Skip to main content

Review of Machine Learning-Based Intrusion Detection Techniques for MANETs

  • Conference paper
  • First Online:
Computing and Network Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 75))

Abstract

Mobile ad hoc network is a widely developing technology that has been used in various areas such as in health care, military, virtual classrooms and conferences. However, mobile ad hoc networks are installed in critical situations security in this network is an important issue. Many susceptible characteristics of mobile ad hoc networks make an attacker breach the system easily. So, it is important to have an intrusion detection system which can monitor mobile ad hoc networks constantly to identify any suspicious behaviour. Anomaly and misuse detection are the two widely used intrusion detection mechanisms used to analyse the attacks in mobile ad hoc networks. Anomaly intrusion detectors were proven to be more effective against unknown attacks. A number of anomaly-based intrusion detectors based on machine learning techniques were developed and tested against various attacks. In this paper, several intrusion detection techniques which used machine learning approaches for detection are reviewed and a hybrid IDS technique which combines with genetic algorithm and Bayesian game theory is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barry BI, Chan HA (2010) Intrusion detection systems. In: Handbook of information and communication security. Springer, Berlin, Heidelberg, pp 193–205

    Chapter  Google Scholar 

  2. Sujatha KS, Dharmar V, Bhuvaneswaran RS (2012) Design of genetic algorithm based IDS for MANET. In: International conference on recent trends in information technology (ICRTIT). IEEE, pp 28–33

    Google Scholar 

  3. Justin V, Marathe N, Dongre N (2017) Hybrid IDS using SVM classifier for detecting DoS attack in MANET application. In: International conference on I-SMAC (IoT in social, mobile, analytics and cloud). IEEE, pp 775–778

    Google Scholar 

  4. James C (2010) Dynamic neural networks in the detection of distributed attacks in mobile ad-hoc networks. Int J Netw Secur Appl (IJNSA) 2:1–7

    Google Scholar 

  5. Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 50:109–114

    Article  Google Scholar 

  6. Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inf J 15:37–50

    Article  Google Scholar 

  7. Kim J, Lee JH (2008) A slow port scan attack detection mechanism based on fuzzy logic and a stepwise policy. In: 4th international conference on intelligent environments (IE 08)

    Google Scholar 

  8. Yadav P, Gill R, Kumar N (2012) A fuzzy based approach to detect black hole attack. Int J Soft Comput Eng 2:388–391

    Google Scholar 

  9. Watkins D (2004) Tactical MANET attack detection based on fuzzy sets using agent communication. In: 24th army science conference

    Google Scholar 

  10. Visconti A, Tahayori H (2011) Artificial immune system based on interval type-2 fuzzy set paradigm. Appl Soft Comput 11:4055–4063

    Article  Google Scholar 

  11. Sujatha P, Priya CS, Kannan A (2012) Network intrusion detection system using genetic network programming with support vector machine. In: Proceedings of the international conference on advances in computing, communications and informatics, Chennai, India, pp 645–649

    Google Scholar 

  12. Hoque M (2012) An implementation of intrusion detection system using genetic algorithm. Int J of Netw Secur Appl 4:109–120

    Google Scholar 

  13. Benaicha SE, Saoudi L, Guermeche SEB, Lounis O (2014) Intrusion detection system using genetic algorithm. In: Science and information conference. IEEE, pp 564–568

    Google Scholar 

  14. Wu HC, Huang SHS (2010) Neural networks-based detection of stepping-stone intrusion. Expert Syst Appl 37:1431–1437

    Article  Google Scholar 

  15. Govindarajan M, Chandrasekaran RM (2011) Intrusion detection using neural based hybrid classification methods. Comput Netw 55:1662–1671

    Article  Google Scholar 

  16. Jabbehdari S, Talari SH, Modiri N (2012) A neural network scheme for anomaly based intrusion detection system in mobile ad hoc networks. J Comput 4:61–66

    Google Scholar 

  17. Altwaijry H, Algarny S (2012) Bayesian based intrusion detection system. J King Saud Univ Comput Inf Sci 24:1–6

    Article  Google Scholar 

  18. Scott SL (2004) A Bayesian paradigm for designing intrusion detection systems. Comput Stat Data Anal 45:69–83

    Article  MathSciNet  Google Scholar 

  19. Amor NB, Benferhat S, and Elouedi Z (2004) Naive Bayes vs decision trees in intrusion detection systems. In: Proceedings of 2004 ACM symposium on applied computing, pp 420–424

    Google Scholar 

  20. Deng H, Zeng QA, Agrawal DP (2003) SVM-based intrusion detection system for wireless ad hoc networks. In: 58th vehicular technology conference, vol 3. IEEE, pp 2147–2151

    Google Scholar 

  21. Gharaee H, Hosseinvand H (2016) A new feature selection IDS based on genetic algorithm and SVM. In: 8th international symposium on telecommunications (IST). IEEE, pp 139–144

    Google Scholar 

  22. Devarakonda N, Pamidi S, Kumari VV, Govardhan A (2012) Intrusion detection system using Bayesian network and hidden Markov model. Procedia Technol 4:506–514

    Article  Google Scholar 

  23. Kim J, Bentley PJ (2001) The artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Evolutionary Computation proceedings. IEEE, pp 1244–1252

    Google Scholar 

  24. Yunwu W (2009) Using fuzzy expert system based on genetic algorithm for intrusion detection system. In: 2009 international forum on information technology and applications. https://doi.org/10.1109/ifita.2009.107

  25. Lee CH, Chung JW, Shin SW (2006) Network intrusion detection through genetic feature selection. In: Seventh ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing (SNPD’06). IEEE, pp 109–114

    Google Scholar 

  26. Shon T, Kim Y, Lee C, Moon J (2005) A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings from the sixth annual information assurance workshop 2005, IAW’05. IEEE, pp 176–183

    Google Scholar 

  27. Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks. IEEE, pp 1702–1707

    Google Scholar 

  28. Vaishnavi Devi B, Sakthi Priya N (2015) Intrusion detection and response systems in MANET using leader election based mechanism design approach. Int J Innov Res Comput Commun Eng 3:8670–8679

    Google Scholar 

  29. Kim, S (2014) Game theory applications in network design. IGI Global

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fouziah Hamza .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hamza, F., Maria Celestin Vigila, S. (2019). Review of Machine Learning-Based Intrusion Detection Techniques for MANETs. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7150-9_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7149-3

  • Online ISBN: 978-981-13-7150-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics