Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A robust intrusion detection system using machine learning techniques for MANET

Published: 01 January 2020 Publication History

Abstract

Recent advancement in technologies such as Cloud, Internet of Things etc., leads to the increase usage of mobile computing. Present day mobile computing are too sophisticated and advancement are reaching great heights. Moreover, the present day mobile network suffers due to external and internal intrusions within and outside networks. The existing security systems to protect the mobile networks are incapable to detect the recent attacks. Further, the existing security system completely depends on the traditional signature and rule based approaches. Recent attacks have the property of not fluctuating its behaviour during attack. Hence, a robust Intrusion Detection System (IDS) is desirable. In order to address the above mentioned issue, this paper proposed a robust IDS using Machine Learning Techniques (MLT). The key of using MLT is to utilize the power of ensembles. The ensembles of classifier used in this paper are Random Forest (RF), KNN, Naïve Bayes (NB), etc. The proposed IDS is experimentally tested and validated using a secure test bed. The experimental results also confirms that the proposed IDS is robust enough to withstand and detect any form of intrusions and it is also noted that the proposed IDS outperforms the state of the art IDS with more than 95% accuracy.

References

[1]
Z.K. Baker and V.K. Prasanna, Automatic synthesis of efficient intrusion detection systems on FPGAs, IEEE Transactions on Dependable and Secure Computing 3(4) (2006), 289–300.
[2]
S.M. Banik and L. Pena, Deploying agents in the network to detect intrusions, IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS), Las Vegas, NV, 2015, pp. 83–87.
[3]
N. Agarwal and S.Z. Hussain, A Closer Look at Intrusion Detection System for Web Applications, Security and Communication Networks, 2018.
[4]
P.A.A. Resende and A.C. Drummond, Adaptive anomaly based intrusion detection system using genetic algorithm and profiling, Security and Privacy, (2018).
[5]
S. Jin, Y. Jiang and J. Peng, Intrusion Detection System Enhanced by Hierarchical Bidirectional Fuzzy Rule Interpolation, IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, 2018, pp. 6–10.
[6]
F. Macia Perez, F.J. Mora-Gimeno, D. Marcos-Jorquera, J.A. Gil-Martínez-Abarca, H. Ramos-Morillo and I. Lorenzo-Fonseca, Network intrusion detection system embedded on a smart sensor, IEEE Transactions on. Industrial Electronics 58 (2010), 722–732.
[7]
Z. Gou, M.A.B. Zhaolong, S. Yamaguchi and B.B. Gupta, A Petri Net-based Framework of Intrusion Detection Systems, 2015.
[8]
R. Mitchell and R. Chen, Behavior-rule based intrusion detection systems for safety critical smart grid applications, IEEE Transactions on Smart Grid (4) (2013), 1254–1263.
[9]
R.A. Raza, X.Z. Wang, J.Z. Huang, H. Abbas and Y.L. He, Fuzziness based semi-supervised learning approach for Intrusion Detection System, Information Sciences, 2016.
[10]
M. Agarwal, S. Purwar, S. Biswas and S. Nandi, Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system, IEEE/CAA Journal of AutomaticaSinica 4(4) (2017), 792–808.
[11]
N. Naik, R. Diao and Q. Shen, Dynamic fuzzy rule interpolation and its application to intrusion detection, IEEE Transactions on Fuzzy Systems 4(26) (2017), 1878–1892.
[12]
M.H. Ali, B.A.D. Al Mohammed, A. Ismail and M.F. Zolkipli, A new intrusion detection system based on fast learning network and particle swarm optimization, IEEE Access (6) (2018), 20255–20261.
[13]
A. Kalick, Data mining approach to web application intrusions detection, 2011.
[14]
P.F. Wu and H.J. Shen, The research and amelioration of pattern-matching algorithm in intrusion detection system, IEEE 14th International Conference on High Performance Computing and Communication &IEEE 9th International Conference on Embedded Software and Systems, Liverpool, 2012, pp. 1712–1715.
[15]
S.C. Sethuraman, S. Dhamodaran and V. Vijayakumar, Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks, IET Networks 4(8) (2018), 219–232.
[16]
K. Ethala, R. Sheshadri and S.S. Chakkaravarthy, WIDS real-time intrusion detection system using entrophical approach, Advances in Intelligent Systems and Computing Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, 2014, pp. 73–79.
[17]
R. Mohan, V. Vaidehi, M. Mahalakshmi and S.S. Chakkaravarthy, Complex Event Processing based Hybrid Intrusion Detection System, 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), Chennai, 2015, 1–6.
[18]
S.S. Chakkaravarthy, V. Vaidehi and P. Rajesh, Hybrid analysis technique to detect advanced persistent threats, International Journal of Intelligent Information Technologies (IJIIT) 14(2) (2018), 59–76.

Cited By

View all
  • (2022)A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 DatasetRisks and Security of Internet and Systems10.1007/978-3-031-31108-6_3(34-46)Online publication date: 7-Dec-2022

Index Terms

  1. A robust intrusion detection system using machine learning techniques for MANET
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image International Journal of Knowledge-based and Intelligent Engineering Systems
    International Journal of Knowledge-based and Intelligent Engineering Systems  Volume 24, Issue 3
    2020
    92 pages

    Publisher

    IOS Press

    Netherlands

    Publication History

    Published: 01 January 2020

    Author Tags

    1. Ensemble
    2. classifiers
    3. intrusion detection system
    4. MANET

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 19 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 DatasetRisks and Security of Internet and Systems10.1007/978-3-031-31108-6_3(34-46)Online publication date: 7-Dec-2022

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media