613 research outputs found

    Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

    Full text link
    In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian Mixture Model (GMM), the Naive Bayes classifier and the Support Vector Machine (SVM). The performance of the classification algorithms is evaluated under different traffic conditions and mobility patterns for the Black Hole, Forging, Packet Dropping, and Flooding attacks. The results indicate that Support Vector Machines exhibit high accuracy for almost all simulated attacks and that Packet Dropping is the hardest attack to detect.Comment: 12 pages, 7 figures, presented at MedHocNet 200

    Role of Deep Learning in Mobile Ad-hoc Networks

    Get PDF
    The portable capability of MANETs has specially delighted in an unexpected expansion. A massive need for dynamic ad-hoc basis networking continues to be created by advancements in hardware design, high-speed growth in the wireless network communications infrastructure, and increased user requirements for node mobility and regional delivery processes. There are several challenging issues in mobile ad-hoc networks, such as machine learning method cannot analyze features like node mobility, channel variation, channel interference because of the absence of deep neural layers. Due to decentralized nature of mobile ad hoc networks, its necessitate to concentrate over some extremely serious issues like stability, scalability, routing based problems such as network congestion, optimal path selection, etc. and security

    Analysis of Behavioral Characteristics of Multiple Blackhole Attacks with TCP and UDP Connections in Mobile ADHOC Networks based on Machine Learning Algorithms

    Get PDF
    In Mobile Adhoc Networks (MANETā€™s), a suit of nodes which are under mobility work together to transmit data packets in a multiple-hop manner without relying on any fixed or centralized infrastructure. A significant obstacle in managing these networks is identifying malicious nodes, or "black holes". To detect black holes, we proposed a method involves broadcasting a Cseq to the neighboring nodes and awaiting the node's response is utilized. This Network is simulated with 25 number of nodes connected with TCP connection and observed the different behavioural characteristics of nodes. Then the connections are changed to UDP and observed the characteristics. Then characteristics are analyzed with different machine learning algorithms. The network is simulated in NS2 environment

    A Prey-Predator Defence Mechanism For Ad Hoc On-Demand Distance Vector Routing Protocol

    Get PDF
    This study proposes a nature-based system survivability model. The model was simulated, and its performance was evaluated for the mobile ad hoc wireless networks. The survivability model was used to enable mobile wireless distributed systems to keep on delivering packets during their stated missions in a timely manner in the presence of attacks. A prey-predator communal defence algorithm was developed and fused with the Ad hoc On-demand Distance Vector (AODV) protocol. The mathematical equations for the proposed model were formulated using the Lotka-Volterra theory of ecology. The model deployed a security mechanism for intrusion detection in three vulnerable sections of the AODV protocol. The model simulation was performed using MATLAB for the mathematical model evaluation and using OMNET++ for protocol performance testing. The MATLAB simulation results, which used empirical and field data, have established that the adapted Lotka-Volterra-based equations adequately represent network defense using the communal algorithm. Using the number of active nodes as a measure of throughput after attack (with a maximum throughput of 250 units), the proposed model had a throughput of 230 units while under attack and the intrusion was nullified within 2 seconds. The OMNET++ results for protocol simulation that use throughput, delivery ratio, network delay, and load as performance metrics with the OMNET++ embedded datasets showed good performance of the model, which was better than the existing conventional survivability systems. The comparison of the proposed model with the existing model is also presented. The study concludes that the proposed communal defence model was effective in protecting the entire routing layer (layer 2) of the AODV protocol when exposed to diverse forms of intrusion attacks

    Efficiency and Accuracy Enhancement of Intrusion Detection System Using Feature Selection and Cross-layer Mechanism

    Get PDF
    The dramatic increase in the number of connected devices and the significant growth of the network traffic data have led to many security vulnerabilities and cyber-attacks. Hence, developing new methods to secure the network infrastructure and protect data from malicious and unauthorized access becomes a vital aspect of communication network design. Intrusion Detection Systems (IDSs), as common widely used security techniques, are critical to detect network attacks and unauthorized network access and thus minimize further cyber-attack damages. However, there are a number of weaknesses that need to be addressed to make reliable IDS for real-world applications. One of the fundamental challenges is the large number of redundant and non-relevant data. Feature selection emerges as a necessary step in efficient IDS design to overcome high dimensionality problem and enhance the performance of IDS through the reduction of its complexity and the acceleration of the detection process. Moreover, detection algorithm has significant impact on the performance of IDS. Machine learning techniques are widely used in such systems which is studied in details in this dissertation. One of the most destructive activities in wireless networks such as MANET is packet dropping. The existence of the intrusive attackers in the network is not the only cause of packet loss. In fact, packet drop can occur because of faulty network. Hence, in order detect the packet dropping caused by a malicious activity of an attacker, information from various layers of the protocol is needed to detect malicious packet loss effectively. To this end, a novel cross-layer design for malicious packet loss detection in MANET is proposed using features from physical layer, network layer and MAC layer to make a better detection decision. Trust-based mechanism is adopted in this design and a packet loss free routing algorithm is presented accordingly

    Salient Features Selection Techniques for Instruction Detection in Mobile Ad Hoc Networks

    Get PDF
    The development of wireless mobile ad hoc networks offers the promise of flexibility, low cost solution for the area where there is difficulties for infrastructure network. A key attraction of this mode of communication is their ease of deployment and operation. However, having a good and robust mobile ad hoc networking will depend entirely on security mechanism system in place. Traditional security mechanisms know as firewalls were used for defensive approach to oppose security obstacle. However, firewalls do not fully or completely defeat intrusions. To cope with this limitation, various intrusions detection systems (IDSs) have been proposed to detect such network intrusion activities. The problem encounter for this particular technique of instruction detections technique is that during network monitoring for data collection for anomaly detection, data that does not contribute to detection must be deleted before detection can be processed or application of learning algorithm for detection of abnormal attacks. In this paper we present a novel feature technique for feature selection before learning technique should be applied. The method has been applied into our own data set, and for the detection purpose we have used most of the well reputed three Machine Learning classifiers with the new selected features for performance evaluation and the experiment shows that higher accuracy results could be achieved with only all the 9 features extracted with our own algorithm with the data set created by using RandomForest classifier
    • ā€¦
    corecore