Decision Tree Based Revxiew

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

`

Wollo University College of informatics

MSc program Data communication and computer Networking

Research method in computing

Article review for the title Decision Tree based AIS strategy for Intrusion Detection in MANET by L.Elizebeth

and J.Chacko * 2019 IEEE Region 10 conference (TENCON 2019).

By zekarias mulugeta

(SGSE/0460/12)

Submitted to Habtamu.M(Phd)

Submitted date Dec 14-2019

Kombolcha, Ethiopia
Table of Contents
Introduction...........................................................................................................................................................1

1 Statement of the problem...................................................................................................................................1

2 Objectives..........................................................................................................................................................1

3 Methodology......................................................................................................................................................2

4 Finding...............................................................................................................................................................2

5 Strength and weakness of the study...................................................................................................................2

6 Conclusions........................................................................................................................................................2

7 Recommendations..............................................................................................................................................2

i
Title review Decision Tree based AIS strategy for Intrusion Detection in MANET by L.Elizebeth and

J.Chacko * 2019 IEEE Region 10 conference (TENCON 2019)

Introduction

In the research the author defines MANET is wireless communication of node without a need of fixed

infrastructure. Mobile ad-hoc network are areal choose for mobile communication in region fixed infrastructure

and for emergence and, disaster operation area.

In the research, it is proposed that a well-defined purpose of mobile ad-hoc intrusion detection system because

of real time packet delivery needed in emergency using Decision tree based AIS strategy. Intrusion means any

un authorized user enter to the system. Intrusion detection system is defending the mechanism for detecting

intruder from the system.

The researcher using learning memory and pattern recognition model (artificial immune system) to identifying

cheat node and select routing path for effective data packet delivery.

1 Statement of the problem

At the beginning the researcher describes the MANET application area like emergency operation and military

battlefield decrease performance by cheat node.

Secondly the researcher focuses on the answer why MANET easily attacked by intruder.

Thirdly the study focuses on identifying selfish node and chooses for the best route without selfish node .

2 Objectives

The effect of cheat node in packet delivery for application of MANET.

The effect of participating of node in routing for network data packet delivery performance.

1
Title review Decision Tree based AIS strategy for Intrusion Detection in MANET by L.Elizebeth and

J.Chacko * 2019 IEEE Region 10 conference (TENCON 2019)

The effect of IDS by using identifies a selfish node and selects the route without selfish node.

3 Methodology

The researcher using decision tree based Algorithm, which define 3 different models that are naïve node, cheat

node, vindictive Dc node &using NS-3 and MATLAB for simulation and result.

4 Finding

Identify selfish node and select the routing path without selfish node.

See the presence of cheat node and its packet delivery loss ratio increased.

Increase MANET application effectiveness using decision tree AIS algorithm.

5 Strength and weakness of the study

Pros -> The author describe the reason of intruder easily attack MANET and compare which intrusion

detection system is best based on performance.

 Describe the effect of cheat node in the application of MANET.

A con -> the study does not identify how to solve the power issue and intruder type mostly occurs.

6 Conclusions

The main purpose of conducting this research was to use MANET emergency operation application safely and to

give guaranties for integrity of communication between nodes and Challenge of security.

2
Title review Decision Tree based AIS strategy for Intrusion Detection in MANET by L.Elizebeth and

J.Chacko * 2019 IEEE Region 10 conference (TENCON 2019)

7 Recommendations

My evaluation to the researcher is power issue of MANET is critical and need other research to upgrade node

application year and use the application result by confidentiality.

You might also like