Skip to main content

Evaluation of Deep Learning Approaches for Intrusion Detection System in MANET

  • Conference paper
  • First Online:
Innovations in Smart Cities Applications Edition 3 (SCA 2019)

Abstract

Mobile Ad hoc Network (MANET) consists of a set of nodes which stand randomly in the operating environment. Since nodes are then vulnerable to intrusion and attack without any pre-defined infrastructure and flexibility. Securing in this type of network is an important area. To tackle these security problems, current cryptography schemes cannot completely safeguard MANET in terms of new threats and vulnerabilities. By implementing Deep learning techniques in IDS, MANET will be able to adapt complex environments and allow the system to make decisions on intrusion while continuing to learn about their mobile environment. IDS represent the second line of defense against malevolent behavior to MANET since they monitor network activities in order to detect any malicious attempt performed by Intruders. Recently, more and more researchers applied deep neural networks (DNNs) to solve intrusion detection problems. The two major forms of DNN architectures, Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), are commonly explored to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of CNN and RNN on the deep learning-based intrusion detection systems, aiming to give basic guidance for DNN selection in MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amiria, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 September 2013 (2013)

    Google Scholar 

  2. Laqtib, S., El Yassini, K., Houmer, M., El Ouadghiri, M.D., Hasnaoui, M.L.: Impact of mobility models on optimized link state routing protocol in MANET. In: Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), 26–29 October 2016 (2016)

    Google Scholar 

  3. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)

    Google Scholar 

  4. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. Department of Computer Science and Engineering Florida Atlantic University, Wireless/Mobile Network Security (2007)

    Google Scholar 

  5. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)

    Article  Google Scholar 

  6. Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R.: On cloud security attacks: “a taxonomy and intrusion detection and prevention as a service”. J. Netw. Comput. Appl. 74, 98–120 (2016)

    Article  Google Scholar 

  7. Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In: International Conference on Smart Sensors and Application, pp. 26–28. IEEE, May 2015

    Google Scholar 

  8. Ughade, S., Kapoor, R.K., Pandey, A.: An overview on wormhole attack in wireless sensor network: challenges, impacts, and detection approach. Int. J. Recent Dev. Eng. Technol. 2(4), 102–109 (2014). ISSN 2347 – 6435

    Google Scholar 

  9. Gharu, V., Pawar, M., Agarwal, J.: A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng. (IJCSE) 8, 80–83 (2017)

    Google Scholar 

  10. Singla, N., Singh, R.: Wormhole attack prevention and detection in MANETs using HRL Method. Int. J. Adv. Res. Ideas Innov. Technol. 3(2) (2017)

    Google Scholar 

  11. Singh, S., Mishra, A., Singh, U.: Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm. In: Symposium on Colossal Data Analysis and Networking (CDAN), 18–19 March 2016 (2016)

    Google Scholar 

  12. Jamal, T., Butt, S.A.: Malicious node analysis in MANETS. Int. J. Inform. Technol. 11, 859–867 (2018)

    Article  Google Scholar 

  13. Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International Conference on Electrical and Information Technologies (ICEIT), 4–7 May 2016 (2016)

    Google Scholar 

  14. Desai, V., Shekokar, N.: Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In: IEEE Global Conference on Wireless Computing and Networking (GCWCN), pp. 138–143 (2014)

    Google Scholar 

  15. Noureldien, N.A., Saeed, S.K., Salih, M.A., Ahmed, A.M.: Survey of mobile ad hoc networks attacks and a new classification scheme. Br. J. Math. Comput. Sci. 8(1), 25–38 (2015)

    Article  Google Scholar 

  16. Meher, R., Ladhe, S.: Review paper on flooding attack in MANET. Int. J. Eng. Res. Appl. 4(1, Version 2), 39–46 (2014)

    Google Scholar 

  17. Rishabh, J., Charul, D., Meenakshi: A survey of protocols and attacks in MANET Routing. Int. J. Comput. Sci. Manag. Stud. 12(3) (2012)

    Google Scholar 

  18. Panda, P., Gadnayak, K.K., Panda, N.: MANET attacks and their countermeasures: a survey. Int. J. Comput. Sci. Mob. Comput. 2(11), 319–330 (2013)

    Google Scholar 

  19. Alomari, E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49, 24–32 (2012)

    Google Scholar 

  20. Bhuvaneswari, R., Ramachandran, R.: Denial of service attack mitigation addressing all the security attributes in OLSR MANET. Int. J. Wirel. Mob. Comput. 15, 88–95 (2018)

    Article  Google Scholar 

  21. Makani, R., Reddy, B.V.R.: Taxonomy of machine leaning based anomaly detection and its suitability. In: International Conference on Computational Intelligence and Data Science (ICCIDS) (2018)

    Google Scholar 

  22. Mitchell, R., Chen, I.-R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)

    Article  Google Scholar 

  23. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2014)

    Article  Google Scholar 

  24. Sumit, S., Mitra, D., Gupta, D.: Proposed intrusion detection on ZRP based MANET by effective k-means clustering method of data mining. IEEE (2014)

    Google Scholar 

  25. Soni, M., Ahirwa, M., Agrawal, S.: A survey on intrusion detection techniques in MANET. In: International Conference on Computational Intelligence and Communication Networks (CICN), 12–14 December 2015 (2015)

    Google Scholar 

  26. Neethu, B.: Classification of intrusion detection dataset using machine learning approaches. Int. J. Electron. Comput. Sci. Eng. 1(3), 1044–1051 (2012)

    Google Scholar 

  27. Haq, N.F., Rafni, M., Onik, A.R., Shah, F.M., Hridoy, M.A.K., Farid, D.M.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Intell. (IJARAI) 4(3), 9–18 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Safaa Laqtib .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Laqtib, S., El Yassini, K., Hasnaoui, M.L. (2020). Evaluation of Deep Learning Approaches for Intrusion Detection System in MANET. In: Ben Ahmed, M., Boudhir, A., Santos, D., El Aroussi, M., Karas, İ. (eds) Innovations in Smart Cities Applications Edition 3. SCA 2019. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-37629-1_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37629-1_71

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37628-4

  • Online ISBN: 978-3-030-37629-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics