Skip to main content
Erschienen in: Journal of Intelligent Information Systems 2/2016

01.04.2016

Machine learning for intrusion detection in MANET: a state-of-the-art survey

verfasst von: Lediona Nishani, Marenglen Biba

Erschienen in: Journal of Intelligent Information Systems | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Machine learning consists of algorithms that are first trained with reference input to “learn” its specifics and then used on unseen input for classification purposes. Mobile ad-hoc wireless networks (MANETs) have drawn much attention to research community due to their advantages and growing demand. However, they appear to be more susceptible to various attacks harming their performance than any other kind of network. Intrusion Detection Systems represent the second line of defense against malevolent behavior to MANETs, since they monitor network activities in order to detect any malicious attempt performed by intruders. Due to the inherent distributed architecture of MANET, traditional cryptography schemes cannot completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying machine learning methods for IDS these challenges can be overcome. In this paper, we present the most prominent models for building intrusion detection systems by incorporating machine learning in the MANET scenario. We have structured our survey into four directions of machine learning methods: classification approaches, association rule mining techniques, neural networks and instance based learning approaches. We analyze the most well-known approaches and present notable achievements but also drawbacks or flaws that these methods have. Finally, in concluding our survey we provide some findings of paramount importance identifying open issues in the MANET field of interest.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abdel-Fattah, F., & Dahalin, F. (2010). Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm. In IJCA Special Issue on Mobile Ad-hoc Networks MANETs. Abdel-Fattah, F., & Dahalin, F. (2010). Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm. In IJCA Special Issue on Mobile Ad-hoc Networks MANETs.
Zurück zum Zitat Abdel-Fattah, F., Dahalin, F., & Jusoh, Sh. (2010). Distributed and cooperative hierarchical intrusion detection on MANETs. International Journal of Computer Applications, 12(5). Abdel-Fattah, F., Dahalin, F., & Jusoh, Sh. (2010). Distributed and cooperative hierarchical intrusion detection on MANETs. International Journal of Computer Applications, 12(5).
Zurück zum Zitat Anjana-Devi, V., & Bhuvaneswaran, R.S. (2011a). Adaptive association rule mining based on cross layer intrusion detection system for MANET. International Journal of Network Security & Its Applications (IJNSA), 3(510.5121/ijnsa.2011.3519), 243. Anjana-Devi, V., & Bhuvaneswaran, R.S. (2011a). Adaptive association rule mining based on cross layer intrusion detection system for MANET. International Journal of Network Security & Its Applications (IJNSA), 3(510.5121/ijnsa.2011.3519), 243.
Zurück zum Zitat Anjana-Devi, V., & Bhuvaneswaran, R.S. (2011b). Agent based cross layer intrusion detection system for MANET. In Advances in Network Security and Applications Communications in Computer and Information Science, (Vol. 196 pp. 427–440). Anjana-Devi, V., & Bhuvaneswaran, R.S. (2011b). Agent based cross layer intrusion detection system for MANET. In Advances in Network Security and Applications Communications in Computer and Information Science, (Vol. 196 pp. 427–440).
Zurück zum Zitat Bose, S., Bharathimurugan, S., & Kannan, A. (2007). Multi-layer intergraded anomaly intrusion detection for mobile ad hoc networks. In Proceedings of the IEEE International Conference on Signal Processing Communications and Networking (ICSCN 2007) (pp. 360–365). Bose, S., Bharathimurugan, S., & Kannan, A. (2007). Multi-layer intergraded anomaly intrusion detection for mobile ad hoc networks. In Proceedings of the IEEE International Conference on Signal Processing Communications and Networking (ICSCN 2007) (pp. 360–365).
Zurück zum Zitat Cabrera, J.B.D., Gutirrez C., & Mehra, R.K. (2008). Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad hoc networks. Information Fusion, 9, 96–119.CrossRef Cabrera, J.B.D., Gutirrez C., & Mehra, R.K. (2008). Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad hoc networks. Information Fusion, 9, 96–119.CrossRef
Zurück zum Zitat Cannady, J. (1998). Artificial neural networks for misuse detection. In Artificial Neural Networks - ICANN: International Conference Vienna. Cannady, J. (1998). Artificial neural networks for misuse detection. In Artificial Neural Networks - ICANN: International Conference Vienna.
Zurück zum Zitat Changguo, Y., Qin, Zh., Jingwei, Zh., Nianzhong, W., Xiaorong, Zh., & Tailei W. (2009). Improvement of association rules mining algorithm in wireless network intrusion detection. In Computational Intelligence and Natural Computing International Conference. Changguo, Y., Qin, Zh., Jingwei, Zh., Nianzhong, W., Xiaorong, Zh., & Tailei W. (2009). Improvement of association rules mining algorithm in wireless network intrusion detection. In Computational Intelligence and Natural Computing International Conference.
Zurück zum Zitat Cliftom, C., & Gengo, G. (2000). Developing custom intrusion detection filters using data mining. Military communications International LosAngeles. Cliftom, C., & Gengo, G. (2000). Developing custom intrusion detection filters using data mining. Military communications International LosAngeles.
Zurück zum Zitat Deepika, T., Vinchurkar, P., & Reshamwala, A. (2012). A review of intrusion detection system using neural network and machine learning. ISSN: 2319-5967 ISO 9001:2008 (IJESIT), 1(2). Deepika, T., Vinchurkar, P., & Reshamwala, A. (2012). A review of intrusion detection system using neural network and machine learning. ISSN: 2319-5967 ISO 9001:2008 (IJESIT), 1(2).
Zurück zum Zitat Deng, H., Zeng, Q., & Agrawal, D.P. (2003). SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of the 58thIEEE Vehicular Technology Conference (VTC03), (Vol. 3, pp. 2147–2151). Deng, H., Zeng, Q., & Agrawal, D.P. (2003). SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of the 58thIEEE Vehicular Technology Conference (VTC03), (Vol. 3, pp. 2147–2151).
Zurück zum Zitat Engen, V. (2010). Machine learning for network based intrusion detection. An investigation into Discrepancies in Findings with the KDD Cup 99 Data Set and Multi-Objective Evolution of Neural Network Classifier Ensembles for Imbalanced Data, Dissertation. Bournemouth University. Engen, V. (2010). Machine learning for network based intrusion detection. An investigation into Discrepancies in Findings with the KDD Cup 99 Data Set and Multi-Objective Evolution of Neural Network Classifier Ensembles for Imbalanced Data, Dissertation. Bournemouth University.
Zurück zum Zitat Fung, C., & Boutaba, R. (2010). Cooperation in Intrusion Detection Networks. Cooperative Networks. Fung, C., & Boutaba, R. (2010). Cooperation in Intrusion Detection Networks. Cooperative Networks.
Zurück zum Zitat Fung, C., & Boutaba, R. (2013). Design and Management of Collaborative Intrusion Detection Networks. Ghent Belgium: IFIP/IEEE Integrated Network Management Symposium (IM). Fung, C., & Boutaba, R. (2013). Design and Management of Collaborative Intrusion Detection Networks. Ghent Belgium: IFIP/IEEE Integrated Network Management Symposium (IM).
Zurück zum Zitat Ghodratnama, S., Moosavi, M., Taheri, M., & Zolghadri, M. (2010). A cost sensitive learning algorithm for intrusion detection. In Proceedings of the 18th Iranian Conference on Electrical Engineering (ICEE), (pp. 559–565). Ghodratnama, S., Moosavi, M., Taheri, M., & Zolghadri, M. (2010). A cost sensitive learning algorithm for intrusion detection. In Proceedings of the 18th Iranian Conference on Electrical Engineering (ICEE), (pp. 559–565).
Zurück zum Zitat Hanemann, A. (2006). A hybrid rule-based/case-based reasoning approach for service fault Diagnosis. In Proceedings of the 2006 International Symposium on Frontiers in Networking with Applications. Hanemann, A. (2006). A hybrid rule-based/case-based reasoning approach for service fault Diagnosis. In Proceedings of the 2006 International Symposium on Frontiers in Networking with Applications.
Zurück zum Zitat Huang, Y., & Lee, W. (2003). A Cooperative Intrusion Detection System for Ad Hoc Networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 135–147). Huang, Y., & Lee, W. (2003). A Cooperative Intrusion Detection System for Ad Hoc Networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 135–147).
Zurück zum Zitat Huang, Y., Lee, W., & Yu, P. (2003). Cross-feature analysis for detecting ad-hoc routing anomalies. In Proceedings of the 23rd International Conference on Distributed Computing Systems (p. 478). Huang, Y., Lee, W., & Yu, P. (2003). Cross-feature analysis for detecting ad-hoc routing anomalies. In Proceedings of the 23rd International Conference on Distributed Computing Systems (p. 478).
Zurück zum Zitat Kaur, H., Singh, G., & Minhas, J. (2013). A review of machine learning based anomaly detection techniques. International Journal of Computer Applications Technology and Research, 2(2), 185–187.CrossRef Kaur, H., Singh, G., & Minhas, J. (2013). A review of machine learning based anomaly detection techniques. International Journal of Computer Applications Technology and Research, 2(2), 185–187.CrossRef
Zurück zum Zitat Lalli, M., & Palanisamy, V. (2014). A novel intrusion detection model for mobile ad-hoc networks using CP-KNN. International Journal of Computer Networks & Communications (IJCNC), 6(5). doi:10.5121/ijcnc.2014.6515_193. Lalli, M., & Palanisamy, V. (2014). A novel intrusion detection model for mobile ad-hoc networks using CP-KNN. International Journal of Computer Networks & Communications (IJCNC), 6(5). doi:10.​5121/​ijcnc.​2014.​6515_​193.
Zurück zum Zitat Lane, T., & Brodley, C.E. (1999). Temporal sequence learning and data reduction for anomaly detection, ACM Transactions on Information and System Security, 295331. Lane, T., & Brodley, C.E. (1999). Temporal sequence learning and data reduction for anomaly detection, ACM Transactions on Information and System Security, 295331.
Zurück zum Zitat Mabu, S., Chen, C., Lu, N., & Shimada, K. (2011). An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Transactions on Systems Man and Cybernetics Part C, 41(1), 130–139.CrossRef Mabu, S., Chen, C., Lu, N., & Shimada, K. (2011). An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Transactions on Systems Man and Cybernetics Part C, 41(1), 130–139.CrossRef
Zurück zum Zitat Maheshwar, K., & Singh, D. (2013). A review of data mining based intrusion detection techniques. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2(2), 2319–4847. Maheshwar, K., & Singh, D. (2013). A review of data mining based intrusion detection techniques. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2(2), 2319–4847.
Zurück zum Zitat Mitrokotsa, A., & Kominos, N. (2007). Intrusion detection and response in ad hoc networks. In International Journal of Computer Research. Mitrokotsa, A., & Kominos, N. (2007). Intrusion detection and response in ad hoc networks. In International Journal of Computer Research.
Zurück zum Zitat Mitrokotsa, A., Komninos N., & Douligeris, Ch. (2007). Intrusion detection with neural networks and watermarking techniques for MANET. In Proceedings of IEEE International Conference on Pervasive Services (pp. 118–127). Mitrokotsa, A., Komninos N., & Douligeris, Ch. (2007). Intrusion detection with neural networks and watermarking techniques for MANET. In Proceedings of IEEE International Conference on Pervasive Services (pp. 118–127).
Zurück zum Zitat Mitrokotsa, A., & Dimitrakakis, C. (2012). Intrusion detection in MANET using classification algorithms: The effects of cost and model selection ad-hoc Networks, Retrieved from doi:10.1016/j.adhoc.2012.05.006. Mitrokotsa, A., & Dimitrakakis, C. (2012). Intrusion detection in MANET using classification algorithms: The effects of cost and model selection ad-hoc Networks, Retrieved from doi:10.​1016/​j.​adhoc.​2012.​05.​006.
Zurück zum Zitat Moradi, Z., Teshnehlab, M., & Rahmani, A. (2011). Implementation of neural networks for intrusion detection in MANET. In International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT). Moradi, Z., Teshnehlab, M., & Rahmani, A. (2011). Implementation of neural networks for intrusion detection in MANET. In International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT).
Zurück zum Zitat Mukkamala, S., & Sung, A. (2006). Significant feature selection using computational intelligent techniques for intrusion detection. Berlin Heidelber: Springer.MATH Mukkamala, S., & Sung, A. (2006). Significant feature selection using computational intelligent techniques for intrusion detection. Berlin Heidelber: Springer.MATH
Zurück zum Zitat Panos, Ch., Xenakis, Ch., & Stavrakakis, I. (2011). An evaluation of anomaly-based intrusion detection engines for mobile ad hoc networks. Trust Privacy and Security in Digital Business Lecture Notes in Computer Science, 6863, 150–160.CrossRef Panos, Ch., Xenakis, Ch., & Stavrakakis, I. (2011). An evaluation of anomaly-based intrusion detection engines for mobile ad hoc networks. Trust Privacy and Security in Digital Business Lecture Notes in Computer Science, 6863, 150–160.CrossRef
Zurück zum Zitat Piatetsky-Shapiro, G., & Frawley, J. (1991). Discovery analysis and presentation of strong rules. Knowledge Discovery in Databases AAAI/MIT Press. Piatetsky-Shapiro, G., & Frawley, J. (1991). Discovery analysis and presentation of strong rules. Knowledge Discovery in Databases AAAI/MIT Press.
Zurück zum Zitat Ponsam, J., & Srinivasan, J. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20). Ponsam, J., & Srinivasan, J. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20).
Zurück zum Zitat Shao, M., Lin, J., & Lee, Y. (2010). Cluster-based cooperative back propagation network approach for intrusion detection in MANET. In IEEE 10th International Conference on Computer an Information Technology (CIT). Shao, M., Lin, J., & Lee, Y. (2010). Cluster-based cooperative back propagation network approach for intrusion detection in MANET. In IEEE 10th International Conference on Computer an Information Technology (CIT).
Zurück zum Zitat Shrestha, R., Han, K., Choi, D., & Han, S. (2010). A cross layer intrusion detection system in MANET. In 24th IEEE International Conference on Advanced Information Networking and Applications. Shrestha, R., Han, K., Choi, D., & Han, S. (2010). A cross layer intrusion detection system in MANET. In 24th IEEE International Conference on Advanced Information Networking and Applications.
Zurück zum Zitat Somasundaram, R.M., & Lakshmana, K. (2013). An intrusion detection system for MANET using CRF based Feature Selection and Temporal Association Rules. In International Journal of Soft Computing. Somasundaram, R.M., & Lakshmana, K. (2013). An intrusion detection system for MANET using CRF based Feature Selection and Temporal Association Rules. In International Journal of Soft Computing.
Zurück zum Zitat Visumathi, J., & Shunmunganathan, K.S. (2012). An effective IDS using feature selection and classification algorithm. In International Conference on Modeling Optimization and computing, Procedia Enginnering (pp. 2816–2823). Visumathi, J., & Shunmunganathan, K.S. (2012). An effective IDS using feature selection and classification algorithm. In International Conference on Modeling Optimization and computing, Procedia Enginnering (pp. 2816–2823).
Zurück zum Zitat Zhang, Y., & Lee, W. (2003). A cooperative intrusion detection system for ad-hoc networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN03 (p. 135147). Zhang, Y., & Lee, W. (2003). A cooperative intrusion detection system for ad-hoc networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN03 (p. 135147).
Metadaten
Titel
Machine learning for intrusion detection in MANET: a state-of-the-art survey
verfasst von
Lediona Nishani
Marenglen Biba
Publikationsdatum
01.04.2016
Verlag
Springer US
Erschienen in
Journal of Intelligent Information Systems / Ausgabe 2/2016
Print ISSN: 0925-9902
Elektronische ISSN: 1573-7675
DOI
https://doi.org/10.1007/s10844-015-0387-y

Weitere Artikel der Ausgabe 2/2016

Journal of Intelligent Information Systems 2/2016 Zur Ausgabe

Premium Partner