| تعداد نشریات | 31 |
| تعداد شمارهها | 834 |
| تعداد مقالات | 8,015 |
| تعداد مشاهده مقاله | 14,854,818 |
| تعداد دریافت فایل اصل مقاله | 9,587,849 |
ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS | ||
| Iranian Journal of Fuzzy Systems | ||
| مقاله 7، دوره 10، شماره 2، تیر 2013، صفحه 83-109 اصل مقاله (745.47 K) | ||
| نوع مقاله: Research Paper | ||
| شناسه دیجیتال (DOI): 10.22111/ijfs.2013.614 | ||
| نویسندگان | ||
| Mohammad Rahmanimanesh؛ Saeed Jalili* | ||
| Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Islamic Republic of Iran | ||
| چکیده | ||
| In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used for combining one-class support vector machine (OCSVM), mixture of Gaussians (MoG), and self-organizing maps (SOM) one-class classifiers and the combined model is utilized to partially detect the attacks in cluster members. The votes of cluster members are periodically transmitted to the cluster head and final decision on attack detection is carried out in the cluster head. In the proposed method, an adaptive ordered weighted averaging (OWA) operator is used for aggregating the votes of cluster members in the cluster head. Since the network topology, traffic, and environmental conditions of a MANET as well as the number of nodes in each cluster dynamically change, the mere use of a fixed quantifier-based weight generation approach for OWA operator is not efficient. We propose a condition-based weight generation method for OWA operator in which the number of cluster members that participate in decision making may be varying in time and OWA weights are calculated periodically and dynamically based on the conditions of the network. Simulation results demonstrate the effectiveness of the proposed method in detecting rushing, RouteError fabrication, and wormhole attacks. | ||
| کلیدواژهها | ||
| Ordered weighted averaging weight generation؛ Mobile ad hoc network؛ Anomaly detection | ||
| مراجع | ||
|
[1] B. S. Ahn, Preference relation approach for obtaining OWA operators weights, International Journal of Approximate Reasoning, 47 (2008), 166-178. [2] B. S. Ahn, Parameterized OWA operator weights: an extreme point approach, International Journal of Approximate Reasoning, 51 (2010), 820-831. [3] G. R. Amin and A. Emrouznejad, An extended minimax disparity to determine the OWA operator weights, Computers & Industrial Engineering, 50 (2006), 312-316. [4] V. S. Anitha and M. P. Sebastian, (k, r)-dominating set-based, weighted and adaptive cluster- ing algorithms for mobile ad hoc networks, IET Communications, 5(13) (2011), 1836-1853. [5] T. Avram, S. Oh and S. Hariri, Analyzing attacks in wireless ad hoc network with self- organizing maps, in Proceedings of Fifth Annual Conference on Communication Networks and Services Research (CNSR 07), (2007), 166-175. [6] N. Y. Aydin, E. Kentel and S. Duzgun, GIS-based environmental assessment of wind energy systems for spatial planning: a case study from Western Turkey, Renewable and Sustainable Energy Reviews, 14 (2010), 364-373. [7] K. Bhargavan, C. A. Gunter, M. Kim, I. Lee, D. Obradovic, O. Sokolsky and M. Viswanathan, Verisim: formal analysis of network simulations, IEEE Transactions on Software Engineer- ing, 28(2) (2002), 129-145. [8] C. Bishop, Neural networks for pattern recognition, Oxford University Press, 1995. [9] A. P. Bradley, The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, 30(7) (1997), 1145-1159. [10] J. B. D. Cabrera, C. Gutierrez and R. K. Mehra, Infrastructures and algorithms for dis- tributed anomaly-based intrusion detection in mobile ad hoc networks, In Proceedings of IEEE Military Communications Conference (MILCOM 2005), (2005), 1831-1837. [11] J. B. D. Cabrera, C. Gutierrez and R. K. Mehra, Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad hoc networks, Information Fusion, 17(8) (2008), 96-119. [12] N. Cagman and S. Enginoglu, Fuzzy soft matrix theory and its application in decision making, Iranian Journal of Fuzzy Systems, 9(1) (2012), 109-119. [13] Z. Chen, Consensus in group decision making under linguistic assessments, Ph.D. Disserta- tion, Kansas State University, 2005. [14] W. Chen, N. Jain and S. Singh, ANMP: ad hoc network management protocol, IEEE Journal on Selected Areas in Communications, 17(8) (1999), 1506-1531. [15] H. Chen and L. Zhou, An approach to group decision making with interval fuzzy prefer- ence relations based on induced generalized continuous ordered weighted averaging operator, Expert Systems with Applications, 38 (2011), 13432-13440. [16] S. Cho, Fuzzy aggregation of modular neural networks with ordered weighted averaging oper- ators, International Journal of Approximate Reasoning, 13 (1995), 359-375. [17] A. De and E. D. Diaz, A fuzzy ordered weighted average (OWA) approach to result merging for meta search using the analytical network process, In Proceedings of Second International Conference on Emerging Applications of Information Technology (EAIT), (2011), 17-20. [18] H. Deng, R. Xu, J. Li, F. Zhang, R. Levy and W. Lee, Agent-based cooperative anomaly detection for wireless ad hoc networks, In Proceedings of the 12th International Conference on Parallel and Distributed Systems (ICPADS 06), 2006. [19] H. Deng, Q. A. Zeng and D. P. Agrawal, SVM-based intrusion detection system for wireless ad hoc networks, In Proceedings of IEEE Vehicular Technology Conference, (2003), 2147-2151. [20] M. Dursun, E. E. Karsak and M. A. Karadayi, A fuzzy multi-criteria group decision mak- ing framework for evaluating health-care waste disposal alternatives, Expert Systems with Applications, 38 (2011), 11453-11462. [21] A. Emrouznejad, MP-OWA: the most preferred OWA operator, Knowledge-Based Systems, 21 (2008), 847-851. [22] A. Emrouznejad and G. R. Amin, Improving minimax disparity model to determine the OWA operator weights, Information Sciences, 180 (2010), 1477-1485. [23] D. Filev and R. R. Yager, On the issue of obtaining OWA operator weights, Fuzzy Sets and Systems, 94 (1998), 157-169. [24] R. Fuller and P. Majlender, An analytic approach for obtaining maximal entropy OWA op- erator weights, Fuzzy Sets and Systems, 124 (2001), 53-57. [25] R. Fuller and P. Majlender, On obtaining minimal variability OWA operator weights, Fuzzy Sets and Systems, 136 (2003), 203-215. [26] M. A. Ghaderi, N. Yazdani, B. Moshiri and M. Tayefeh Mahmoudi, A new approach for text feature selection based on OWA operator, In Proceedings of 5th International Symposium on Telecommunications (IST), (2010), 579-583. [27] G. Giacinto, R. Perdisci, M. Del Rio and F. Roli, Intrusion detection in computer networks by a modular ensemble of one-class classiers, Information Fusion, Special Issue on Applications of Ensemble Methods, 9(1) (2008), 69-82. [28] F. Herrera, E. Herrera-Viedma and J. L. Verdegay, Direct approach processes in group deci- sion making using linguistic OWA operators, Fuzzy Sets and Systems, 79 (1996), 175-190. [29] Y. C. Hu, A. Perrig and D. B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, in Proceedings of ACM Workshop on Wireless Security (WiSe 2003), (2003), 30-40. [30] Y. C. Hu, A. Perrig and D. B. Johnson, Wormhole attacks in wireless networks, IEEE Journal on Selected Areas in Communications, 24(2) (2006), 370-380. [31] Y. Huang, W. Fan, W. Lee and P. Yu, Cross-feature analysis for detecting ad hoc routing anomalies, in Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 03), (2003), 478-487. [32] Y. A. Huang and W. Lee, Attack analysis and detection for ad hoc routing protocols, in Proceedings of Recent Advances in Intrusion Detection, (2004), 125-145. [33] S. Jazebi, A. Tohidi and M. Rahgozar, Application of classier fusion for protein fold recog- nition, In Proceedings of Sixth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 09), (2009), 171-175. [34] T. Kohonen, self-organizing maps, Springer-Verlag, 3rd edition, 2001. [35] L. I. Kuncheva, Combining pattern classiers, methods and algorithms, John Wiley and Sons, 2004. [36] S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour and Y. Nemoto, A self-adaptive in- trusion detection method for AODV-based mobile ad hoc networks, In Proceedings of IEEE International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS 05), (2005), 773-780. [37] X. Li, F. Zhou and X. Yang, A multi-dimensional trust evaluation model for large-scale P2P computing, Journal of Parallel and Distributed Computing, 71 (2011), 837-847. [38] C. X. Ling, J. Huang and H. Zhang, AUC: a statistically consistent and more discriminat- ing measure than accuracy, In Proceedings of 18th International Conference on Articial Intelligence, (2003), 329-341. [39] X. Liu, The solution equivalence of minimax disparity and minimum variance problems for OWA operator, International Journal of Approximate Reasoning, 45 (2007), 68-81. [40] X. Liu, A general model of parameterized OWA aggregation with given orness level, Interna- tional Journal of Approximate Reasoning, 48 (2008), 598-627. [41] B. Llamazares, Choosing OWA operator weights in the eld of social choice, Information Sciences, 177 (2007), 4745-4756. [42] C. Lo and W. Chen, A hybrid information security risk assessment procedure considering interdependences between controls, Expert Systems with Applications, 39 (2012), 247-257. [43] P. Majlender, OWA operators with maximal Renyi entropy, Fuzzy Sets and Systems, 155 (2005), 340-360. [44] J. McElroy and P. Gader, Generalized encoding and decoding operators for lattice-based as- sociative memories, IEEE Transactions on Neural Networks, 20(10) (2009), 1674-1678. [45] J. M. Merigo and M. Casanovas, Fuzzy generalized hybrid aggregation operators and its application in decision making, International Journal of Fuzzy Systems, 12(1) (2010), 15-24. [46] J. M. Merigo and M. Casanovas, Decision-making with distance measures and induced ag- gregation operators, Computers & Industrial Engineering, 60 (2011), 66-76. [47] J. M. Merigo and M. Casanovas, Induced aggregation operators in the Euclidean distance and its application in nancial decision making, Expert Systems with Applications, 38 (2011), 7603-7608. [48] J. M. Merigo and M. Casanovas, Induced and uncertain heavy OWA operators, Computers & Industrial Engineering, 60 (2011), 106-116. [49] J. M. Merigo and A. M. Gil-Lafuente, The induced generalized OWA operator, Information Sciences, 179(6) (2009),729-741. [50] J. M. Merigo and A. M. Gil-Lafuente, Fuzzy induced generalized aggregation operators and its application in multi-person decision making, Expert Systems with Applications, 38 (2011), 9761-9772. [51] H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto and N. Kato, A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks, IEEE Transactions on Vehicular Technology, 58(5) (2009), 2471-2481. [52] J. Nin, B. Carminati, E. Ferrari and V. Torra, Computing reputation for collaborative pri- vate networks, in Proceedings of 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 09), (2009), 246-253. [53] NS-2 (network simulator version 2), URL: http://www.isi.edu/nsnam/ns/ns-documentation, 2010. [54] M. O'Hagan, Aggregating template or rule antecedents in real-time expert systems with fuzzy set logic, In Proceedings of 22nd Annual IEEE Asilomar Conference on Signals, Systems, Computers, (1988), 681-689. [55] R. Perdisci, D. Ariu, P. Fogla, G. Giacinto and W. Lee, McPAD : a multiple classier system for accurate payload-based anomaly detection, Computer Networks, Special Issue on Trac Classication and Its Applications to Modern Networks, 5(6) (2009), 864-881. [56] C. Perkins and E. Royer, Ad hoc on demand distance vector routing, In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 99), (1999), 90-100. [57] C. Perkins, E. Royer and S. Das, Ad hoc on demand distance vector routing, IETF RFC 3561, 2003. [58] J. Renaud, E. Levrat and C. Fonteix, Weights determination of OWA operators by parametric identication, Mathematics and Computers in Simulation, 77 (2008), 499-511. [59] R. Sadiq and S. Tesfamariam, Probability density functions-based weights for ordered weighted averaging (OWA) operators: an example of water quality indices, European Journal of Op- erational Research, 182 (2007), 1350-1368. [60] B. Scholkopf, J. C. Platt, J. S. Taylor, A. J. Smola and R. C. Williamson, Estimating the support of a high dimensional distribution, Neural Computation, 13 (2001), 1443-1471. [61] F. Szidarovszky and M. Zarghami, Combining fuzzy quantiers and neat operators for soft computing, Iranian Journal of Fuzzy Systems, 6(1) (2009), 15-25. [62] D. M. J. Tax, One-class classication, Ph.D. Dissertation, Delft University of Technology, 2001. [63] D. M. J. Tax, M. V. Breukelen, R. P. W. D. Duin and J. Kittler, Combining multiple classiers by averaging or by multiplying?, Pattern Recognition, 33(9) (2000), 1475-1485. [64] J. A. Torkestani and M. R. Meybodi, Clustering the wireless ad hoc networks: a distributed learning automata approach, Journal of Parallel and Distributed Computing, 70(4) (2010), 394-405. [65] Y. M. Wang, Y. Luo and X. Liu, Two new models for determining OWA operator weights, Computers & Industrial Engineering, 52 (2007), 203-209. [66] Y. M. Wang and C. Parkan, A minimax disparity approach for obtaining OWA operator weights, Information Sciences, 175 (2005), 20-29. [67] Y. M. Wang and C. Parkan, A preemptive goal programming method for aggregating OWA operator weights in group decision making, Information Sciences, 177 (2007), 1867-1877. [68] Y. Wu and J. Liu, A new method for sh disease diagnosis system based on rough set and classier fusion, In Proceedings of International Conference on Articial Intelligence and Computational Intelligence (AICI 09), (2009), 24-27. [69] J. Wu, B. L. Sun, C. Y. Liang and S. L. Yang, A linear programming model for determining ordered weighted averaging operator weights with maximal Yager's entropy, Computers & Industrial Engineering, 57 (2009), 742-747. [70] Y. Wu, X. Tan and S. Gu, A learning evaluation system based on classier fusion for E- learning, In Proceedings of IEEE International Symposium on IT in Medicine & Education (ITIME 09), (2009), 749-752. [71] Z. Xu, Induced uncertain linguistic OWA operators applied to group decision making, Infor- mation Fusion, 7 (2006), 231-238. [72] R. R. Yager, On ordered weighted averaging aggregation operators in multi-criteria decision making, IEEE Transactions on Systems, Man and Cybernetics, 18 (1988), 183-190. [73] R. R. Yager, Families of OWA operators, Fuzzy Sets and Systems, 59 (1993), 125-148. [74] R. R. Yager, Quantier guided aggregation using OWA operators, International Journal of Intelligent Systems, 11 (1996), 49-73. [75] R. R. Yager, Heavy OWA operators, Fuzzy Optimization and Decision Making, 1(4) (2002), 379-397. [76] R. R. Yager, Generalized OWA aggregation operators, Fuzzy Optimization and Decision Mak- ing, 3(1) (2004), 93-107. [77] R. R. Yager, OWA aggregation over a continuous interval argument with applications to decision making, IEEE Transactions on Systems, Man, and Cybernetics, Part B 34 (2004), 1952-1963. [78] R. R. Yager, Centered OWA operators, Soft Computing, 11 (2007), 631-639. [79] R. R. Yager, On the dispersion measure of OWA operators, Information Sciences, 179 (2009), 3908-3919. [80] R. R. Yager and D. P. Filev, Induced ordered weighted averaging operators, IEEE Transaction on Systems, Man and Cybernetics, 29 (1999), 141-150. [81] J. Y. Yu and P. H. J. Chong, A survey of clustering schemes for mobile ad hoc networks, IEEE Communications Surveys & Tutorials, 7(1) (2005), 32-48. [82] Y. Zhang and W. Lee, Intrusion detection in wireless ad hoc networks, In Proceedings of 6th Annual International Conference on Mobile Computing and Networking, (2000), 275-283. [83] Y. Zhang, W. Lee and Y. Huang, Intrusion detection techniques for mobile wireless networks, ACM Wireless Networks, 9(5) (2003), 545-556. [84] L. G. Zhou and H. Y. Chen, Continuous generalized OWA operator and its application to decision making, Fuzzy Sets and Systems, 168 (2011), 18-34. [85] S. M. Zhou, F. Chiclana, R. I. John and J. M. Garibaldi, Type-1 OWA operators for aggre- gating uncertain information with uncertain weights induced by type-2 linguistic quantiers, Fuzzy Sets and Systems, 159 (2008), 3281-3296. [86] S. M. Zhou, F. Chiclana, R. I. John and J. M. Garibaldi, Alpha-level aggregation: a practical approach to type-1 OWA operation for aggregating uncertain information with applications to breast cancer treatments, IEEE Transactions on Knowledge and Data Engineering, 23(10) (2011), 1455-1468. | ||
|
آمار تعداد مشاهده مقاله: 2,754 تعداد دریافت فایل اصل مقاله: 2,423 |
||