Skip to main content
Top

2020 | OriginalPaper | Chapter

Evaluation of Deep Learning Approaches for Intrusion Detection System in MANET

Authors : Safaa Laqtib, Khalid El Yassini, Moulay Lahcen Hasnaoui

Published in: Innovations in Smart Cities Applications Edition 3

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile Ad hoc Network (MANET) consists of a set of nodes which stand randomly in the operating environment. Since nodes are then vulnerable to intrusion and attack without any pre-defined infrastructure and flexibility. Securing in this type of network is an important area. To tackle these security problems, current cryptography schemes cannot completely safeguard MANET in terms of new threats and vulnerabilities. By implementing Deep learning techniques in IDS, MANET will be able to adapt complex environments and allow the system to make decisions on intrusion while continuing to learn about their mobile environment. IDS represent the second line of defense against malevolent behavior to MANET since they monitor network activities in order to detect any malicious attempt performed by Intruders. Recently, more and more researchers applied deep neural networks (DNNs) to solve intrusion detection problems. The two major forms of DNN architectures, Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), are commonly explored to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of CNN and RNN on the deep learning-based intrusion detection systems, aiming to give basic guidance for DNN selection in MANET.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Amiria, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 September 2013 (2013) Amiria, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 September 2013 (2013)
2.
go back to reference Laqtib, S., El Yassini, K., Houmer, M., El Ouadghiri, M.D., Hasnaoui, M.L.: Impact of mobility models on optimized link state routing protocol in MANET. In: Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), 26–29 October 2016 (2016) Laqtib, S., El Yassini, K., Houmer, M., El Ouadghiri, M.D., Hasnaoui, M.L.: Impact of mobility models on optimized link state routing protocol in MANET. In: Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), 26–29 October 2016 (2016)
3.
go back to reference Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002) Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)
4.
go back to reference Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. Department of Computer Science and Engineering Florida Atlantic University, Wireless/Mobile Network Security (2007) Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. Department of Computer Science and Engineering Florida Atlantic University, Wireless/Mobile Network Security (2007)
5.
go back to reference Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)CrossRef Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)CrossRef
6.
go back to reference Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R.: On cloud security attacks: “a taxonomy and intrusion detection and prevention as a service”. J. Netw. Comput. Appl. 74, 98–120 (2016)CrossRef Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R.: On cloud security attacks: “a taxonomy and intrusion detection and prevention as a service”. J. Netw. Comput. Appl. 74, 98–120 (2016)CrossRef
7.
go back to reference Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In: International Conference on Smart Sensors and Application, pp. 26–28. IEEE, May 2015 Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In: International Conference on Smart Sensors and Application, pp. 26–28. IEEE, May 2015
8.
go back to reference Ughade, S., Kapoor, R.K., Pandey, A.: An overview on wormhole attack in wireless sensor network: challenges, impacts, and detection approach. Int. J. Recent Dev. Eng. Technol. 2(4), 102–109 (2014). ISSN 2347 – 6435 Ughade, S., Kapoor, R.K., Pandey, A.: An overview on wormhole attack in wireless sensor network: challenges, impacts, and detection approach. Int. J. Recent Dev. Eng. Technol. 2(4), 102–109 (2014). ISSN 2347 – 6435
9.
go back to reference Gharu, V., Pawar, M., Agarwal, J.: A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng. (IJCSE) 8, 80–83 (2017) Gharu, V., Pawar, M., Agarwal, J.: A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng. (IJCSE) 8, 80–83 (2017)
10.
go back to reference Singla, N., Singh, R.: Wormhole attack prevention and detection in MANETs using HRL Method. Int. J. Adv. Res. Ideas Innov. Technol. 3(2) (2017) Singla, N., Singh, R.: Wormhole attack prevention and detection in MANETs using HRL Method. Int. J. Adv. Res. Ideas Innov. Technol. 3(2) (2017)
11.
go back to reference Singh, S., Mishra, A., Singh, U.: Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm. In: Symposium on Colossal Data Analysis and Networking (CDAN), 18–19 March 2016 (2016) Singh, S., Mishra, A., Singh, U.: Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm. In: Symposium on Colossal Data Analysis and Networking (CDAN), 18–19 March 2016 (2016)
12.
go back to reference Jamal, T., Butt, S.A.: Malicious node analysis in MANETS. Int. J. Inform. Technol. 11, 859–867 (2018)CrossRef Jamal, T., Butt, S.A.: Malicious node analysis in MANETS. Int. J. Inform. Technol. 11, 859–867 (2018)CrossRef
13.
go back to reference Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International Conference on Electrical and Information Technologies (ICEIT), 4–7 May 2016 (2016) Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International Conference on Electrical and Information Technologies (ICEIT), 4–7 May 2016 (2016)
14.
go back to reference Desai, V., Shekokar, N.: Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In: IEEE Global Conference on Wireless Computing and Networking (GCWCN), pp. 138–143 (2014) Desai, V., Shekokar, N.: Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In: IEEE Global Conference on Wireless Computing and Networking (GCWCN), pp. 138–143 (2014)
15.
go back to reference Noureldien, N.A., Saeed, S.K., Salih, M.A., Ahmed, A.M.: Survey of mobile ad hoc networks attacks and a new classification scheme. Br. J. Math. Comput. Sci. 8(1), 25–38 (2015)CrossRef Noureldien, N.A., Saeed, S.K., Salih, M.A., Ahmed, A.M.: Survey of mobile ad hoc networks attacks and a new classification scheme. Br. J. Math. Comput. Sci. 8(1), 25–38 (2015)CrossRef
16.
go back to reference Meher, R., Ladhe, S.: Review paper on flooding attack in MANET. Int. J. Eng. Res. Appl. 4(1, Version 2), 39–46 (2014) Meher, R., Ladhe, S.: Review paper on flooding attack in MANET. Int. J. Eng. Res. Appl. 4(1, Version 2), 39–46 (2014)
17.
go back to reference Rishabh, J., Charul, D., Meenakshi: A survey of protocols and attacks in MANET Routing. Int. J. Comput. Sci. Manag. Stud. 12(3) (2012) Rishabh, J., Charul, D., Meenakshi: A survey of protocols and attacks in MANET Routing. Int. J. Comput. Sci. Manag. Stud. 12(3) (2012)
18.
go back to reference Panda, P., Gadnayak, K.K., Panda, N.: MANET attacks and their countermeasures: a survey. Int. J. Comput. Sci. Mob. Comput. 2(11), 319–330 (2013) Panda, P., Gadnayak, K.K., Panda, N.: MANET attacks and their countermeasures: a survey. Int. J. Comput. Sci. Mob. Comput. 2(11), 319–330 (2013)
19.
go back to reference Alomari, E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49, 24–32 (2012) Alomari, E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49, 24–32 (2012)
20.
go back to reference Bhuvaneswari, R., Ramachandran, R.: Denial of service attack mitigation addressing all the security attributes in OLSR MANET. Int. J. Wirel. Mob. Comput. 15, 88–95 (2018)CrossRef Bhuvaneswari, R., Ramachandran, R.: Denial of service attack mitigation addressing all the security attributes in OLSR MANET. Int. J. Wirel. Mob. Comput. 15, 88–95 (2018)CrossRef
21.
go back to reference Makani, R., Reddy, B.V.R.: Taxonomy of machine leaning based anomaly detection and its suitability. In: International Conference on Computational Intelligence and Data Science (ICCIDS) (2018) Makani, R., Reddy, B.V.R.: Taxonomy of machine leaning based anomaly detection and its suitability. In: International Conference on Computational Intelligence and Data Science (ICCIDS) (2018)
22.
go back to reference Mitchell, R., Chen, I.-R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)CrossRef Mitchell, R., Chen, I.-R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)CrossRef
23.
go back to reference Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2014)CrossRef Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2014)CrossRef
24.
go back to reference Sumit, S., Mitra, D., Gupta, D.: Proposed intrusion detection on ZRP based MANET by effective k-means clustering method of data mining. IEEE (2014) Sumit, S., Mitra, D., Gupta, D.: Proposed intrusion detection on ZRP based MANET by effective k-means clustering method of data mining. IEEE (2014)
25.
go back to reference Soni, M., Ahirwa, M., Agrawal, S.: A survey on intrusion detection techniques in MANET. In: International Conference on Computational Intelligence and Communication Networks (CICN), 12–14 December 2015 (2015) Soni, M., Ahirwa, M., Agrawal, S.: A survey on intrusion detection techniques in MANET. In: International Conference on Computational Intelligence and Communication Networks (CICN), 12–14 December 2015 (2015)
26.
go back to reference Neethu, B.: Classification of intrusion detection dataset using machine learning approaches. Int. J. Electron. Comput. Sci. Eng. 1(3), 1044–1051 (2012) Neethu, B.: Classification of intrusion detection dataset using machine learning approaches. Int. J. Electron. Comput. Sci. Eng. 1(3), 1044–1051 (2012)
27.
go back to reference Haq, N.F., Rafni, M., Onik, A.R., Shah, F.M., Hridoy, M.A.K., Farid, D.M.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Intell. (IJARAI) 4(3), 9–18 (2015) Haq, N.F., Rafni, M., Onik, A.R., Shah, F.M., Hridoy, M.A.K., Farid, D.M.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Intell. (IJARAI) 4(3), 9–18 (2015)
Metadata
Title
Evaluation of Deep Learning Approaches for Intrusion Detection System in MANET
Authors
Safaa Laqtib
Khalid El Yassini
Moulay Lahcen Hasnaoui
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-37629-1_71

Premium Partner