AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (7.5 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Adaptive Marine Predator Optimization Algorithm (AOMA)–Deep Supervised Learning Classification (DSLC)based IDS framework for MANET security

Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai 600069, India
Department of Computer Science and Engineering, Saveetha School of Engineering, SIMATS, Chennai 602105, India
JNIAS School of Planning and Architecture, Hyderabad 500034, India
Department of Computer Science and Engineering, NPR College of Engineering and Technology, Natham Dindigul 624401, India
Department of Computer Science and Engineering, PSNA College of Engineering and Technology, Poolangulathupatti 620009, India
Department of Computer Science and Engineering, Sri Muthukumaran Institute of Technology, Chennai 600069, India
Department of Computer Science, Moulay Ismail University, Meknes 5003, Morocco
Show Author Information

Abstract

Due to the dynamic nature and node mobility, assuring the security of Mobile Ad-hoc Networks (MANET) is one of the difficult and challenging tasks today. In MANET, the Intrusion Detection System (IDS) is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular operation. Different machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of MANET. However, it still has significant flaws, including increased algorithmic complexity, lower system performance, and a higher rate of misclassification. Therefore, the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning models. Here, the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields, which increases the overall intrusion detection performance of classifier. Then, a novel Adaptive Marine Predator Optimization Algorithm (AOMA) is implemented to choose the optimal features for improving the speed and intrusion detection performance of classifier. Moreover, the Deep Supervise Learning Classification (DSLC) mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training operations. During evaluation, the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.

References

[1]

M. Prasad, S. Tripathi, and K. Dahal, A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network, Appl. Intell., vol. 53, no. 6, pp. 7169–7185, 2023.

[2]

C. Edwin Singh and S. M. Celestin Vigila, Fuzzy based intrusion detection system in MANET, Meas. Sens., vol. 26, p. 100578, 2023.

[3]

M. Prasad, S. Tripathi, and K. Dahal, An enhanced detection system against routing attacks in mobile ad-hoc network, Wirel. Netw., vol. 28, no. 4, pp. 1411–1428, 2022.

[4]

T. K. Jebuer, An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack, J. Discrete Math. Sci. Cryptogr., vol. 25, no. 8, pp. 2759–2764, 2022.

[5]

S. Ajjaj, S. El Houssaini, M. Hain, and M. A. El Houssaini, A new multivariate approach for real time detection of routing security attacks in VANETs, Information, vol. 13, no. 6, p. 282, 2022.

[6]

M. Prasad, S. Tripathi, and K. Dahal, An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks, Eng. Appl. Artif. Intell., vol. 119, p. 105760, 2023.

[7]
L. Legashev and L. Grishina, Development of an intrusion detection system prototype in mobile ad hoc networks based on machine learning methods, in Proc. 2022 Int. Russian Automation Conf. (RusAutoCon), Sochi, Russian, 2022, pp. 171–175.
[8]

M. Mayuranathan, S. K. Saravanan, B. Muthusenthil, and A. Samydurai, An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique, Adv. Eng. Softw., vol. 173, p. 103236, 2022.

[9]
S. Venkatasubramanian, A. Suhasini, and N. Lakshmi Kanthan, A sparrow search algorithm for detecting the cross-layer packet drop attack in mobile ad hoc network (MANET) environment, in Computer Networks, Big Data and IoT, A. P. Pandian, X. Fernando, and H. X. Wang, eds. Singapore: Springer, 2022.
[10]

M. M. Rathore, A. Ahmad, and A. Paul, Real time intrusion detection system for ultra-high-speed big data environments, J. Supercomput., vol. 72, no. 9, pp. 3489–3510, 2016.

[11]

X. Zhang, L. Jiao, A. Paul, Y. Yuan, Z. Wei, and Q. Song, Semisupervised particle swarm optimization for classification, Math. Probl. Eng., vol. 2014, pp. 1–11, 2014.

[12]
M. M. Rathore, A. Paul, A. Ahmad, S. Rho, M. Imran, and M. Guizani, Hadoop based real-time intrusion detection for high-speed networks, in Proc. 2016 IEEE Global Communications Conf. (GLOBECOM), Washington, DC, USA, 2016, pp. 1–6.
[13]
P. M. Manohar and D. V. Divakara Rao, Performance enhancement of DYMO routing protocol in MANETs using machine learning technique, in Smart Intelligent Computing and Applications, Volume 1, V. Bhateja, S. C. Satapathy, C. M. Travieso-Gonzalez, and T. Adilakshmi, eds. Singapore: Springer, 2022, pp. 463–470.
[14]

S. Gbetondji Michoagan, S. M. Mali, and S. Gore, Salient features selection techniques for instruction detection in mobile ad hoc networks, Teh. Glas, no. Online, pp. 40–46, 2022.

[15]

R. Rai, K. G. Dhal, A. Das, and S. Ray, An inclusive survey on marine predators algorithm: Variants and applications, Arch. Comput. Methods Eng., vol. 30, no. 5, pp. 3133–3172, 2023.

[16]
K. N. Venkata Ratna Kumar, R. Mahaveerakannan, C. M. Rao, P. N. Rao, and K. S. Rao, Intrusive detection of wormhole attack using cluster - based classification model in MANET, in Proc. 2022 8th Int. Conf. Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2022, pp. 1869–1874.
[17]
A. Ramkissoon and W. Goodridge, An ensemble based computational social system for fake news detection in MANET messaging, https://assets.researchsquare.com/files/rs-1208481/v1_covered.pdf?c=1643135268, 2022.
[18]
P. Satyanarayana, V. Nihani V G, A. Joshua Daniel G, A. Kumar Raju D V, and H. Sai Abhinaya C, Design and implementation of trust based routing algorithm to enhance QoS for MANETs, in Proc. 2022 Int. Conf. Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, India, 2022, pp. 64–68.
[19]

A. Mughaid, S. AlZu’bi, A. Alnajjar, E. AbuElsoud, S. El Salhi, B. Igried, and L. Abualigah, Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches, Multimed. Tools Appl., vol. 82, no. 9, pp. 13973–13995, 2023.

[20]

E. Gyamfi and A. Jurcut, Intrusion detection in Internet of Things systems: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets, Sensors, vol. 22, no. 10, p. 3744, 2022.

[21]

S. A. Asra, Security issues of vehicular ad hoc networks (VANET): A systematic review, TIERS Inf. Technol. J., vol. 3, no. 1, pp. 17–27, 2022.

[22]

S. Laqtib, K. El Yassini, and M. L. Hasnaoui, A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET, Int. J. Electr. Comput. Eng. IJECE, vol. 10, no. 3, p. 2701, 2020.

[23]

Z. Ali Khan and P. Herrmann, Recent advancements in intrusion detection systems for the Internet of Things, Secur. Commun. Netw., vol. 2019, pp. 1–19, 2019.

[24]

H. Moudni, M. Er-rouidi, H. Mouncif, and B. El Hadadi, Black Hole attack Detection using Fuzzy based Intrusion Detection Systems in MANET, Procedia Comput. Sci., vol. 151, no. C, pp. 1176–1181, 2019.

[25]

U. Ali Zardari, J. He, N. Zhu, K. H. Mohammadani, M. S. Pathan, M. I. Hussain, and M. Q. Memon, A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs, Future Internet, vol. 11, no. 3, pp. 1–17, 2019.

[26]
K. Rachid, R. Mohammed, and S. Omar, Intrusion detection system based M-best features selection in Manet, Models & Optim. Math. Anal. J., vol. 10, no. 1, pp. 20–25.
[27]
Z. Ali Abbood, D. C. Atilla, C. Aydin, and M. S. Mahmoud, A survey on intrusion detection system in ad hoc networks based on machine learning, in Proc. 2021 Int. Conf. Modern Trends in Information and Communication Technology Industry (MTICTI), Sana'a, Yemen, 2021, pp. 1–8.
[28]

M. Prasad, S. Tripathi, and K. Dahal, Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection, Comput. Secur., vol. 99, p. 102062, 2020.

[29]

R. M. Hadi, S. H. Abdullah, and W. M. S. Abedi, Proposed neural intrusion detection system to detect denial of service attacks in MANETs, Period. Eng. Nat. Sci. PEN, vol. 10, no. 3, p. 70, 2022.

[30]

R. Meddeb, F. Jemili, B. Triki, and O. Korbaa, A deep learning-based intrusion detection approach for mobile Ad-hoc network, Soft Comput. A Fusion Found. Methodol. Appl., vol. 27, no. 14, pp. 9425–9439, 2023.

[31]
S. Venkatasubramanian, Multistage optimized fuzzy based intrusion detection protocol for NIDS in MANET, https://ijirt.org/master/publishedpaper/IJIRT153276_PAPER.pdf, 2021.
[32]

J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider, and A. Wahab, A review of intrusion detection systems using machine and deep learning in Internet of Things: Challenges, solutions and future directions, Electronics, vol. 9, no. 7, p. 1177, 2020.

[33]
N. Venkateswaran and S. Prabaharan, An efficient neuro deep learning intrusion detection system for mobile adhoc networks, ICST Trans. Scalable Inf. Syst., p. 173781, 2018.
[34]
A. Paul, Graph based M2M optimization in an IoT environment, in Proc. 2013 Research in Adaptive and Convergent Systems, Montreal, Canada, 2013, pp. 45–46.
[35]

M. Ramezani, D. Bahmanyar, and N. Razmjooy, A new improved model of marine predator algorithm for optimization problems, Arab. J. Sci. Eng., vol. 46, no. 9, pp. 8803–8826, 2021.

[36]

D. S. A. Elminaam, A. Nabil, S. A. Ibraheem, and E. H. Houssein, An efficient marine predators algorithm for feature selection, IEEE Access, vol. 9, pp. 60136–60153, 2021.

[37]

A. Faramarzi, M. Heidarinejad, S. Mirjalili, and A. H. Gandomi, Marine predators algorithm: A nature-inspired metaheuristic, Expert Syst. Appl., vol. 152, p. 113377, 2020.

[39]
NSL-KDDNetwork Security, Information Security, Cyber Security. Available: https://www.kaggle.com/datasets/hassan06/nslkdd.
[40]
UNSW-NB15 Network Intrusion Detection, https://www.kaggle.com/datasets/dhoogla/unswnb15.
[41]

P. Kumar, G. P. Gupta, and R. Tripathi, Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks, Arab. J. Sci. Eng., vol. 46, no. 4, pp. 3749–3778, 2021.

[42]

Y. Farhaoui, Design and implementation of an intrusion prevention system, Int. J. Netw. Secur., vol. 19, no. 5, pp. 675–683, 2017.

[43]
Editorial, Big Data Mining and Analytics, vol. 6, no. 3, pp. i-ii, 2023.
[44]

Y. Farhaoui, Intrusion prevention system inspired immune systems, Indones. J. Electr. Eng. Comput. Sci., vol. 2, no. 1, p. 168, 2016.

[45]
Y. Farhaoui, Big data analytics applied for control systems, in Lecture Notes in Networks and Systems. Cham, Switzerland: Springer, 2017, pp. 408–415.
[46]
Editorial, Big Data Mining and Analytics, vol. 5, no. 4, pp. i-ii, 2022.
[47]

S. S. Alaoui, Y. Farhaoui, and B. Aksasse, Hate speech detection using text mining and machine learning, Int. J. Decis. Support. Syst. Technol., vol. 14, no. 1, pp. 1–20, 2022.

[48]

S. S. Alaoui, Y. Farhaoui, and B. Aksasse, Data openness for efficient e-governance in the age of big data, Int. J. Cloud Comput., vol. 10, no. 5/6, p. 522, 2021.

[49]
A. El Mouatasim and Y. Farhaoui, Nesterov step reduced gradient algorithm for convex programming problems, in Big Data and Networks Technologies, Y. Farhaoui, ed. Cham, Switzerland: Springer, 2019, pp. 140–148.
[50]
S. Sossi Alaoui, Y. Farhaoui, and B. Aksasse, A comparative study of the four well-known classification algorithms in data mining, in Lecture Notes in Networks and Systems, J. Kacprzyk, ed. Cham, Switzerland: Springer, 2017, pp. 362–373.
[51]

Y. Farhaoui, Securing a local area network by IDPS open source, Procedia Comput. Sci., vol. 110, pp. 416–421, 2017.

Intelligent and Converged Networks
Pages 1-18
Cite this article:
Sheela MS, Soundari AG, Mudigonda A, et al. Adaptive Marine Predator Optimization Algorithm (AOMA)–Deep Supervised Learning Classification (DSLC)based IDS framework for MANET security. Intelligent and Converged Networks, 2024, 5(1): 1-18. https://doi.org/10.23919/ICN.2024.0001

504

Views

47

Downloads

0

Crossref

0

Scopus

Altmetrics

Received: 29 January 2023
Revised: 03 July 2023
Accepted: 20 August 2023
Published: 28 March 2024
© All articles included in the journal are copyrighted to the ITU and TUP.

This work is available under the CC BY-NC-ND 3.0 IGO license:https://creativecommons.org/licenses/by-nc-nd/3.0/igo/

Return