4.6 Article

A deep learning-based intrusion detection approach for mobile Ad-hoc network

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network

W. Gracy Theresa et al.

Summary: Mobile computing is a powerful application for network communication and connectivity, but it faces challenges in terms of network security. This study introduces a Secure Energy Routing (SER) protocol for MANETs, which detects and prevents attacks in the network using Elliptical Curve Cryptography (ECC).

INTELLIGENT AUTOMATION AND SOFT COMPUTING (2023)

Article Automation & Control Systems

WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

C. Edwin Singh et al.

Summary: Mobile ad-hoc networks have the potential to provide low-cost communication solutions but are more vulnerable to security threats. This study proposes the use of the WOA-DNN model, which combines the Whale Optimization Algorithm and Deep Neural Network, to detect and classify intrusions in the network.

INTELLIGENT AUTOMATION AND SOFT COMPUTING (2023)

Article Computer Science, Interdisciplinary Applications

A Novel Deep Learning-Based Intrusion Detection System for IoT Networks

Albara Awajan

Summary: The rapid growth of the Internet of Things (IoT) has attracted the attention of cybercriminals, leading to an increasing number of cyber-attacks on IoT devices and intermediate communication media. This paper presents a novel Deep Learning (DL)-based intrusion detection system for IoT devices, which uses a four-layer deep Fully Connected (FC) network architecture to detect malicious traffic. The proposed system demonstrates reliable performance in detecting various types of attacks with an average accuracy of 93.74%. This innovative deep learning-based IDS maintains a 93.21% average detection rate, providing satisfactory improvement to the security of IoT networks.

COMPUTERS (2023)

Article Automation & Control Systems

An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks

Mahendra Prasad et al.

Summary: A Mobile Ad-Hoc Network (MANET) is a widely used temporary network that is vulnerable to routing attacks. Many intrusion detection methods have been proposed to tackle this vulnerability. This paper presents a performance reliability evaluation model for intrusion detection methods in MANETs, which analyzes performance and hardware dependability and computes the performance reliability using a fuzzy logic system. The experimental results show that the proposed detection method outperforms existing methods in terms of maintaining high scheme reliability.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2023)

Article Computer Science, Hardware & Architecture

An Improved Multi-Objective Particle Swarm Optimization Routing on MANET

G. Rajeshkumar et al.

Summary: A Mobile Ad hoc Network (MANET) is a wireless network without existing infrastructure, aimed at extending flexibility. An Intrusion Detection System (IDS) is used to detect malicious behavior and report it, while the Cluster Trust Adaptive Acknowledgement (CTAA) method is used to identify unauthorized and malfunctioning nodes. Route optimization using Multi-Objective Particle Swarm Optimization (MOPSO) technique improves energy efficiency and reduces network traffic.

COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

An enhanced detection system against routing attacks in mobile ad-hoc network

Mahendra Prasad et al.

Summary: Mobile ad-hoc network is vulnerable to attacks, and encryption-based security mechanism is not compatible. Lightweight technique and intrusion detection system serve as reliable security mechanisms. This paper proposes an intrusion detection method based on learning techniques, which outperforms existing schemes in extensive simulations.

WIRELESS NETWORKS (2022)

Article Chemistry, Analytical

Evolution of Sensor Research for Clarifying the Dynamics and Properties of Future Directions

Mario Coccia et al.

Summary: The principal goal of this study is to analyze the evolution of sensor research and technologies from 1990 to 2020, providing insights into future directions. Network analysis was applied to a large dataset of publications in the field, covering a 30-year period. Results demonstrate that the evolution of sensors is driven by increasing scientific interactions within networks, leading to the development of versatile and specialized technologies like wireless sensors, biosensors, fiber-optic, and optical sensors, with various industrial applications. These findings highlight new directions for sensor research and suggest promising technological trajectories that can support scientific, technological, industrial, and socioeconomic development.

SENSORS (2022)

Proceedings Paper Computer Science, Information Systems

Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders

Gianni D'Angelo et al.

Summary: The outbreak of the COVID-19 pandemic has led to a significant increase in the use of mobile devices by employees worldwide to access corporate systems, making them more vulnerable to malicious applications. In this paper, a novel approach called API-Streams is proposed to minimize damages at runtime. Through the use of CNN-LSTM Autoencoders, the proposed approach achieves an average accuracy of 98% in video classification tasks.

MOBILE INTERNET SECURITY, MOBISEC 2021 (2022)

Article Computer Science, Hardware & Architecture

Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial-temporal features extraction

Gianni D'Angelo et al.

Summary: The main aim of this work is to support modern network traffic classification methods by mining more expressive and meaningful features from basic features using a novel deep neural network architecture. Through experiments and theoretical analysis, it is demonstrated that the traffic classifier obtained by stacking autoencoder with a fully connected neural network significantly improves accuracy compared to existing machine learning approaches, pure convolutional and recurrent stacked neural networks, and pure feed-forward networks. This classifier is also able to maintain high accuracy even with imbalanced training datasets.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Chemistry, Analytical

Scientific Developments and New Technological Trajectories in Sensor Research

Mario Coccia et al.

Summary: Scientific developments and new technological trajectories in the field of sensors are crucial for understanding technological and social change. The study reveals that new directions in sensor research are driving technological trajectories of wireless sensor networks, biosensors, and wearable sensors.

SENSORS (2021)

Article Engineering, Multidisciplinary

Channel State Information Prediction for 5G Wireless Communications: A Deep Learning Approach

Changqing Luo et al.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2020)

Article Computer Science, Information Systems

Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device

Fang Feng et al.

AD HOC NETWORKS (2019)

Article Engineering, Electrical & Electronic

Wireless Networks Design in the Era of Deep Learning: Model-Based, AI-Based, or Both?

Alessio Zappone et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Anomaly-based Behavioral Detection in Mobile Ad-Hoc Networks

Rahma Meddeb et al.

KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019) (2019)

Article Computer Science, Theory & Methods

Distributed attack detection scheme using deep learning approach for Internet of Things

Abebe Abeshu Diro et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

Anomaly detection of spectrum in wireless communication via deep auto-encoders

Qingsong Feng et al.

JOURNAL OF SUPERCOMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach

Muhamad Erza Aminanto et al.

INFORMATION SECURITY APPLICATIONS, WISA 2016 (2017)

Article Computer Science, Theory & Methods

The Evolution of Android Malware and Android Analysis Techniques

Kimberly Tam et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Information Systems

Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks

Muhammad Altaf Khan et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Artificial Intelligence

Detection of known and unknown DDoS attacks using Artificial Neural Networks

Alan Saied et al.

NEUROCOMPUTING (2016)

Review Computer Science, Information Systems

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

Sunil Kumar et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Facial Expressions Recognition Based on Convolutional Neural Networks for Mobile Virtual Reality

Teng Teng et al.

PROCEEDINGS VRCAI 2016: 15TH ACM SIGGRAPH CONFERENCE ON VIRTUAL-REALITY CONTINUUM AND ITS APPLICATIONS IN INDUSTRY (2016)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)