Skip to main content

2020 | OriginalPaper | Buchkapitel

Evaluation of Deep Learning Approaches for Intrusion Detection System in MANET

verfasst von : Safaa Laqtib, Khalid El Yassini, Moulay Lahcen Hasnaoui

Erschienen in: Innovations in Smart Cities Applications Edition 3

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Ad hoc Network (MANET) consists of a set of nodes which stand randomly in the operating environment. Since nodes are then vulnerable to intrusion and attack without any pre-defined infrastructure and flexibility. Securing in this type of network is an important area. To tackle these security problems, current cryptography schemes cannot completely safeguard MANET in terms of new threats and vulnerabilities. By implementing Deep learning techniques in IDS, MANET will be able to adapt complex environments and allow the system to make decisions on intrusion while continuing to learn about their mobile environment. IDS represent the second line of defense against malevolent behavior to MANET since they monitor network activities in order to detect any malicious attempt performed by Intruders. Recently, more and more researchers applied deep neural networks (DNNs) to solve intrusion detection problems. The two major forms of DNN architectures, Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), are commonly explored to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of CNN and RNN on the deep learning-based intrusion detection systems, aiming to give basic guidance for DNN selection in MANET.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amiria, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 September 2013 (2013) Amiria, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 September 2013 (2013)
2.
Zurück zum Zitat Laqtib, S., El Yassini, K., Houmer, M., El Ouadghiri, M.D., Hasnaoui, M.L.: Impact of mobility models on optimized link state routing protocol in MANET. In: Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), 26–29 October 2016 (2016) Laqtib, S., El Yassini, K., Houmer, M., El Ouadghiri, M.D., Hasnaoui, M.L.: Impact of mobility models on optimized link state routing protocol in MANET. In: Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), 26–29 October 2016 (2016)
3.
Zurück zum Zitat Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002) Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)
4.
Zurück zum Zitat Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. Department of Computer Science and Engineering Florida Atlantic University, Wireless/Mobile Network Security (2007) Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. Department of Computer Science and Engineering Florida Atlantic University, Wireless/Mobile Network Security (2007)
5.
Zurück zum Zitat Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)CrossRef Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)CrossRef
6.
Zurück zum Zitat Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R.: On cloud security attacks: “a taxonomy and intrusion detection and prevention as a service”. J. Netw. Comput. Appl. 74, 98–120 (2016)CrossRef Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R.: On cloud security attacks: “a taxonomy and intrusion detection and prevention as a service”. J. Netw. Comput. Appl. 74, 98–120 (2016)CrossRef
7.
Zurück zum Zitat Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In: International Conference on Smart Sensors and Application, pp. 26–28. IEEE, May 2015 Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In: International Conference on Smart Sensors and Application, pp. 26–28. IEEE, May 2015
8.
Zurück zum Zitat Ughade, S., Kapoor, R.K., Pandey, A.: An overview on wormhole attack in wireless sensor network: challenges, impacts, and detection approach. Int. J. Recent Dev. Eng. Technol. 2(4), 102–109 (2014). ISSN 2347 – 6435 Ughade, S., Kapoor, R.K., Pandey, A.: An overview on wormhole attack in wireless sensor network: challenges, impacts, and detection approach. Int. J. Recent Dev. Eng. Technol. 2(4), 102–109 (2014). ISSN 2347 – 6435
9.
Zurück zum Zitat Gharu, V., Pawar, M., Agarwal, J.: A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng. (IJCSE) 8, 80–83 (2017) Gharu, V., Pawar, M., Agarwal, J.: A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng. (IJCSE) 8, 80–83 (2017)
10.
Zurück zum Zitat Singla, N., Singh, R.: Wormhole attack prevention and detection in MANETs using HRL Method. Int. J. Adv. Res. Ideas Innov. Technol. 3(2) (2017) Singla, N., Singh, R.: Wormhole attack prevention and detection in MANETs using HRL Method. Int. J. Adv. Res. Ideas Innov. Technol. 3(2) (2017)
11.
Zurück zum Zitat Singh, S., Mishra, A., Singh, U.: Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm. In: Symposium on Colossal Data Analysis and Networking (CDAN), 18–19 March 2016 (2016) Singh, S., Mishra, A., Singh, U.: Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm. In: Symposium on Colossal Data Analysis and Networking (CDAN), 18–19 March 2016 (2016)
12.
Zurück zum Zitat Jamal, T., Butt, S.A.: Malicious node analysis in MANETS. Int. J. Inform. Technol. 11, 859–867 (2018)CrossRef Jamal, T., Butt, S.A.: Malicious node analysis in MANETS. Int. J. Inform. Technol. 11, 859–867 (2018)CrossRef
13.
Zurück zum Zitat Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International Conference on Electrical and Information Technologies (ICEIT), 4–7 May 2016 (2016) Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International Conference on Electrical and Information Technologies (ICEIT), 4–7 May 2016 (2016)
14.
Zurück zum Zitat Desai, V., Shekokar, N.: Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In: IEEE Global Conference on Wireless Computing and Networking (GCWCN), pp. 138–143 (2014) Desai, V., Shekokar, N.: Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In: IEEE Global Conference on Wireless Computing and Networking (GCWCN), pp. 138–143 (2014)
15.
Zurück zum Zitat Noureldien, N.A., Saeed, S.K., Salih, M.A., Ahmed, A.M.: Survey of mobile ad hoc networks attacks and a new classification scheme. Br. J. Math. Comput. Sci. 8(1), 25–38 (2015)CrossRef Noureldien, N.A., Saeed, S.K., Salih, M.A., Ahmed, A.M.: Survey of mobile ad hoc networks attacks and a new classification scheme. Br. J. Math. Comput. Sci. 8(1), 25–38 (2015)CrossRef
16.
Zurück zum Zitat Meher, R., Ladhe, S.: Review paper on flooding attack in MANET. Int. J. Eng. Res. Appl. 4(1, Version 2), 39–46 (2014) Meher, R., Ladhe, S.: Review paper on flooding attack in MANET. Int. J. Eng. Res. Appl. 4(1, Version 2), 39–46 (2014)
17.
Zurück zum Zitat Rishabh, J., Charul, D., Meenakshi: A survey of protocols and attacks in MANET Routing. Int. J. Comput. Sci. Manag. Stud. 12(3) (2012) Rishabh, J., Charul, D., Meenakshi: A survey of protocols and attacks in MANET Routing. Int. J. Comput. Sci. Manag. Stud. 12(3) (2012)
18.
Zurück zum Zitat Panda, P., Gadnayak, K.K., Panda, N.: MANET attacks and their countermeasures: a survey. Int. J. Comput. Sci. Mob. Comput. 2(11), 319–330 (2013) Panda, P., Gadnayak, K.K., Panda, N.: MANET attacks and their countermeasures: a survey. Int. J. Comput. Sci. Mob. Comput. 2(11), 319–330 (2013)
19.
Zurück zum Zitat Alomari, E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49, 24–32 (2012) Alomari, E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49, 24–32 (2012)
20.
Zurück zum Zitat Bhuvaneswari, R., Ramachandran, R.: Denial of service attack mitigation addressing all the security attributes in OLSR MANET. Int. J. Wirel. Mob. Comput. 15, 88–95 (2018)CrossRef Bhuvaneswari, R., Ramachandran, R.: Denial of service attack mitigation addressing all the security attributes in OLSR MANET. Int. J. Wirel. Mob. Comput. 15, 88–95 (2018)CrossRef
21.
Zurück zum Zitat Makani, R., Reddy, B.V.R.: Taxonomy of machine leaning based anomaly detection and its suitability. In: International Conference on Computational Intelligence and Data Science (ICCIDS) (2018) Makani, R., Reddy, B.V.R.: Taxonomy of machine leaning based anomaly detection and its suitability. In: International Conference on Computational Intelligence and Data Science (ICCIDS) (2018)
22.
Zurück zum Zitat Mitchell, R., Chen, I.-R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)CrossRef Mitchell, R., Chen, I.-R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)CrossRef
23.
Zurück zum Zitat Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2014)CrossRef Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2014)CrossRef
24.
Zurück zum Zitat Sumit, S., Mitra, D., Gupta, D.: Proposed intrusion detection on ZRP based MANET by effective k-means clustering method of data mining. IEEE (2014) Sumit, S., Mitra, D., Gupta, D.: Proposed intrusion detection on ZRP based MANET by effective k-means clustering method of data mining. IEEE (2014)
25.
Zurück zum Zitat Soni, M., Ahirwa, M., Agrawal, S.: A survey on intrusion detection techniques in MANET. In: International Conference on Computational Intelligence and Communication Networks (CICN), 12–14 December 2015 (2015) Soni, M., Ahirwa, M., Agrawal, S.: A survey on intrusion detection techniques in MANET. In: International Conference on Computational Intelligence and Communication Networks (CICN), 12–14 December 2015 (2015)
26.
Zurück zum Zitat Neethu, B.: Classification of intrusion detection dataset using machine learning approaches. Int. J. Electron. Comput. Sci. Eng. 1(3), 1044–1051 (2012) Neethu, B.: Classification of intrusion detection dataset using machine learning approaches. Int. J. Electron. Comput. Sci. Eng. 1(3), 1044–1051 (2012)
27.
Zurück zum Zitat Haq, N.F., Rafni, M., Onik, A.R., Shah, F.M., Hridoy, M.A.K., Farid, D.M.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Intell. (IJARAI) 4(3), 9–18 (2015) Haq, N.F., Rafni, M., Onik, A.R., Shah, F.M., Hridoy, M.A.K., Farid, D.M.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Intell. (IJARAI) 4(3), 9–18 (2015)
Metadaten
Titel
Evaluation of Deep Learning Approaches for Intrusion Detection System in MANET
verfasst von
Safaa Laqtib
Khalid El Yassini
Moulay Lahcen Hasnaoui
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-37629-1_71

    Premium Partner