Skip to main content
Log in

A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

A mobile ad-hoc network is a small and temporary network. This network has a different working principle and structure than wired networks. A source node transfers data to the destination node through intermediate nodes. Due to mobility of node, this network is more vulnerable to routing attacks. Many security mechanisms protect the network from intrusions, such as cryptography based, lightweight, and heavyweight techniques. But, these are not powerful enough mechanisms for mobile ad-hoc networks to mitigate routing attacks. Therefore, we have proposed an enhanced intrusion detection system for the mobile ad-hoc network that handles routing attacks. This method mainly generates 11 sub-datasets and also evaluates their quality using a fuzzy logic system. We suggest a probabilistic approach for feature ranking. The next process removes ineffective features from training and test sets. We have applied a Bayesian rough set classifier that classifies the behavior of mobile nodes using incoming packets. The Bayes classifier is applied for ambiguous and unknown samples. Experimental results show that the average detection accuracy is 94.37% for blackhole attack and 99% for wormhole attack. The proposed method performs better than existing intrusion detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. MANET-IDS dataset is available at https://github.com/mahendrapd/MIDS.

  2. Program and output are available at https://github.com/mahendrapd/BRS.

References

  1. Khan K, Mehmood A, Khan S, Khan MA, Iqbal Z, Mashwani WK (2020) A survey on intrusion detection and prevention in wireless ad-hoc networks. J Syst Archit 105:101701

    Article  Google Scholar 

  2. Feng F, Liu X, Yong B, Zhou R, Zhou Q (2019) Anomaly detection in ad-hoc networks based on deep learning model: a plug and play device. Ad Hoc Netw 84:82–89

    Article  Google Scholar 

  3. Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur Commun Netw 9(14):2484–2556

    Article  Google Scholar 

  4. Elmahdi E, Yoo S-M, Sharshembiev K (2020) Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. J Inform Secur Applic 51:102425

    Google Scholar 

  5. Arul Selvan M, Selvakumar S (2019) Malicious node identification using quantitative intrusion detection techniques in manet. Cluster Comput 22(3):7069–7077

    Article  Google Scholar 

  6. Sivanesh S, Sarma Dhulipala V R (2020) Accurate and cognitive intrusion detection system (acids): a novel black hole detection mechanism in mobile ad hoc networks. Mobile Networks and Applications, 1–9

  7. Sankara Narayanan S, Murugaboopathi G (2020) Modified secure aodv protocol to prevent wormhole attack in manet. Concurr Comput: Pract Exper 32(4):e5017

    Article  Google Scholar 

  8. Shams EA, Rizaner A (2018) A novel support vector machine based intrusion detection system for mobile ad hoc networks. Wirel Netw 24(5):1821–1829

    Article  Google Scholar 

  9. Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49 (9):3235–3247

    Article  Google Scholar 

  10. Çavuşoğlu Ü (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49(7):2735–2761

    Article  Google Scholar 

  11. Bai S, Lin Y, Lv Y, Chen J, Wang C (2021) Kernelized fuzzy rough sets based online streaming feature selection for large-scale hierarchical classification. Appl Intell 51(3):1602–1615

    Article  Google Scholar 

  12. Prasad M, Tripathi S, Dahal K (2020) An efficient feature selection based bayesian and rough set approach for intrusion detection. Appl Soft Comput 87:105980

    Article  Google Scholar 

  13. Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H (2022) A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Computers & Security, 102675

  14. Bouhaddi M, Radjef MS, Adi K (2018) An efficient intrusion detection in resource-constrained mobile ad-hoc networks. Comput Secur 76:156–177

    Article  Google Scholar 

  15. Bharathisindhu P, Selva Brunda S (2019) An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network. Clust Comput 22(1):265–275

    Article  Google Scholar 

  16. Rajendran N, Jawahar PK, Priyadarshini R (2019) Cross centric intrusion detection system for secure routing over black hole attacks in manets. Comput Commun 148:129–135

    Article  Google Scholar 

  17. Bala K, Jothi S, Chandrasekar A (2019) An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis. Clust Comput 22(6):15205–15212

    Article  Google Scholar 

  18. Qurashi MA, Angelopoulos CM, Katos V (2020) An architecture for resilient intrusion detection in ad-hoc networks. J Inform Secur Applic 53:102530

    Google Scholar 

  19. Abdelhaq M, Alsaqour R, Algarni A, Alabdulhafith M, Alawi M, Taha A, Sharef B, Tariq M (2020) Human immune-based model for intrusion detection in mobile ad hoc networks. Peer-to-Peer Network Applic 13(3):1046–1068

    Article  Google Scholar 

  20. Mitrokotsa A, Dimitrakakis C (2013) Intrusion detection in manet using classification algorithms: the effects of cost and model selection. Ad Hoc Netw 11(1):226–237

    Article  Google Scholar 

  21. Arthur MP, Kannan K (2016) Cross-layer based multiclass intrusion detection system for secure multicast communication of manet in military networks. Wirel Netw 22(3):1035–1059

    Article  Google Scholar 

  22. Subba B, Biswas S (2016) Intrusion detection in mobile ad-hoc networks Bayesian game formulation. Eng Sci Techn Int J 19(2):782–799

    Google Scholar 

  23. Islabudeen M, Kavitha Devi M K (2020) A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wirel Pers Commun 112(1):193–224

    Article  Google Scholar 

  24. Huang S, Lei K (2020) Igan-ids: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw 105:102177

    Article  Google Scholar 

  25. Elwahsh H, Gamal M, Salama AA, El-Henawy IM (2018) A novel approach for classifying manets attacks with a neutrosophic intelligent system based on genetic algorithm. Security and communication networks, 2018

  26. Prasad M, Tripathi S, Dahal K (2022) An enhanced detection system against routing attacks in mobile ad-hoc network. Wirel Netw, 1–18

  27. Prasad M, Tripathi S, Dahal K (2019) Intrusion detection in ad hoc network using machine learning technique. In: International conference on big data, machine learning, and applications. Springer. pp 60–71

  28. Prasad M, Tripathi S, Dahal K (2019) Wormhole attack detection in ad hoc network using machine learning technique. In: 2019 10th International conference on computing, communication and networking technologies (ICCCNT). IEEE. pp 1–7

  29. Jiang F, Chen Y-M (2015) Outlier detection based on granular computing and rough set theory. Appl Intell 42(2):303–322

    Article  Google Scholar 

  30. Xiang Z-L, Yu X-R, Kang D-K (2016) Experimental analysis of naïve bayes classifier based on an attribute weighting framework with smooth kernel density estimations. Appl Intell 44(3):611–620

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahendra Prasad.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prasad, M., Tripathi, S. & Dahal, K. A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network. Appl Intell 53, 7169–7185 (2023). https://doi.org/10.1007/s10489-022-03763-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-022-03763-2

Keywords

Navigation