Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
Journal article, 2013

Intrusion detection is frequently used as a second line of defense in Mobile Ad-hoc Networks (MANETs). In this paper we examine how to properly use classification methods in intrusion detection for MANETs. In order to do so we evaluate five supervised classification algorithms for intrusion detection on a number of metrics. We measure their performance on a dataset, described in this paper, which includes varied traffic conditions and mobility patterns for multiple attacks. One of our goals is to investigate how classification performance depends on the problem cost matrix. Consequently, we examine how the use of uniform versusweighted cost matrices affects classifier performance. A second goal is to examine techniques for tuning classifiers when unknown attack subtypes are expected during testing. Frequently, when classifiers are tuned using cross-validation, data from the same types of attacks are available in all folds. This differs from real-world employment where unknown types of attacks may be present. Consequently, we develop a sequential cross-validation procedure so that not all types of attacks will necessarily be present across all folds, in the hope that this would make the tuning of classifiers more robust. Our results indicate that weighted cost matrices can be used effectively with most statistical classifiers and that sequential cross-validation can have a small, but significant effect for certain types of classifiers. © 2012 Elsevier B.V. All rights reserved.

Classification algorithms

Intrusion detection

Mobile Ad-hoc Networks (MANETs)

Cost-sensitive classification

Author

Aikaterini Mitrokotsa

Swiss Federal Institute of Technology in Lausanne (EPFL)

Christos Dimitrakakis

Swiss Federal Institute of Technology in Lausanne (EPFL)

Ad Hoc Networks

1570-8705 (ISSN)

Vol. 11 1 226-237

Areas of Advance

Information and Communication Technology

Subject Categories

Computer and Information Science

DOI

10.1016/j.adhoc.2012.05.006

More information

Latest update

8/24/2021