{"id":"https://openalex.org/W2902744111","doi":"https://doi.org/10.1109/icacci.2018.8554856","title":"An SVM-based Multiclass IDS for Multicast Routing Attacks in Mobile Ad Hoc Networks","display_name":"An SVM-based Multiclass IDS for Multicast Routing Attacks in Mobile Ad Hoc Networks","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2902744111","doi":"https://doi.org/10.1109/icacci.2018.8554856","mag":"2902744111"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2018.8554856","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055375649","display_name":"Menaka Pushpa Arthur","orcid":"https://orcid.org/0000-0002-0204-6841"},"institutions":[{"id":"https://openalex.org/I4210101093","display_name":"St. Joseph's Institute of Technology","ror":"https://ror.org/012npkr10","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210101093"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Menaka Pushpa Arthur","raw_affiliation_strings":["Department of Information Technology, St. Joseph's Institute of Technology, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, St. Joseph's Institute of Technology, Chennai, India","institution_ids":["https://openalex.org/I4210101093"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5055375649"],"corresponding_institution_ids":["https://openalex.org/I4210101093"],"apc_list":null,"apc_paid":null,"fwci":0.9227,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78569195,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2","issue":null,"first_page":"363","last_page":"368"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8530200123786926},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7771328687667847},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.7626367807388306},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.5715667009353638},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5129765868186951},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5041259527206421},{"id":"https://openalex.org/keywords/protocol-independent-multicast","display_name":"Protocol Independent Multicast","score":0.496207058429718},{"id":"https://openalex.org/keywords/geocast","display_name":"Geocast","score":0.48868706822395325},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4669175148010254},{"id":"https://openalex.org/keywords/distance-vector-multicast-routing-protocol","display_name":"Distance Vector Multicast Routing Protocol","score":0.4605481028556824},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.45776110887527466},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4520719349384308},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.41963472962379456},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.39743587374687195},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.3894551396369934},{"id":"https://openalex.org/keywords/xcast","display_name":"Xcast","score":0.3328660726547241},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17835402488708496},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.07096782326698303},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.058168888092041016},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.05408862233161926}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8530200123786926},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7771328687667847},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.7626367807388306},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.5715667009353638},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5129765868186951},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5041259527206421},{"id":"https://openalex.org/C44892269","wikidata":"https://www.wikidata.org/wiki/Q782752","display_name":"Protocol Independent Multicast","level":3,"score":0.496207058429718},{"id":"https://openalex.org/C108207678","wikidata":"https://www.wikidata.org/wiki/Q689216","display_name":"Geocast","level":5,"score":0.48868706822395325},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4669175148010254},{"id":"https://openalex.org/C42272142","wikidata":"https://www.wikidata.org/wiki/Q1229379","display_name":"Distance Vector Multicast Routing Protocol","level":4,"score":0.4605481028556824},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.45776110887527466},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4520719349384308},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.41963472962379456},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.39743587374687195},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3894551396369934},{"id":"https://openalex.org/C192059732","wikidata":"https://www.wikidata.org/wiki/Q3823050","display_name":"Xcast","level":3,"score":0.3328660726547241},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17835402488708496},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.07096782326698303},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.058168888092041016},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.05408862233161926},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2018.8554856","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1592838620","https://openalex.org/W1837250640","https://openalex.org/W2160543135","https://openalex.org/W2189574801","https://openalex.org/W2586733088","https://openalex.org/W2602513347","https://openalex.org/W2615436354","https://openalex.org/W6683640196"],"related_works":["https://openalex.org/W80466176","https://openalex.org/W2371847117","https://openalex.org/W1997462448","https://openalex.org/W1559233856","https://openalex.org/W89592389","https://openalex.org/W2080190883","https://openalex.org/W2090001069","https://openalex.org/W4100715","https://openalex.org/W1587679071","https://openalex.org/W1481296298"],"abstract_inverted_index":{"Multicast":[0],"routing":[1,56],"protocols":[2],"of":[3,39,51,58,101,104],"Mobile":[4],"Ad":[5],"Hoc":[6],"Networks":[7],"are":[8,68,96],"highly":[9,40],"vulnerable":[10],"to":[11,17,30,121],"various":[12,73],"internal":[13,32,74],"stealthy":[14,33],"attacks":[15],"due":[16],"multicast":[18,102],"group":[19],"members.":[20],"A":[21],"cross-layer-based":[22,100],"Intrusion":[23,45],"Detection":[24,46],"System":[25,47],"exchanges":[26],"features":[27,50],"across":[28],"layers":[29,57],"differentiate":[31],"attackers":[34,123],"from":[35],"congested":[36],"normal":[37],"nodes":[38,61],"challenged":[41],"networks.":[42,107],"This":[43],"proposed":[44,109],"uses":[48],"the":[49,52,55,99],"MAC":[53],"and":[54,62,93],"two":[59],"communicating":[60],"their":[63],"neighbors.":[64],"Multiclass":[65],"classification":[66],"algorithms":[67],"efficient":[69],"for":[70,98],"MANET,":[71],"where":[72],"attacking":[75],"strategies":[76],"exploit":[77],"marginally":[78],"different":[79],"misbehaviors.":[80],"In":[81],"this":[82],"work,":[83],"well-known":[84],"multiclass":[85,110],"SVM":[86],"techniques,":[87],"such":[88],"as":[89],"a":[90,94],"modified":[91],"One-Vs-One":[92],"One-Vs-All,":[95],"applied":[97],"communication":[103],"ad":[105],"hoc":[106],"The":[108],"SVM-based,":[111],"cross-layer":[112],"IDS":[113],"ensure":[114],"high":[115],"accuracy":[116],"with":[117],"minimum":[118],"computation":[119],"overhead":[120],"classify":[122],"in":[124],"resource":[125],"constrained":[126],"networks":[127],"like":[128],"MANET.":[129]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
