Downloads: 124 | Views: 269
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.2 / 10
Construction of an Intrusion Relieved Communication Channel using a Hybrid Optimized Algorithm
R. Reshma, S.K. Srivatsa
Abstract: In wireless network, several nodes try to communicate with each other by interchanging information between them. These wireless networks are highly subject to intrusion from unauthorized attackers. There are many intrusion detection systems to find the intrusion in these kinds of networks which have been proposed and implemented successfully. Yet there has been minimum amount of interest in developing an architecture which is relieved from intrusions, instead of just detecting them. In the previous works, we have constructed architecture for an intrusion relieved wireless network based on trust level of every node in the network and it has performed well too. The performance level of this intrusion relieved architecture could be boosted by using a hybrid technique to detect intrusion. In this paper, a hybrid technique comprising modified RotBoost algorithm, AdaBoost algorithm and Artificial Bee Colony (ABC) optimization algorithm to estimate the trust level of every node in upcoming instants is proposed. In this proposed hybrid technique, the ABC algorithm and the modified RotBoost learning algorithm [22] are executed in parallel manner. The modified RotBoost learning algorithm is used to find the fitness value of the predefined node which is used to compare with the nodes fitness from the employee bee phase of ABC algorithm. This comparison process takes place in the onlooker bee phase of ABC algorithm. At last in the scout bee phase in ABC is used to find the trusted node to check the intrusion. As per the information obtained from the scout bee phase the intrusion detector detects the intrusion free path. ABC is a naturally inspired optimization algorithm based on the behavior of honey-bee swarms and it is easy to implement. This hybrid technique comprising AdaBoost in ABC could detect the intruding nodes more effectively without making any adverse change to computation time of the existing architecture.
Keywords: Intrusion detection, Optimization, AdaBoost technique, Artificial Bee Colony ABC
Edition: Volume 3 Issue 7, July 2014
Pages: 419 - 427
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021
Pages: 158 - 161MLP and RNN Based Intrusion Detection System Using Machine Learning with Stochastic Optimization
Mithlesh Kumar, Gargishankar Verma
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 4, April 2024
Pages: 285 - 288Anomaly Detection of Financial Data using Machine Learning
Khirod Chandra Panda
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey