Abstract
Mobile ad hoc network is a widely developing technology that has been used in various areas such as in health care, military, virtual classrooms and conferences. However, mobile ad hoc networks are installed in critical situations security in this network is an important issue. Many susceptible characteristics of mobile ad hoc networks make an attacker breach the system easily. So, it is important to have an intrusion detection system which can monitor mobile ad hoc networks constantly to identify any suspicious behaviour. Anomaly and misuse detection are the two widely used intrusion detection mechanisms used to analyse the attacks in mobile ad hoc networks. Anomaly intrusion detectors were proven to be more effective against unknown attacks. A number of anomaly-based intrusion detectors based on machine learning techniques were developed and tested against various attacks. In this paper, several intrusion detection techniques which used machine learning approaches for detection are reviewed and a hybrid IDS technique which combines with genetic algorithm and Bayesian game theory is proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Barry BI, Chan HA (2010) Intrusion detection systems. In: Handbook of information and communication security. Springer, Berlin, Heidelberg, pp 193–205
Sujatha KS, Dharmar V, Bhuvaneswaran RS (2012) Design of genetic algorithm based IDS for MANET. In: International conference on recent trends in information technology (ICRTIT). IEEE, pp 28–33
Justin V, Marathe N, Dongre N (2017) Hybrid IDS using SVM classifier for detecting DoS attack in MANET application. In: International conference on I-SMAC (IoT in social, mobile, analytics and cloud). IEEE, pp 775–778
James C (2010) Dynamic neural networks in the detection of distributed attacks in mobile ad-hoc networks. Int J Netw Secur Appl (IJNSA) 2:1–7
Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 50:109–114
Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inf J 15:37–50
Kim J, Lee JH (2008) A slow port scan attack detection mechanism based on fuzzy logic and a stepwise policy. In: 4th international conference on intelligent environments (IE 08)
Yadav P, Gill R, Kumar N (2012) A fuzzy based approach to detect black hole attack. Int J Soft Comput Eng 2:388–391
Watkins D (2004) Tactical MANET attack detection based on fuzzy sets using agent communication. In: 24th army science conference
Visconti A, Tahayori H (2011) Artificial immune system based on interval type-2 fuzzy set paradigm. Appl Soft Comput 11:4055–4063
Sujatha P, Priya CS, Kannan A (2012) Network intrusion detection system using genetic network programming with support vector machine. In: Proceedings of the international conference on advances in computing, communications and informatics, Chennai, India, pp 645–649
Hoque M (2012) An implementation of intrusion detection system using genetic algorithm. Int J of Netw Secur Appl 4:109–120
Benaicha SE, Saoudi L, Guermeche SEB, Lounis O (2014) Intrusion detection system using genetic algorithm. In: Science and information conference. IEEE, pp 564–568
Wu HC, Huang SHS (2010) Neural networks-based detection of stepping-stone intrusion. Expert Syst Appl 37:1431–1437
Govindarajan M, Chandrasekaran RM (2011) Intrusion detection using neural based hybrid classification methods. Comput Netw 55:1662–1671
Jabbehdari S, Talari SH, Modiri N (2012) A neural network scheme for anomaly based intrusion detection system in mobile ad hoc networks. J Comput 4:61–66
Altwaijry H, Algarny S (2012) Bayesian based intrusion detection system. J King Saud Univ Comput Inf Sci 24:1–6
Scott SL (2004) A Bayesian paradigm for designing intrusion detection systems. Comput Stat Data Anal 45:69–83
Amor NB, Benferhat S, and Elouedi Z (2004) Naive Bayes vs decision trees in intrusion detection systems. In: Proceedings of 2004 ACM symposium on applied computing, pp 420–424
Deng H, Zeng QA, Agrawal DP (2003) SVM-based intrusion detection system for wireless ad hoc networks. In: 58th vehicular technology conference, vol 3. IEEE, pp 2147–2151
Gharaee H, Hosseinvand H (2016) A new feature selection IDS based on genetic algorithm and SVM. In: 8th international symposium on telecommunications (IST). IEEE, pp 139–144
Devarakonda N, Pamidi S, Kumari VV, Govardhan A (2012) Intrusion detection system using Bayesian network and hidden Markov model. Procedia Technol 4:506–514
Kim J, Bentley PJ (2001) The artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Evolutionary Computation proceedings. IEEE, pp 1244–1252
Yunwu W (2009) Using fuzzy expert system based on genetic algorithm for intrusion detection system. In: 2009 international forum on information technology and applications. https://doi.org/10.1109/ifita.2009.107
Lee CH, Chung JW, Shin SW (2006) Network intrusion detection through genetic feature selection. In: Seventh ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing (SNPD’06). IEEE, pp 109–114
Shon T, Kim Y, Lee C, Moon J (2005) A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings from the sixth annual information assurance workshop 2005, IAW’05. IEEE, pp 176–183
Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks. IEEE, pp 1702–1707
Vaishnavi Devi B, Sakthi Priya N (2015) Intrusion detection and response systems in MANET using leader election based mechanism design approach. Int J Innov Res Comput Commun Eng 3:8670–8679
Kim, S (2014) Game theory applications in network design. IGI Global
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hamza, F., Maria Celestin Vigila, S. (2019). Review of Machine Learning-Based Intrusion Detection Techniques for MANETs. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_39
Download citation
DOI: https://doi.org/10.1007/978-981-13-7150-9_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7149-3
Online ISBN: 978-981-13-7150-9
eBook Packages: EngineeringEngineering (R0)