Abstract
Mobile Ad hoc Network (MANET) consists of a set of nodes which stand randomly in the operating environment. Since nodes are then vulnerable to intrusion and attack without any pre-defined infrastructure and flexibility. Securing in this type of network is an important area. To tackle these security problems, current cryptography schemes cannot completely safeguard MANET in terms of new threats and vulnerabilities. By implementing Deep learning techniques in IDS, MANET will be able to adapt complex environments and allow the system to make decisions on intrusion while continuing to learn about their mobile environment. IDS represent the second line of defense against malevolent behavior to MANET since they monitor network activities in order to detect any malicious attempt performed by Intruders. Recently, more and more researchers applied deep neural networks (DNNs) to solve intrusion detection problems. The two major forms of DNN architectures, Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), are commonly explored to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of CNN and RNN on the deep learning-based intrusion detection systems, aiming to give basic guidance for DNN selection in MANET.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amiria, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 September 2013 (2013)
Laqtib, S., El Yassini, K., Houmer, M., El Ouadghiri, M.D., Hasnaoui, M.L.: Impact of mobility models on optimized link state routing protocol in MANET. In: Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), 26–29 October 2016 (2016)
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)
Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. Department of Computer Science and Engineering Florida Atlantic University, Wireless/Mobile Network Security (2007)
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)
Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R.: On cloud security attacks: “a taxonomy and intrusion detection and prevention as a service”. J. Netw. Comput. Appl. 74, 98–120 (2016)
Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In: International Conference on Smart Sensors and Application, pp. 26–28. IEEE, May 2015
Ughade, S., Kapoor, R.K., Pandey, A.: An overview on wormhole attack in wireless sensor network: challenges, impacts, and detection approach. Int. J. Recent Dev. Eng. Technol. 2(4), 102–109 (2014). ISSN 2347 – 6435
Gharu, V., Pawar, M., Agarwal, J.: A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng. (IJCSE) 8, 80–83 (2017)
Singla, N., Singh, R.: Wormhole attack prevention and detection in MANETs using HRL Method. Int. J. Adv. Res. Ideas Innov. Technol. 3(2) (2017)
Singh, S., Mishra, A., Singh, U.: Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm. In: Symposium on Colossal Data Analysis and Networking (CDAN), 18–19 March 2016 (2016)
Jamal, T., Butt, S.A.: Malicious node analysis in MANETS. Int. J. Inform. Technol. 11, 859–867 (2018)
Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International Conference on Electrical and Information Technologies (ICEIT), 4–7 May 2016 (2016)
Desai, V., Shekokar, N.: Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In: IEEE Global Conference on Wireless Computing and Networking (GCWCN), pp. 138–143 (2014)
Noureldien, N.A., Saeed, S.K., Salih, M.A., Ahmed, A.M.: Survey of mobile ad hoc networks attacks and a new classification scheme. Br. J. Math. Comput. Sci. 8(1), 25–38 (2015)
Meher, R., Ladhe, S.: Review paper on flooding attack in MANET. Int. J. Eng. Res. Appl. 4(1, Version 2), 39–46 (2014)
Rishabh, J., Charul, D., Meenakshi: A survey of protocols and attacks in MANET Routing. Int. J. Comput. Sci. Manag. Stud. 12(3) (2012)
Panda, P., Gadnayak, K.K., Panda, N.: MANET attacks and their countermeasures: a survey. Int. J. Comput. Sci. Mob. Comput. 2(11), 319–330 (2013)
Alomari, E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49, 24–32 (2012)
Bhuvaneswari, R., Ramachandran, R.: Denial of service attack mitigation addressing all the security attributes in OLSR MANET. Int. J. Wirel. Mob. Comput. 15, 88–95 (2018)
Makani, R., Reddy, B.V.R.: Taxonomy of machine leaning based anomaly detection and its suitability. In: International Conference on Computational Intelligence and Data Science (ICCIDS) (2018)
Mitchell, R., Chen, I.-R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2014)
Sumit, S., Mitra, D., Gupta, D.: Proposed intrusion detection on ZRP based MANET by effective k-means clustering method of data mining. IEEE (2014)
Soni, M., Ahirwa, M., Agrawal, S.: A survey on intrusion detection techniques in MANET. In: International Conference on Computational Intelligence and Communication Networks (CICN), 12–14 December 2015 (2015)
Neethu, B.: Classification of intrusion detection dataset using machine learning approaches. Int. J. Electron. Comput. Sci. Eng. 1(3), 1044–1051 (2012)
Haq, N.F., Rafni, M., Onik, A.R., Shah, F.M., Hridoy, M.A.K., Farid, D.M.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Intell. (IJARAI) 4(3), 9–18 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Laqtib, S., El Yassini, K., Hasnaoui, M.L. (2020). Evaluation of Deep Learning Approaches for Intrusion Detection System in MANET. In: Ben Ahmed, M., Boudhir, A., Santos, D., El Aroussi, M., Karas, İ. (eds) Innovations in Smart Cities Applications Edition 3. SCA 2019. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-37629-1_71
Download citation
DOI: https://doi.org/10.1007/978-3-030-37629-1_71
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37628-4
Online ISBN: 978-3-030-37629-1
eBook Packages: EngineeringEngineering (R0)