An Efficient Neuro Deep Learning Intrusion Detection System for Mobile Adhoc Networks

Authors

  • N. Venkateswaran Jyothishmathi Institute of Technology and Science
  • S. Prabaharan Prabaharan Mallareddy Institute of Engineering and Technology

DOI:

https://doi.org/10.4108/eai.4-4-2022.173781

Keywords:

Deep Learning, Intrusion Detection, Mobile Adhoc Networks, MANET, Deep Neural Network, recurrent neural networks, intrusion detection systems, IDS

Abstract

As of late mobile ad hoc networks (MANETs) have turned into a very popular explore the theme. By giving interchanges without a fixed infrastructure MANETs are an appealing innovation for some applications, for ex, reassigning tasks, strategic activities, nature observing, meetings, & so forth. This paper proposes the use of a neuro Deep learning wireless intrusion detection system that distinguishes the attacks in MANETs. Executing security is a hard task in MANET due to its immutable vulnerabilities. Deep learning gives extra security to such systems and the proposed framework comprises a hybrid conspiracy that joins the determination and abnormality-based methodologies. Executing the partial IDS utilizing neuro Deep learning improves the identification rate in MANETs. The proposed plan utilizes deep neural networks and a cross breed neural system. It demonstrates that Recurrent neural networks can successfully improve the identification and diminish the rate of false caution and failure.

References

M. Kemiche and R. Beghdad, Intelligent Systems in Science and Information 2014: Extended and Selected Results from the Science and Information Conference 2014, Cham: Springer International Publishing, ch. Towards Using Games Theory to Detect New U2R Attacks,pp. 351–367, (2015). [Online]. Available: http://dx.doi.org/10.1007/978-3-319-14654-6-22

H. Altwaijry and S. Algarny, Bayesian Based Intrusion Detection System, Journal of King Saud University –Computer and Information Sciences, vol. 24, no. 1, pp. 1–6, (2012). [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1319157 811000292

P. Sangkatsanee, N.Wattanapongsakorn and C. Charnsripinyo, Practical Real-Time Intrusion Detection Using Machine Learning Approaches Computer Communications, vol. 34, no. 18, pp. 2227–2235, (2011). [Online]. Available: http://www.sciencedirect.com/ science/article/ pii/S01403664110020X

Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai and K. Dai, An Efficient Intrusion Detection System Based on Support Vector Machines and Gradually Feature Removal Method, Expert Systems with Applications, vol. 39, no. 1, pp. 424–430, (2012). [Online]. Available: http://www.sciencedirect.com/

science/article/pii/S0957417411009948

[5] S.-S. Wang, K.-Q. Yan, S.-C. Wang and C.-W. Liu, An Integrated Intrusion Detection System for Cluster-Based Wireless Sensor Networks, Expert Syst. Appl., vol. 38, no. 12, pp. 15 234–15 243, (2011).

Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K., 2011. Statistical analysis of honeypot data and building of kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering experience Returns for Security. ACM, pp. 5-24.

Rasool, Raihan & Ahmed, Khandakar & Anwar, Zahid & Wang, Hua & Ashraf, Usman & Rafiq, Wajid. (2021). CyberPulse++: A Machine Learning Based Security Framework for Detecting Link Flooding Attacks in Software Defined Networks. International Journal of Intelligent Systems. 2021. 1-28. 10.1002/int.22442.

Rasool, Raihan & Wang, Hua & Ashraf, Usman & Ahmed, Khandakar & Anwar, Zahid & Rafiq, Wajid. (2020). A Survey of Link Flooding Attacks in Software Defined Network Ecosystems. Journal of Network and Computer Applications. 10.1016/j.jnca.2020.102803.

Fuyong Zhang, Yi Wang, Shigang Liu, and Hua Wang. 2020. Decision-based evasion attacks on tree ensemble classifiers. World Wide Web 23, 5 (Sep 2020), 2957–2977. DOI:https://doi.org/10.1007/s11280-020-00813-y

Yin, Jiao, Mingjian Tang, Jinli Cao and Hua Wang. “Apply transfer learning to cyber security: Predicting exploitability of vulnerabilities by description.” Knowl. Based Syst. 210 (2020): 106529.

Xie, Y., Hu, J., Tang, S., Huang, X., 2012. A structural approach for modelling the hierarchical dynamic process of web workload in a large-scale campus network. J. Netw. Comput. Appl. 35 (6), 2081–2091.

Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A., 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31 (3), 357–374.

Matthew Vincent Mahoney. A machine learning approach to detecting attacks by identifying anomalies in network traffic. TRCS-2003-13, Melbourne, Florida; 2003.

Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang. Semisuper- vised learning for false alarm reduction. In: Industrial conference on data mining, no. 10; 2010. p. 595–605.

Vincenzo Gulisano, Zhang Fu, Mar Callau-Zori, Ricardo Jim Enez-Peris, Marina Papatriantafilou, Marta Patino-Martınez. STONE: a stream-based DDoS defence framework. In: Technical report no. 2012-07, ISSN 1652-926X, Chalmers University of Technology; 2012.

Chatterjee, Baisakhi & Saha, Himadri. (2019). Parameter Training in MANET using Artificial Neural Network. International Journal of Computer Network and Information Security. 11. 1-8. 10.5815/ijcnis.2019.09.01.

Duan, Z., Chen, P., Sanchez, F., Dong, Y., Stephenson, M. and J. M. Barker, M. (2012). Detecting spam zombies by monitoring outgoing messages, IEEE Trans. Dependable and Secure Computing, Apr 2012; 9(2):198–210

Goyal, A. and Kumar, C. .GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System, Electrical Engineering and Computer Science, North West University, Technical Report;2008.

Jaiganesh, V., Sumathi, P. and Mangayarkarasi, S. ,An Analysis of Intrusion Detection System using back propagation neural network, IEEE Computer Society Publication;2013.

Lin Gu, Deze Zeng, Peng Li, and Song Guo. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers, IEEE Transactions on Emerging Topics in Computing;2014.

Silva, L. D. S., Santos, A. C., Mancilha, T. D., Silva, J. D. and Montes, A. Detecting attack signatures in the real network traffic with ANNIDA. Expert Systems with Applications, 34(4);2008; 2326–2333.

Ojugo, A. A., Eboka, A. O., Okanta, O. E., Yora, R. E. and Aghware, F. O.Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS), Journal of Emerging Trends in Computing and Information Sciences, 3(8);2012; 1182 –1194.

Agarwal B., Mittal N., Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques, Procedia Technology; 6; 2012; p. 996-1003.

Syarif I., Prugel-Bennett A., Wills G., Data mining approaches for network intrusion detection from dimensionality reduction to misuse and anomaly detection; Journal of Information Technology Review ; 3(2); 2012; p. 70-83.

Fu S., Liu J., Pannu H., A Hybrid Anomaly Detection Framework in Cloud Computing Using One-Class and Two-Class Support Vector Machines; In Advanced Data Mining and Applications; Springer Berlin Heidelberg; 2012; p. 726-738.

Venkateswaran, N., Umadevi, K. (2022). Hybridized Wrapper Filter Using Deep Neural Network for Intrusion Detection. Computer Systems Science and Engineering, 42(1), 1–14.

Ch. Aishwarya et al. (2020). Intrusion Detection System using KDD Cup 99 Dataset, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-4, February 2020, DOI: 10.35940/ijitee.D2017.029420

Downloads

Published

04-04-2022

How to Cite

1.
Venkateswaran N, Prabaharan SP. An Efficient Neuro Deep Learning Intrusion Detection System for Mobile Adhoc Networks. EAI Endorsed Scal Inf Syst [Internet]. 2022 Apr. 4 [cited 2024 Nov. 14];9(6):e7. Available from: https://publications.eai.eu/index.php/sis/article/view/351