International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 269

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.2 / 10


     

Construction of an Intrusion Relieved Communication Channel using a Hybrid Optimized Algorithm

R. Reshma, S.K. Srivatsa


Abstract: In wireless network, several nodes try to communicate with each other by interchanging information between them. These wireless networks are highly subject to intrusion from unauthorized attackers. There are many intrusion detection systems to find the intrusion in these kinds of networks which have been proposed and implemented successfully. Yet there has been minimum amount of interest in developing an architecture which is relieved from intrusions, instead of just detecting them. In the previous works, we have constructed architecture for an intrusion relieved wireless network based on trust level of every node in the network and it has performed well too. The performance level of this intrusion relieved architecture could be boosted by using a hybrid technique to detect intrusion. In this paper, a hybrid technique comprising modified RotBoost algorithm, AdaBoost algorithm and Artificial Bee Colony (ABC) optimization algorithm to estimate the trust level of every node in upcoming instants is proposed. In this proposed hybrid technique, the ABC algorithm and the modified RotBoost learning algorithm [22] are executed in parallel manner. The modified RotBoost learning algorithm is used to find the fitness value of the predefined node which is used to compare with the nodes fitness from the employee bee phase of ABC algorithm. This comparison process takes place in the onlooker bee phase of ABC algorithm. At last in the scout bee phase in ABC is used to find the trusted node to check the intrusion. As per the information obtained from the scout bee phase the intrusion detector detects the intrusion free path. ABC is a naturally inspired optimization algorithm based on the behavior of honey-bee swarms and it is easy to implement. This hybrid technique comprising AdaBoost in ABC could detect the intruding nodes more effectively without making any adverse change to computation time of the existing architecture.


Keywords: Intrusion detection, Optimization, AdaBoost technique, Artificial Bee Colony ABC


Edition: Volume 3 Issue 7, July 2014


Pages: 419 - 427



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
R. Reshma, S.K. Srivatsa, "Construction of an Intrusion Relieved Communication Channel using a Hybrid Optimized Algorithm", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 419-427, https://www.ijsr.net/getabstract.php?paperid=2014927, DOI: https://www.doi.org/10.21275/2014927



Similar Articles

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2571 - 2575

Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation

Harish Narne

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 158 - 161

MLP and RNN Based Intrusion Detection System Using Machine Learning with Stochastic Optimization

Mithlesh Kumar, Gargishankar Verma

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 4, April 2024

Pages: 285 - 288

Anomaly Detection of Financial Data using Machine Learning

Khirod Chandra Panda

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article



Top