{"title":"Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps","authors":"Traian Avram, Seungchan Oh, S. Hariri","doi":"10.1109/CNSR.2007.15","DOIUrl":null,"url":null,"abstract":"Detecting anomalous events and attacks in the ad-hoc wireless network is a challenging area for research due to the characteristics of wireless network. The proposed detection system monitors network traffic on each node and analyzes collected data by self-organizing maps to extract statistical regularities from the input data vectors and encode them into the weights without supervision. We evaluate our approach to detect network attacks on AODV and DSR protocols using OPNET. Our simulation results show that our approach can accurately detect anomalous behaviors caused by network attacks.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CNSR.2007.15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
Detecting anomalous events and attacks in the ad-hoc wireless network is a challenging area for research due to the characteristics of wireless network. The proposed detection system monitors network traffic on each node and analyzes collected data by self-organizing maps to extract statistical regularities from the input data vectors and encode them into the weights without supervision. We evaluate our approach to detect network attacks on AODV and DSR protocols using OPNET. Our simulation results show that our approach can accurately detect anomalous behaviors caused by network attacks.