A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs

نویسندگان

  • Alka Chauhary
  • V. N. Tiwari
  • Anil Kumar Dahiya
چکیده

Due to the advancement in communication technologies, mobile ad hoc networks are very attractive in terms of communication because mobile nodes can communicate without the relay on predefined infrastructure. Therefore, some complex properties of mobile ad hoc networks make it more vulnerable to internal and external attacks. From the security perspective, prevention based methods such as encryption and authentication are not considerably good solution for mobile ad hoc networks to eliminate the attacks so that intrusion detection systems are applied as a keystone in these types of networks. The main objective of intrusion detection system is to categories the normal and suspicious activities in the network. This paper proposed a novel intrusion detection system based on soft computing techniques for mobile ad hoc networks. The proposed system is based on neuro-fuzzy classifier in binary form to detect, one of vey possible attack, i.e. packet dropping attack in mobile ad hoc networks. Qualnet Simulator 6.1 and MatLab toolbox are used to visualize the proposed scenarios and evaluate the performance of proposed approach in mobile ad hoc networks. Simulation results show that the proposed soft computing based approach efficiently detect the packet dropping attack with high true positive rate and low false positive rate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers

An intrusion detection system’s main goal is to classify activities of a system into two major categories: normal and suspicious (intrusive) activities. Intrusion detection systems usually specify the type of attack or classify activities in some specific groups. The objective of this paper is to incorporate several soft computing techniques into the classifying system to detect and classify in...

متن کامل

An Elliptic Curve Cryptography Based Enhanced Adaptive Acknowledgment (ecc-eaack) Intrusion Detection System

MANET is a new wireless network technology increasingly used in many applications. These networks are more vulnerable to attacks than wired networks. Since they have different characteristics, conventional security techniques are not directly applicable to them. Intrusion detection system (IDS) is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. Researchers cu...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Novel Evaluation of ACK based IDS Techniques for Dropping Attack in MANETs using OMNET++ Simulator

Wireless networking is becoming one of the most important technologies nowadays, allowing users to get services and access information regardless of their location and allows users to communicate with each other wirelessly without depending on any fixed infrastructure. However, MANET works under an assumption that all nodes in the network are collaborating to forward packets which in fact isn't...

متن کامل

Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines

Intrusion Detection Systems (IDS) form a key part of system defence, where it identifies abnormal activities happening in a computer system. In recent years different soft computing based techniques have been proposed for the development of IDS. On the other hand, intrusion detection is not yet a perfect technology. This has provided an opportunity for data mining to make quite a lot of importa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016