Detection of Data imbalance in MANET network based on ADSY-AEAMBi-LSTM with DBO Feature selection
Abstract
A Mobile Ad Hoc Network (MANET) is a temporary wireless network formed by mobile nodes. These nodes cooperate to relay information in a multi-hop fashion, but some malicious nodes can disrupt the network by providing false routing information. Traditional firewalls and encryption methods can’t keep up with the increasing diversity of network threats. To address these issues, Intrusion Detection Systems (IDS) have been developed. In this paper, a new intrusion detection framework named ADSY-AEAMBi-LSTM is introduced. This acronym stands for a bidirectional Long Short-Term Memory (LSTM) model and an adaptive synthetic auto-encoder attention mechanism. The Dung Beetle Optimizer is used to identify optimal features after data preprocessing, followed by classification using ADSY-AEAMBi-LSTM. The study evaluates this model using three datasets: CIC-IDS 2017, UNSW-NB15, and WSN-DS.
Keywords
Full Text:
PDFReferences
1. Sun P, Liu P, Li Q, et al. DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System. Security and Communication Networks. 2020, 2020: 1-11. doi: 10.1155/2020/8890306
2. Alkahtani H, Aldhyani THH. Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms. Uddin MI, ed. Complexity. 2021, 2021: 1-18. doi: 10.1155/2021/5579851
3. Edeh DI. Network intrusion detection system using deep learning technique. M.S. thesis. Dept. Comput, University of Turku, 2021. Turku, Finland. 683..
4. Jabbar MA, Aluvalu R, Reddy S SS. RFAODE: A Novel Ensemble Intrusion Detection System. Procedia Computer Science. 2017, 115: 226-234. doi: 10.1016/j.procs.2017.09.129
5. Dattatraya KN, Rao KR. Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN. Journal of King Saud University - Computer and Information Sciences. 2022, 34(3): 716-726. doi: 10.1016/j.jksuci.2019.04.003
6. Sharief Shaik M, Mira F. A Comprehensive Mechanism of MANET Network Layer Based Security Attack Prevention. International Journal of Wireless and Microwave Technologies. 2020, 10(1): 38-47. doi: 10.5815/ijwmt.2020.01.04
7. Kantipudi MP, Aluvalu R, Velamuri S. An Intelligent Approach of Intrusion Detection in Mobile Crowd Sourcing Systems in the Context of IoT Based SMART City. Smart Science. 2022, 11(1): 234-240. doi: 10.1080/23080477.2022.2117889
8. Hussain K, Hussain SJ, Jhanjhi N, et al. SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET. 2019 International Conference on Computer and Information Sciences (ICCIS). Published online April 2019. doi: 10.1109/iccisci.2019.8716416
9. N S, Archana KS. Performance Analysis of Machine Learning-based Detection of Sinkhole Network Layer Attack in MANET. International Journal of Advanced Computer Science and Applications. 2022, 13(12). doi: 10.14569/ijacsa.2022.0131262
10. Aluvalu R, Kumaran V. N. S, Thirumalaisamy M, Basheer S, Ali aldhahri E, Selvarajan S. Efficient data transmission on wireless communication through a privacy-enhanced blockchain process. PeerJ Computer Science. 2023, 9: e1308. doi: 10.7717/peerj-cs.1308
11. Benmeziane H. Comparison of deep learning frameworks and compilers. M.S. thesis. 2022. Computer Science Department, École NationaleSuperieured’Informatique. Oued Smar, Algeri.
12. Laqtib S, Yassini KE, Hasnaoui ML. A deep learning methods for intrusion detection systems based machine learning in MANET. Proceedings of the 4th International Conference on Smart City Applications. Published online October 2, 2019. doi: 10.1145/3368756.3369021
13. Venkatasubramanian S. Multistage Optimized Fuzzy Based Intrusion Detection protocol for NIDS in manet. Internation al journal of innovative research in technology. 2021; 8(6): pp.301-311.
14. Meddeb R, Jemili F, Triki B, et al. A Deep Learning based Intrusion Detection Approach for MANET. Published online August 30, 2022. doi: 10.21203/rs.3.rs-1349334/v1
15. Prashanth SK, Iqbal H, Illuri B. An Enhanced Grey Wolf Optimisation–Deterministic Convolutional Neural Network (GWO–DCNN) Model-Based IDS in MANET. Journal of Information & Knowledge Management. 2023, 22(04). doi: 10.1142/s0219649223500107
16. Prasad M, Tripathi S, Dahal K. An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks. Engineering Applications of Artificial Intelligence. 2023, 119: 105760. doi: 10.1016/j.engappai.2022.105760
17. Ponnusamy V, Humayun M, Z. Jhanjhi N, Yichiet A, Fahhad Almufareh M. Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks. Computer Systems Science and Engineering. 2022, 40(3): 1199-1215. doi: 10.32604/csse.2022.018518
18. Sbai O, Elboukhari M. Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks. IAES International Journal of Artificial Intelligence (IJ-AI). 2022, 11(3): 878. doi: 10.11591/ijai.v11.i3.pp878-885
19. Ali Abbood Z, Çağdaş Atilla D, Aydin Ç. Intrusion Detection System Through Deep Learning in Routing MANET Networks. Intelligent Automation & Soft Computing. 2023, 37(1): 269-281. doi: 10.32604/iasc.2023.035276
20. Ninu SB. An intrusion detection system using Exponential Henry Gas Solubility Optimization based Deep Neuro Fuzzy Network in MANET. Engineering Applications of Artificial Intelligence. 2023, 123: 105969. doi: 10.1016/j.engappai.2023.105969
21. Halbouni A, Gunawan TS, Habaebi MH, et al. Machine Learning and Deep Learning Approaches for CyberSecurity: A Review. IEEE Access. 2022, 10: 19572-19585. doi: 10.1109/access.2022.3151248
22. Halbouni A, Gunawan TS, Habaebi MH, et al. CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System. IEEE Access. 2022, 10: 99837-99849. doi: 10.1109/access.2022.3206425
23. Xue J, Shen B. Dung beetle optimizer: a new meta-heuristic algorithm for global optimization. The Journal of Supercomputing. 2022, 79(7): 7305-7336. doi: 10.1007/s11227-022-04959-6
24. Available online:https://www.jeremyjordan.me/content/images/2018/03/Screen-Shot-2018-03-06-at-3.17.13-PM.png (accessed on 2 December 2023).
25. Fu Y, Du Y, Cao Z, et al. A Deep Learning Model for Network Intrusion Detection with Imbalanced Data. Electronics. 2022, 11(6): 898. doi: 10.3390/electronics11060898
26. Gui Z, Sun Y, Yang L, et al. LSI-LSTM: An attention-aware LSTM for real-time driving destination prediction by considering location semantics and location importance of trajectory points. Neurocomputing. 2021, 440: 72-88. doi: 10.1016/j.neucom.2021.01.067
27. Available online:https://ai2-s2-public.s3.amazonaws.com/figures/2017808/f7bdb849dafe17c952bfd88b879e01f 74cf59d78/4-Figure3-1.png (accessed on 2 December 2023).
DOI: https://doi.org/10.32629/jai.v7i4.1094
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Venkatasubramanian Srinivasan, Vijilius Helena Raj, Arunadevi Thirumalraj, Kavitha Nagarathinam
License URL: https://creativecommons.org/licenses/by-nc/4.0/