Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3368756.3369021acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmartcityappConference Proceedingsconference-collections
research-article

A deep learning methods for intrusion detection systems based machine learning in MANET

Published: 02 October 2019 Publication History

Abstract

Deep learning is a subset of machine learning where algorithms are created and function similar to those in machine learning, but there are numerous layers of these algorithms each providing a different interpretation to the data it feeds on. Mobile Ad-Hoc Network (MANET) is picking up huge popularity due to their potential of providing low-cost solutions to real-world communication problems. MANETs are more susceptible to the security attacks because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying deep learning methods in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. IDS represent the second line of defense against malevolent behavior to MANETs since they monitor network activities in order to detect any malicious attempt performed by Intruders. Recently, more and more researchers applied deep neural networks (DNNs) to solve intrusion detection problems. Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), the two main types of DNN architectures, are widely explored to enhance the performance of intrusion detection system. In this paper, we present the most well-known deep learning models CNN, Inception-CNN, Bi-LSTM and GRU and we made a systematic comparison of CNN and RNN on the deep learning-based intrusion detection systems, aiming to give basic guidance for DNN selection in MANET

References

[1]
Ehsan Amiria, Hassan Keshavarz, Hossein Heidari, Esmaeil Mohamadi, Hossein Moradzadeh, "Intrusion Detection Systems in MANET: A Review," ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22 -- 23 September, 2013
[2]
Safaa Laqtib, Khalid El Yassini, Meriem Houmer, Moulay Driss El Ouadghiri, Moulay Lahcen Hasnaoui, "Impact of mobility models on Optimized Link State Routing Protocol in MANET," Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), 26--29 Oct. 2016.
[3]
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-demand Secure Routing Protocol Resilient to Byzantine Failures," Proceedings of the ACM Workshop on Wireless Security, pp. 21--30, 2002.
[4]
Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks," Department of Computer Science and Engineering Florida Atlantic University, WIRELESS/MOBILE NETWORK SECURITY.
[5]
Ismail Butun, Salvatore D. Morgera, Ravi Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, Volume: 16, Issue: 1, 17 May 2013
[6]
Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, On Cloud Security Attacks: "A Taxonomy and Intrusion Detection and Prevention as a Service," Journal of Network and Computer Applications Volume 74, October 2016, Pages 98--120
[7]
Raja Waseem Anwar, Majid Bakhtiari, AnazidaZainal, Abdul Hanan Abdullah and Kashif Naseer Qureshi, "Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks," International Conference on Smart Sensors and Application, IEEE.
[8]
Saurabh Ughade, R.K. Kapoor, Ankur Pandey, "An overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach," International Journal of Recent Development in Engineering and Technology, ISSN 2347 - 6435 (Online) Volume 2, Issue4.2014
[9]
VarshaGharu, Mahesh Pawar, Jitendra Agarwal, "A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network," Indian Journal of Computer Science and Engineering (IJCSE), 2017
[10]
Neellima Singla, Mr. Ramanjeet Singh, "Wormhole Attack Prevention and Detection in MANETs Using HRL Method", International Journal of Advance Research, Ideas and Innovations in Technology, 2017
[11]
Sushama Singh; Atish Mishra; Upendra Singh, "Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm," Symposium on Colossal Data Analysis and Networking (CDAN), 18--19 March 2016
[12]
Tauseef Jamal, Shariq Aziz Butt, "Malicious node analysis in MANETS", International Journal of Information Technology, 20 April 2018
[13]
Houda Moudni; Mohamed Er-rouidi; Hicham Mouncif; Benachir El Hadadi, "Performance analysis of AODV routing protocol in MANET under the influence of routing attacks, "International Conference on Electrical and Information Technologies (ICEIT), 4--7 May 2016
[14]
Desai, V., & Shekokar, .N, "Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In Wireless Computing and Networking (GCWCN)," IEEE Global Conference on (pp. 138--143). 2014.
[15]
Noureldien A. Noureldien, Saeed K. Saeed, M. Ahmed Salih and Alsawi M. Ahmed, "Survey of Mobile Ad hoc Networks Attacks and a New Classification Scheme," British Journal of Mathematics & Computer Science 8(1): 25--38, 2015.
[16]
Ruchita M, Seema L. Review paper on flooding attack in MANET, Int. Journal of Engineering Research and Applications. 2014;4(1).
[17]
Rishabh J, Charul D, Meenakshi, "A survey of protocols and attacks in MANET Routing," International Journal of Computer Science and Management Studies. 2012;12(3).
[18]
Manjeet Singh, Gaganpreet Kaur., "A survey of attacks in MANET," International Journal of Advanced Research in Computer Science and Software Engineering. 2013;3(6).
[19]
Alomari E, Manickam S, Gupta BB, Karuppayah S, Alfaris R, "Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art," International Journal of Computer Applications. 2012;49:24--32.
[20]
R. Bhuvaneswari, R. Ramachandran, "Denial of service attack mitigation addressing all the security attributes in OLSR MANET," International Journal of Wireless and Mobile Computing, 2018
[21]
Ruchi Makani, B.V.R. Reddy, "Taxonomy of Machine Leaning Based Anomaly Detection and its suitability", International Conference on Computational Intelligence and Data Science (ICCIDS 2018).
[22]
Robert Mitchell and Ing-Ray Chen., "A Survey of Intrusion Detection in Wireless Network Applications", Elsevier, vol. 42, 1--23. 2014
[23]
Ismail Butun, Salvatore D. Morgera, and Ravi Sankar. "A Survey of Intrusion Detection Systems in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials Volume: 16, Issue: 1, pp266 -- 282.2014
[24]
Sumit, S., D. Mitra, and D. Gupta, "Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining," 2014. IEEE.
[25]
Mohit Soni; Manish Ahirwa; Shikha Agrawal, "A Survey on Intrusion Detection Techniques in MANET," International Conference on Computational Intelligence and Communication Networks (CICN)12--14 Dec. 2015
[26]
Neethu B. "Classification of intrusion detection dataset using machine learning approaches," International Journal of Electronics and Computer Science Engineering; 2012.
[27]
Nutan Farah Haq, Musharrat Rafni, Abdur Rahman Onik, Faisal Muhammad Shah, Md. Avishek Khan Hridoy and Dewan Md. Farid, "Application Of Machine Learning Approaches in Intrusion Detection System: A Survey," (IJARAI) Inter- national Journal of Advanced Research in Arti_cial Intelligence, Vol. 4, No.3, pp. 9--18, 2015
[28]
Gauthama Raman M R, Nivethitha Somu, Kannan Kirthivasan, Shankar Sriram V S,"A Hypergraph and Arithmetic Residue-based Probabilistic Neural Network for Classi_cation in Intrusion Detection Systems," Neural Networks, Volume 92, August 2017, pp. 89--97, ELSEVIER.
[29]
Aastha Puri and Nidhi Sharma, "A Novel Technique for Intrusion Detection System for Network Security Using Hybrid SVM-CART," International Journal of Engineering Development and Research, Volume 5, Issue 2, ISSN: 2321-- 9939, pp. 155--161. 2017
[30]
Wenjuan Li, Weizhi Meng, Lam-For Kwok, and Horace H. S. IP, "Enhancing Collaborative Intrusion Detection Networks Against Insider Attacks Using Supervised Intrusion Sensitivity-Based Trust Management Model," Journal of Network and Computer Applications, Volume 77, 1 January 2017, pp. 135--145, ELSEVIER.
[31]
Ch. Nagamani and Suneetha Chittineni, "Network Intrusion Detection Mechanisms Using Outlier Detection," Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 1468--1473, 2018.
[32]
Eduardo Massato Kakihata, Helton Molina Sapia, Ronaldo Toshiaki Oiakawa, Danillo Roberto Pereira, Joao Paulo Papa, Victor Hugo Costa de Albuquerque and Francisco Assis da Silva, "Intrusion Detection System Based On Flows Using Machine Learning Algorithms," IEEE Latin America Transactions, Volume 15, Issue: 10, pp. 1988 -- 1993, Oct. 2017.

Cited By

View all
  • (2024)OPTIMIZED DEEP LEARNING FOR CYBER INTRUSION DETECTION AND SECURED COMMUNICATION IN MANETYanbu Journal of Engineering and Science10.53370/001c.123210Online publication date: 19-Sep-2024
  • (2024)Functional Near‐Infrared Spectroscopy‐Based Computer‐Aided Diagnosis of Major Depressive Disorder Using Convolutional Neural Network with a New Channel Embedding Layer Considering Inter‐Hemispheric Asymmetry in Prefrontal Hemodynamic ResponsesDepression and Anxiety10.1155/2024/44598672024:1Online publication date: 14-Jul-2024
  • (2024)A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive AnalysisJournal of Engineering10.1155/2024/39091732024(1-16)Online publication date: 15-Apr-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SCA '19: Proceedings of the 4th International Conference on Smart City Applications
October 2019
788 pages
ISBN:9781450362894
DOI:10.1145/3368756
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Bi-LSTM
  2. CNN
  3. GRU
  4. MANET
  5. attack
  6. deep learning
  7. inception CNN
  8. intrusion detection system IDS

Qualifiers

  • Research-article

Conference

SCA2019

Acceptance Rates

Overall Acceptance Rate 183 of 487 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)46
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)OPTIMIZED DEEP LEARNING FOR CYBER INTRUSION DETECTION AND SECURED COMMUNICATION IN MANETYanbu Journal of Engineering and Science10.53370/001c.123210Online publication date: 19-Sep-2024
  • (2024)Functional Near‐Infrared Spectroscopy‐Based Computer‐Aided Diagnosis of Major Depressive Disorder Using Convolutional Neural Network with a New Channel Embedding Layer Considering Inter‐Hemispheric Asymmetry in Prefrontal Hemodynamic ResponsesDepression and Anxiety10.1155/2024/44598672024:1Online publication date: 14-Jul-2024
  • (2024)A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive AnalysisJournal of Engineering10.1155/2024/39091732024(1-16)Online publication date: 15-Apr-2024
  • (2024)Two-Pronged Intrusion Detection System for MANET2024 International Conference on Emerging Technologies in Computer Science for Interdisciplinary Applications (ICETCS)10.1109/ICETCS61022.2024.10544044(1-6)Online publication date: 22-Apr-2024
  • (2024)Examining arterial pulsation to identify and risk-stratify heart failure subjects with deep neural networkPhysical and Engineering Sciences in Medicine10.1007/s13246-023-01378-647:2(477-489)Online publication date: 15-Feb-2024
  • (2023)An obstacle aware efficient MANET routing with optimized Bi-LSTM and multi-objective constraints on improved heuristic algorithmJournal of Ambient Intelligence and Smart Environments10.3233/AIS-220369(1-24)Online publication date: 24-Feb-2023
  • (2023)Intrusion Detection System (IDS) of Multiclassification IoT by using Pipelining and an Efficient Machine Learning2023 International Conference on Engineering and Emerging Technologies (ICEET)10.1109/ICEET60227.2023.10525915(1-6)Online publication date: 27-Oct-2023
  • (2023)An intrusion detection system using Exponential Henry Gas Solubility Optimization based Deep Neuro Fuzzy Network in MANETEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.105969123:PAOnline publication date: 1-Aug-2023
  • (2023)Bio-inspired deep residual neural network learning model for QoS routing enhancement in mobile ad-hoc networksWireless Networks10.1007/s11276-023-03424-329:8(3541-3565)Online publication date: 22-Jun-2023
  • (2023)Mitigating DoS Attack in MANETs Considering Node Reputation with AIJournal of Network and Systems Management10.1007/s10922-023-09742-331:3Online publication date: 7-Jun-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media