• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 7 (1), 2008
  3. 143-148
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2008 | Volume: 7 | Issue: 1 | Page No.: 143-148
DOI: 10.3923/itj.2008.143.148

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 87

Authors


P.C. Kishore Raja

Country: India

M. Suganthi

Country: India

R. Sunder

Country: India

Keywords


  • genetic algorithm
  • intrusion detection
  • Wireless network
Research Article

Wireless Node Misbehavior Detection Using Genetic Algorithm

P.C. Kishore Raja, M. Suganthi and R. Sunder
This study presents behavior-based wireless network intrusion detection using genetic algorithm that assumes misbehavior identification by observing a deviation from normal or expected behavior of wireless node. The feature set is constructed from MAC layer to profile the normal behavior of wireless node. The wireless node behavior is learned by using genetic algorithm and current wireless node behavior can be predicted by genetic algorithm based on the past behavior. A 3-tuple value i.e., entropy index, newness index, mismatch index is calculated for constructed feature set in a session. The 3-tuple value of a wireless node behavior in a session are compared with expected non-intrusive behavior 3-tuple value to find intrusions. The performance of wireless intrusion detection is evaluated using detection probability and false alarm probability.
PDF Fulltext XML References Citation

How to cite this article

P.C. Kishore Raja, M. Suganthi and R. Sunder, 2008. Wireless Node Misbehavior Detection Using Genetic Algorithm. Information Technology Journal, 7: 143-148.

DOI: 10.3923/itj.2008.143.148

URL: https://scialert.net/abstract/?doi=itj.2008.143.148

Related Articles

UC Secure Network Coding Against Pollution Attacks
A Specification Based Intrusion Detection Mechanism for the LEACH Protocol
Enhanced Intrusion Detection System for PKMv2 EAP-AKA used in WiBro

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved