Skip to main content

Designing of Fuzzy Logic-Based Intrusion Detection System (FIDS) for Detection of Blackhole Attack in AODV for MANETs

  • Conference paper
  • First Online:
Cyber Security and Digital Forensics

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 73))

Abstract

Mobile Ad hoc networks (MANETs) are wireless/infrastructure-less and resource-constraint, having collection of nodes with high mobility feature (Ramanathan and Redi in IEEE Commun Magaz 40(5) 2002). It is a challenge to have efficient intrusion detection system (IDS) for such wireless and mobile architecture of systems. Researchers have presented in their research that the fuzzy logic-based intrusion detection systems are more adoptable to MANET’s application because behavior of any mobile node may be visualized in fuzziness characteristics. It is required to design robust IDS system which can sustain and can work efficiently in MANET environments. The work presents the selection of suitable protocol features and fuzzy rules generation which exhibits substantial role for precision of the fuzzy logic-based intrusion detection system (FIDS). Here, set of fuzzy rules have been proposed to protect network against blackhole attack. These set of rules are created using three AODV critical attribute which are rate of RREQ, RREP and Sequence number value. The proposed FIDS, thereafter, evaluated using ns2 simulator and are found efficient to detect and isolate the attacker node from the network. The deployment of FIDS has resulted in increase of throughput of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ramanathan, R., Redi, J.: A brief overview of ad hoc networks: challenges and directions. IEEE Commun. Magaz. 40(5) (2002)

    Google Scholar 

  2. Vydeki, D., Bhuvaneswaran, R.S.: Effect of clustering in designing a fuzzy based hybrid intrusion detection system for mobile ad hoc networks. J. Comput. Sci. 9(4), 521–525, ISSN: 1549-3636 (2013)

    Google Scholar 

  3. Poongothai, T., Duraiswamy, K.: Cross layer intrusion detection system of mobile ad hoc networks using feature selection approach. Wseas Trans. Commun. 13 (2014)

    Google Scholar 

  4. Introduction to fuzzy logic. http://www.francky.me/doc/course/fuzzy-logic.pdf

  5. Lectures on Fuzzy. http://ce.sharif.edu/courses/92-93/1/ce9571/resources/root/Lectures/Lecture6&7.pdf

  6. Zadeh, L.A.: Fuzzy logic—computing with words. IEEE Trans. Fuzzy Syst. 4, 103–111 (1996)

    Article  Google Scholar 

  7. Ruchi, M., Reddy, B.V.R.: Taxonomy of machine leaning based anomaly detection and its suitability. In: International Conference on Computation Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science, vol. 132, pp. 1842–1849, Elsevier (2018)

    Google Scholar 

  8. Garcia Teodora, P., Diaz Verdejo, J., MaciaFarnandez, G., Vazquez, E.: Anomaly based network intrusion detection: techniques, systems and challenges. J. Comput. Secur. 28(1), 18–28 (2009)

    Google Scholar 

  9. Shelly, X.W., Wolfgang, B.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. Appl. Soft Comput. 10, 1–35 (2010)

    Google Scholar 

  10. Izakian, H., Pedrycz, W.: Agreement-based fuzzy c-means for clustering data with blocks of features. Neurocomputing 127, 266–280 (2014)

    Article  Google Scholar 

  11. Animato, M.E., Kim, H., Kim, K.: Another fuzzy anomaly detection system based on ant clustering algorithm. Kumamoto, Japan (2016)

    Google Scholar 

  12. Mkuzangwe, N.N.P., Nelwamondo, F.V.: A fuzzy logic based network intrusion detection system for predicting the TCP SYN flooding attack. Springer International Publishing, Part II, LNAI 10192, pp. 14–22 (2017)

    Google Scholar 

  13. Kulbhushan, Singh, J.: Fuzzy-logic-based intrusion detection system against blackhole attack AODV in Manet. IJCA Special issue on “Network Security and Cryptography”, vol. NSC, no. 2, pp. 28–35 (2011)

    Google Scholar 

  14. Mandal, S.N., Pal Choudhury, J., Bhadra Chaudhuri, S.R.: In search of suitable fuzzy membership function in prediction of time series data. Int. J. Comput. Sci. Issues 9(3), 3 (2012)

    Google Scholar 

  15. Chaudhary, A., Kumar, A., Tiwari, V.N.: A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs. IEEE Int. Conf. Optimiz. Reliab. Inf. Technol. 178–181 (2014)

    Google Scholar 

  16. Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings 2nd IEEE Workshop Mobile Computer System and Applications, pp. 90100 (1999)

    Google Scholar 

  17. Ning, P., Sun, K.: How to misuse AODV: a case study of inside attacks against mobile ad-hoc routing protocols. In: Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY (2003)

    Google Scholar 

  18. Rajya Lakshmi, G.V., Anusha, K.: Detection of anomaly network traffic for mobile ad-hoc network using fuzzy logic. Int. J. Emerg. Res. Manag. Technol. (2013)

    Google Scholar 

  19. Chaudhary, A., Tiwari, V.N., Kumar, A.: Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks. BIJIT—BVICAM‟s Int. J. Inf. Technol. 6(1) (2014)

    Google Scholar 

  20. Dokurer, S., Ert, Y.M., Acar, C.E.: Performance analysis of adhoc networks under blackhole attacks. In: Southeast Con, 2007, Proceedings IEEE, pp. 148–153 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruchi Makani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Makani, R., Reddy, B.V.R. (2022). Designing of Fuzzy Logic-Based Intrusion Detection System (FIDS) for Detection of Blackhole Attack in AODV for MANETs. In: Khanna, K., Estrela, V.V., Rodrigues, J.J.P.C. (eds) Cyber Security and Digital Forensics . Lecture Notes on Data Engineering and Communications Technologies, vol 73. Springer, Singapore. https://doi.org/10.1007/978-981-16-3961-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3961-6_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3960-9

  • Online ISBN: 978-981-16-3961-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics