariri, S.: Analyzing attacks in wireless ad hoc network with self-organizing maps. In: Proceedings of the 5th Annual CCNSR, pp. 166–175 (2007)
Azer, M. A., El-Kansa, S. M., El-Soudani, M. S.: Security in ad hoc networks from vulnerability to risk management. In: IEEE 3rd International Conference on Emerging Security Information, Systems and Technologies, pp. 203–209 (2009)
Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 1–27 (2011)
Gan, G.: Data Clustering in C++: an object-oriented approach. Chapman & Hall/CRC, Boca Raton (2011)
Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Comput. Surv. 31(3), 264–323 (1999)
Li, W., Joshi, A.: Outlier detection in ad hoc networks using Dempster-Shafer theory. In: Proceedings of the 10th ICMDM, pp. 112–121 (2009)
Mitrokotsa, A., Tsagkaris, M., Douligeris, C.: Intrusion detection in mobile ad hoc networks using classification algorithms. In: Processing of IFIP International Federation for Information, Advances in Ad Hoc Networking, Vol. 265, pp. 133–144 (2008)
Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., Kato, N.: A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Trans. Veh. Technol. 58(5), 2471–2481 (2009)
Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Proc. Ad Hoc Netw. 3(6), 795–819 (2005)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector routing. RFC 3561 (2003)
Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of the ACM Workshop on Data Mining Applied to Security, pp. 1–14 (2001)
Sadoddin, R., Ghorbani, A.: A comparative study of unsupervised machine learning and data mining techniques for intrusion detection. Machine Learning and Data Mining in Pattern Recognition. In: Perner, P. (ed.) Vol. 4571, pp. 404–418 (2007)
Sun, B., Wu, K., Pooch, U.: Towards adaptive intrusion detection in mobile ad hoc networks. In: Proceedings of IEEE GLOBECOM, pp. 3551–3555 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Dang, B.H., Li, W. (2015). Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks. In: Lee, R. (eds) Computer and Information Science. Studies in Computational Intelligence, vol 566. Springer, Cham. https://doi.org/10.1007/978-3-319-10509-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-10509-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10508-6
Online ISBN: 978-3-319-10509-3
eBook Packages: EngineeringEngineering (R0)