Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network

A wireless ad-hoc network includes huge number of mobile nodes that structure temporary networks. Due to the dynamic nature of wireless ad-hoc network, security and efficient intrusion detection system (IDS) is a challenging task to detect the intruder nodes. The classification algorithm is used to detect the intrusions in an efficient manner. However, the network is characterized by high mobility they also introduce many vulnerabilities that increase their accurate detection risks. The optimization technique is performed to attain effective model for intrusion detection. But, the IDS continuously use additional resources to monitoring intruder activity in the network. In order to overcome the above issues in wireless ad-hoc network, Simulated Annealing based Naive Bayes Classifier (SA-NBC) technique is proposed for Anomaly Intrusion Detection. An anomaly-based intrusion detection system is used to detect the network intrusions and monitoring network activities in an exact manner. At first, the optimal features are chosen for classifying and detecting the intrusion by means of Simulated Annealing (SA) method when performing packet transmission. Based on these selected features, the accuracy and efficiency of traffic pattern analysis is improved using intrusion detection. Next, the Naive Bayes classifier is employed to classify the attack depends on features to identify the malicious behavior accurately from normal node in a testing environment by using the Bayes theorem. This in turns, the network traffic is minimized and increases the accuracy of anomaly intrusion detection. The SA-NBC technique conducts the simulations work on parameters such as anomaly intrusion detection accuracy, execution time, and throughput. The simulation results demonstrate that the SA-NBC technique is able to improve the accuracy of intrusion detection and also improves the throughput when compared to state-of-the-art works.

[1]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[3]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[4]  Georgios Kambourakis,et al.  TermID: a distributed swarm intelligence-based approach for wireless intrusion detection , 2017, International Journal of Information Security.

[5]  Tarek R. Sheltami,et al.  A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs , 2014, J. Ambient Intell. Humaniz. Comput..

[6]  Arputharaj Kannan,et al.  An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques , 2011 .

[7]  Saliha Buyukcorak,et al.  Hybrid Intrusion Detection System for DDoS Attacks , 2016, J. Electr. Comput. Eng..

[9]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[10]  Pauri Garhwal,et al.  Taxonomy on Security Attacks on Self Configurable Networks , 2014 .

[11]  V. N. Tiwari,et al.  A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs , 2016, Int. J. Netw. Secur..

[12]  Ing-Ray Chen,et al.  Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.

[13]  A. Damodaram,et al.  Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes , 2014 .

[14]  Moawad I. Dessouky,et al.  Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code , 2016 .

[15]  Sharada Valiveti,et al.  Intrusion Detection Systems for the Availability Attacks in Ad-Hoc Networks , 2012 .

[16]  Srikanta Patnaik,et al.  Self Adaptive Intrusion Detection Technique Using Data Mining Concept in an Ad-hoc Network , 2016 .

[17]  Sushanta Karmakar,et al.  Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .

[18]  Christos Dimitrakakis,et al.  Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.

[19]  Peter Xiaoping Liu,et al.  Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.

[20]  P. Kavitha,et al.  Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier , 2016, Wirel. Networks.