{"id":"https://openalex.org/W4380488920","doi":"https://doi.org/10.3233/jifs-230161","title":"Fuzzy based inference system with ensemble classification based intrusion detection system in MANET","display_name":"Fuzzy based inference system with ensemble classification based intrusion detection system in MANET","publication_year":2023,"publication_date":"2023-06-13","ids":{"openalex":"https://openalex.org/W4380488920","doi":"https://doi.org/10.3233/jifs-230161"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-230161","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-230161","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001182506","display_name":"Arthi Arumugam","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Arthi","raw_affiliation_strings":["Department of Artificial Intelligence and Data Science, Rajalakshmi Institute of Technology, Chennai, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Science, Rajalakshmi Institute of Technology, Chennai, Tamilnadu, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081319254","display_name":"A. Beno","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Beno","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Dr. Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Dr. Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101572909","display_name":"Saurabh Sharma","orcid":"https://orcid.org/0000-0002-2968-6574"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Sharma","raw_affiliation_strings":["Department of Electronics and Communication Engineering, New Horizon College of Engineering, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, New Horizon College of Engineering, Bangalore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103056102","display_name":"B. Sangeetha","orcid":"https://orcid.org/0000-0002-8167-9339"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"B. Sangeetha","raw_affiliation_strings":["Department of Electronics and Communication Engineering, AVS Engineering College, Salem, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, AVS Engineering College, Salem, Tamilnadu, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103056102"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.47076696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"45","issue":"3","first_page":"3567","last_page":"3574"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8372606039047241},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6641322374343872},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5863315463066101},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5377237200737},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5317187309265137},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5124802589416504},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4957910478115082},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4935828447341919},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4900273084640503},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.48808324337005615},{"id":"https://openalex.org/keywords/multilayer-perceptron","display_name":"Multilayer perceptron","score":0.41929495334625244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.264326274394989},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22557500004768372},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.1686444878578186},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.0964280366897583}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8372606039047241},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6641322374343872},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5863315463066101},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5377237200737},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5317187309265137},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5124802589416504},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4957910478115082},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4935828447341919},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4900273084640503},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48808324337005615},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.41929495334625244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.264326274394989},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22557500004768372},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.1686444878578186},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0964280366897583},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-230161","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-230161","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2608288528","https://openalex.org/W2774234451","https://openalex.org/W2775100117","https://openalex.org/W2782769853","https://openalex.org/W2789858278","https://openalex.org/W2794559378","https://openalex.org/W2802686600","https://openalex.org/W2806779231","https://openalex.org/W2810915196","https://openalex.org/W2889286774","https://openalex.org/W2890206204","https://openalex.org/W2902722940","https://openalex.org/W2909813299","https://openalex.org/W2918845570","https://openalex.org/W2922404196","https://openalex.org/W2927044290","https://openalex.org/W2977970678","https://openalex.org/W3019691138","https://openalex.org/W3141249013","https://openalex.org/W3167406078","https://openalex.org/W3167589419","https://openalex.org/W4285558302","https://openalex.org/W6750407718","https://openalex.org/W6792558714","https://openalex.org/W6795711693","https://openalex.org/W6803526858"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W4239662759","https://openalex.org/W2471811227","https://openalex.org/W2364523259","https://openalex.org/W1975978427"],"abstract_inverted_index":{"Mobile":[0],"ad":[1],"hoc":[2],"networks":[3],"(MANET)":[4],"have":[5,24],"become":[6],"one":[7],"of":[8,28,50,61,70,90,92,155,215],"the":[9,46,59,67,147,195,207],"hottest":[10],"research":[11],"areas":[12],"in":[13,17,32,42,65,109,203,228],"computer":[14],"science,":[15],"including":[16],"military":[18],"and":[19,48,63,86,98,151,183],"civilian":[20],"applications.":[21],"Such":[22],"applications":[23],"formed":[25],"a":[26,77,104,123,210],"variety":[27],"security":[29,47,72,202,226],"threats,":[30],"particularly":[31],"unattended":[33],"environments.":[34],"An":[35],"Intrusion":[36],"detection":[37],"system":[38,131],"(IDS)":[39],"must":[40,55],"be":[41,56],"place":[43],"to":[44,84,112,117,135,149],"ensure":[45],"reliability":[49],"MANET":[51,81],"services.":[52],"These":[53],"IDS":[54],"compatible":[57],"with":[58,194,213],"characteristics":[60],"MANETs":[62],"competent":[64],"discovering":[66],"biggest":[68],"number":[69,214],"potential":[71],"threats.":[73],"In":[74],"this":[75],"work,":[76],"specialized":[78,124],"dataset":[79,125,137,148],"for":[80,121,221],"is":[82,133,144,219],"implemented":[83],"identify":[85],"classify":[87,152],"three":[88,153],"types":[89,154],"Denial":[91],"Service":[93],"(DoS)":[94],"attacks:":[95],"Blackhole,":[96],"Grayhole":[97],"Flooding":[99],"Attack.":[100],"This":[101,218],"work":[102],"utilized":[103],"cluster-based":[105],"routing":[106],"algorithm":[107],"(CBRA)":[108],"MANET.A":[110],"simulation":[111],"gather":[113],"data,":[114],"then":[115],"processed":[116],"create":[118,136],"eight":[119],"attributes":[120],"creating":[122],"using":[126],"Java.":[127],"Mamdani":[128],"fuzzy-based":[129],"inference":[130],"(MFIS)":[132],"used":[134],"labelling.":[138],"Furthermore,":[139],"an":[140,200],"ensemble":[141,159],"classification":[142,160,197],"technique":[143,198],"trained":[145],"on":[146,224],"discover":[150],"attacks.":[156],"The":[157,188],"proposed":[158],"has":[161],"six":[162],"base":[163],"classifiers,":[164],"namely,":[165],"C4.5,":[166],"Fuzzy":[167],"Unordered":[168],"Rule":[169],"Induction":[170],"Algorithm":[171],"(FURIA),":[172],"Multilayer":[173],"Perceptron":[174],"(MLP),":[175],"Multinomial":[176],"Logistic":[177],"Regression":[178],"(MLR),":[179],"Naive":[180],"Bayes":[181],"(NB)":[182],"Support":[184],"Vector":[185],"Machine":[186],"(SVM).":[187],"experimental":[189],"results":[190],"demonstrate":[191],"that":[192],"MFIS":[193],"Ensemble":[196],"enables":[199],"enhancing":[201],"MANET\u2019s":[204],"by":[205],"modeling":[206],"interactions":[208],"among":[209],"malicious":[211],"node":[212],"legitimate":[216],"nodes.":[217],"suitable":[220],"future":[222],"works":[223],"multilayer":[225],"problem":[227],"MANET.":[229]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
