{"title":"A Review on the Performance Analysis of EAACK, TSTMC, AB-UBTM and HSCT for Intrusion Detection in Mobile Ad-Hoc Network","authors":"Dr. V. Umadevi","doi":"10.30534/ijccn/2018/01732018","DOIUrl":null,"url":null,"abstract":"An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing, Communications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30534/ijccn/2018/01732018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error