CFP last date
20 January 2025
Reseach Article

A Literature Survey on Intrusion Detection System in Manets using Machine Learning Techniques

by Tarik Fouad Himdi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 26
Year of Publication: 2019
Authors: Tarik Fouad Himdi
10.5120/ijca2019919105

Tarik Fouad Himdi . A Literature Survey on Intrusion Detection System in Manets using Machine Learning Techniques. International Journal of Computer Applications. 178, 26 ( Jun 2019), 36-41. DOI=10.5120/ijca2019919105

@article{ 10.5120/ijca2019919105,
author = { Tarik Fouad Himdi },
title = { A Literature Survey on Intrusion Detection System in Manets using Machine Learning Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 26 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 36-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number26/30702-2019919105/ },
doi = { 10.5120/ijca2019919105 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:51:32.971586+05:30
%A Tarik Fouad Himdi
%T A Literature Survey on Intrusion Detection System in Manets using Machine Learning Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 26
%P 36-41
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Since, a decade of time Mobile Ad hoc Networks (MANETs) have come with wireless networking technology. Due to its dynamic in nature of MANETs, these are vulnerable to various attacks in all the OSI layers but research shows that in Network layer the attacks are effectively done by intruders. In this survey many of the attacks at Network layer are identified in MANETs by most of the researchers which is outlined in this paper. Mostly, AODV routing protocols and other protocols are used for transferring packets in the direction of the destination. These transferred packets data is then deposited within the log files, to surveillance these routing of packets from these Log files, the techniques used in MANETs are Data mining, Support Vector Machines (SVM), Genetic algorithms (GA) and other Machine learning approaches. Further, the methodologies and techniques proposed for detecting and predicting these attacks from various kinds of intrusions within the MANETS is discussed.

References
  1. Aumreesh Kumar, Saxena ,Sitesh Sinha, Piyush Shukla, “A Review on Intrusions Detection System in Mobile Ad-Hoc Network” Proceeding of International conference on Recent Innovations is Signal Processing and Embedded Systems (RISE - 2017), 27th – 29th October, IEEE, 2017.
  2. Mohamed Elboukhari, Mostafa Azizi and Abdelmalek Azizi “Intrusion Detection Systems in mobile ad hoc networks: A survey” 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS), Morocco, pp.136-141, November, IEEE, 2014.
  3. Sara Chadli, Mohamed Emharraf, Mohammed Saber and Abdelhak Ziyyat, “Combination of Hierarchical and Cooperative Models of an IDS for MANETs” Tenth International Conference on Signal-Image Technology and Internet-Based Systems, Morocco, pp. 230– 236, November, IEEE, 2014.
  4. Sayan Banerjee, Roshni Nandi, Rohan Dey and Himadri Nath Saha “A review on different Intrusion Detection Systems for MANET and itsvulnerabilities” International Conference and Workshop on Computing and Communication (IEMCON), India, pp. 1-7, October, IEEE, 2015.
  5. T. Poongothai and K. Duraiswamy “ Intrusion detection in mobile AdHoc networks using machine learning approach” International Conference on Information Communication and Embedded Systems (ICICES2014), India, pp. 1 - 5, February, IEEE, 2014..
  6. K. Pavani and A. Damodaram, “Intrusion detection using MLP for MANETs” Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), India, pp. 440 – 444, October, IEEE, 2013.
  7. Udaya Sampath K. Perera Miriya Thanthrige, Jagath Samarabandu, Xianbin Wang, “A Machine Learning Techniques for Intrusion Detection on Public Dataset”, in proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), IEEE, 2016.
  8. J. Canady and J. Harrell, “A comparative analysis of current intrusion detection technologies”, in Proceedings of the Fourth Technology for Information Security Conference, vol. 96. Cite seer, 1996.
  9. M. Salour and X. Su, “Dynamic two-layer signature-based ids with unequal databases”, in Information Technology, 2007. ITNG ’07.Fourth International Conference on, April pp.77–82, 2007,
  10. N.H. Saeed, M.F. Abbod, H.S. Al-Raweshidy Wireless Network and Communication Centre (WNCC) School of Engineering and Design Brunel University West London, Uxbridge,UK, IMAN: “An Intelligent MANET Routing System”
  11. Erick Peterson and Marco Antonio, “A Novel Online CEP Learning engine for MANET IDS”, published in IEEE 9th Latin-American Conference on Communications (LATINCOM), 2017.
  12. Samreen Banu, Kazi ,Mohammed Azharuddin Adhoni, “Secure IDS to detect Malevolent Node in MANETS”, International Conference on Electrical, Electronics and Optimization Techniques (ICEEOT), 2016
  13. .David B. Johnson David A. Maltz Josh Broch, “DSR: “The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, ACM, 2001.
  14. Yong guang Zhang, “Intrusion Detection In Wireless Adhoc networks”, In proceedings of the 6th annual international conference on Mobile computing and networking, pp. 275-283, ACM, 2000.
  15. Adnan Nadeem, and Michael P. Howarth, “A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks”, IEEE Communications Surveys & Tutorials, Vol. 15, Issue 4, 2013.
  16. IETF Mobile Adhoc Networks Working Group (MANET), IETF Website, www. Ietf.org/dyn/wg/charter/manet-charter.html.
  17. IETF Ad-Hoc Networks Autoconfigurations (autoconf) Working Group, IETF website http://datatracker.ietf.org/wg/autoconf/charte/.
  18. IEEE Std 802.11-2007, IEEE standard for information technology- Telecommunication and information exchange between systems- Local and metropolitan area network-Specific requirement, Part 11 Wireless LAN medium access control and physical layer specifications, June 2007.
  19. S.KurosawaandA.Jamalipour,“DetectingBlackholeAttackonAODV-based Mobile AdHoc Networks by Dynamic Learning method”, International Journal of Network Security, Vol.5, No.3, pp 338-345, November 2007.
  20. J.Sen, M.Chandra, S.G. Harihara, H.Reddy P.Balamuralidhar, “A Mechanism for Detection of Gray Hole Attacks in Mobile Ad Hoc Networks”, Proc. IEEE International Conference on Information Communication and Signal Processing ICICS, Singapore, Dec.2007.
  21. C.Piro, C.Shields and B.Levine, “Detecting the Sybil Attack in Mobile Ad hoc Networks”, Proc. IEEE International Conference on Security and Privacy in Communication Networks, Aug-Sep.2006.
  22. J. Sen, M. Chandra, P. Balamurlidhar, S.G. Harihara and H.Reddy, “A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad hoc Networks”, Proc. IEEE Conference on Telecommunication and Malaysian International Conference on Communication (ICT-MICC), 2007.
  23. S. Marti, T.J. Giuli, K.Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Proc. International Conference on Mobile Computing and Networking, pp. 255- 265, 2000.
  24. S.B.LeeandY.H.Choi,“ A Resilient Packet Forwarding Scheme against Maliciously Packet Dropping Nodes in Sensor Networks”, Proc. ACM workshop on Security of Ad Hoc and Sensor Networks (SANS2006),pp59-70, USA, Oct. 2006.
  25. O.F. Gonzalez-Duque, M. Howarth and G. Pavlou, “Detection of Packet Forwarding Misbehavior in Mobile Ad hoc Networks”, Proc. International Conference on Wired/Wireless Internet Communications (WWIC 2007), pp 302-314, Portugal, June 2007.
  26. K. Pavani and A. Damodaram “Intrusion detection using MLP for MANETs” Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), India, pp. 440 – 444, October-2013.
  27. Oscar F. Gonzalez, Godwin Ansa, Michael Howarth, and George Pavlou” Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks” Journal of internet engineering, VOL. 2, NO. 1, June2008
  28. Sunilkumar S. Manvia , Lokesh B. Bhajantrib , and Vittalkumar K. Vaggac” Routing Misbehavior Detection in MANETs Using 2ACK”Journal of telecommunications and information technology,2010.
  29. Hao Yang, James Shu, Xiaoqiao Meng, Songwu Lu” SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks”. : IEEE Journal on Selected Areas in Communications (Volume: 24 , Issue: 2 , Feb. 2006 ).
  30. N. Soganile1 , T. Baletlwa2 , and B. Moyo2” Hybrid Watchdog and Pathrater algorithm for improved security in Mobile Ad Hoc Networks” Int'l Conf. Wireless Networks ICWN'15 .
  31. Nitin Goyal , Alka Gaba “A review over MANET- Issues and Challenges” International Journal of Enhanced Research in Management & Computer Applications, ISSN: 2319-7471 Vol. 2, Issue 4, April-2013, pp: (16-28), Available online at: www.erpublications.com.
  32. Saravanan Kumarasamy , Hemalatha B and Hashini P “Cluster Based cost efficient intrusion detection system for MANET” arXiv preprint arXiv:1311.1446,2013.
  33. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” Proceedings of the 6th International Conference on Mobile Computing and Networking, MobiCom 2000, pp. 275-283, August 2000.
  34. P. Yi, Y. Jiang, Y. Zhong and S. Zhang, “Distributed Intrusion Detection for Mobile Ad Hoc Networks”, Proc. IEEE Application and Internet Workshop, 2005
  35. A.B.Smith,”An examination of intrusion detection architecture for wireless AdHoc networks”,Proc. National Colloquium for information system security education, May 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Adhoc Networks (MANETS) Intrusion Detection System (IDS) Support Vector Machines (SVM) Genetic algorithms (GA) Ad-hoc On-Demand Distance Vector (AODV).