Abstract
Mobile Ad hoc networks (MANETs) are wireless/infrastructure-less and resource-constraint, having collection of nodes with high mobility feature (Ramanathan and Redi in IEEE Commun Magaz 40(5) 2002). It is a challenge to have efficient intrusion detection system (IDS) for such wireless and mobile architecture of systems. Researchers have presented in their research that the fuzzy logic-based intrusion detection systems are more adoptable to MANET’s application because behavior of any mobile node may be visualized in fuzziness characteristics. It is required to design robust IDS system which can sustain and can work efficiently in MANET environments. The work presents the selection of suitable protocol features and fuzzy rules generation which exhibits substantial role for precision of the fuzzy logic-based intrusion detection system (FIDS). Here, set of fuzzy rules have been proposed to protect network against blackhole attack. These set of rules are created using three AODV critical attribute which are rate of RREQ, RREP and Sequence number value. The proposed FIDS, thereafter, evaluated using ns2 simulator and are found efficient to detect and isolate the attacker node from the network. The deployment of FIDS has resulted in increase of throughput of the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ramanathan, R., Redi, J.: A brief overview of ad hoc networks: challenges and directions. IEEE Commun. Magaz. 40(5) (2002)
Vydeki, D., Bhuvaneswaran, R.S.: Effect of clustering in designing a fuzzy based hybrid intrusion detection system for mobile ad hoc networks. J. Comput. Sci. 9(4), 521–525, ISSN: 1549-3636 (2013)
Poongothai, T., Duraiswamy, K.: Cross layer intrusion detection system of mobile ad hoc networks using feature selection approach. Wseas Trans. Commun. 13 (2014)
Introduction to fuzzy logic. http://www.francky.me/doc/course/fuzzy-logic.pdf
Lectures on Fuzzy. http://ce.sharif.edu/courses/92-93/1/ce9571/resources/root/Lectures/Lecture6&7.pdf
Zadeh, L.A.: Fuzzy logic—computing with words. IEEE Trans. Fuzzy Syst. 4, 103–111 (1996)
Ruchi, M., Reddy, B.V.R.: Taxonomy of machine leaning based anomaly detection and its suitability. In: International Conference on Computation Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science, vol. 132, pp. 1842–1849, Elsevier (2018)
Garcia Teodora, P., Diaz Verdejo, J., MaciaFarnandez, G., Vazquez, E.: Anomaly based network intrusion detection: techniques, systems and challenges. J. Comput. Secur. 28(1), 18–28 (2009)
Shelly, X.W., Wolfgang, B.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. Appl. Soft Comput. 10, 1–35 (2010)
Izakian, H., Pedrycz, W.: Agreement-based fuzzy c-means for clustering data with blocks of features. Neurocomputing 127, 266–280 (2014)
Animato, M.E., Kim, H., Kim, K.: Another fuzzy anomaly detection system based on ant clustering algorithm. Kumamoto, Japan (2016)
Mkuzangwe, N.N.P., Nelwamondo, F.V.: A fuzzy logic based network intrusion detection system for predicting the TCP SYN flooding attack. Springer International Publishing, Part II, LNAI 10192, pp. 14–22 (2017)
Kulbhushan, Singh, J.: Fuzzy-logic-based intrusion detection system against blackhole attack AODV in Manet. IJCA Special issue on “Network Security and Cryptography”, vol. NSC, no. 2, pp. 28–35 (2011)
Mandal, S.N., Pal Choudhury, J., Bhadra Chaudhuri, S.R.: In search of suitable fuzzy membership function in prediction of time series data. Int. J. Comput. Sci. Issues 9(3), 3 (2012)
Chaudhary, A., Kumar, A., Tiwari, V.N.: A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs. IEEE Int. Conf. Optimiz. Reliab. Inf. Technol. 178–181 (2014)
Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings 2nd IEEE Workshop Mobile Computer System and Applications, pp. 90100 (1999)
Ning, P., Sun, K.: How to misuse AODV: a case study of inside attacks against mobile ad-hoc routing protocols. In: Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY (2003)
Rajya Lakshmi, G.V., Anusha, K.: Detection of anomaly network traffic for mobile ad-hoc network using fuzzy logic. Int. J. Emerg. Res. Manag. Technol. (2013)
Chaudhary, A., Tiwari, V.N., Kumar, A.: Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks. BIJIT—BVICAM‟s Int. J. Inf. Technol. 6(1) (2014)
Dokurer, S., Ert, Y.M., Acar, C.E.: Performance analysis of adhoc networks under blackhole attacks. In: Southeast Con, 2007, Proceedings IEEE, pp. 148–153 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Makani, R., Reddy, B.V.R. (2022). Designing of Fuzzy Logic-Based Intrusion Detection System (FIDS) for Detection of Blackhole Attack in AODV for MANETs. In: Khanna, K., Estrela, V.V., Rodrigues, J.J.P.C. (eds) Cyber Security and Digital Forensics . Lecture Notes on Data Engineering and Communications Technologies, vol 73. Springer, Singapore. https://doi.org/10.1007/978-981-16-3961-6_11
Download citation
DOI: https://doi.org/10.1007/978-981-16-3961-6_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3960-9
Online ISBN: 978-981-16-3961-6
eBook Packages: EngineeringEngineering (R0)