banner

Detection of Data imbalance in MANET network based on ADSY-AEAMBi-LSTM with DBO Feature selection

Venkatasubramanian Srinivasan, Vijilius Helena Raj, Arunadevi Thirumalraj, Kavitha Nagarathinam

Abstract


A Mobile Ad Hoc Network (MANET) is a temporary wireless network formed by mobile nodes. These nodes cooperate to relay information in a multi-hop fashion, but some malicious nodes can disrupt the network by providing false routing information. Traditional firewalls and encryption methods can’t keep up with the increasing diversity of network threats. To address these issues, Intrusion Detection Systems (IDS) have been developed. In this paper, a new intrusion detection framework named ADSY-AEAMBi-LSTM is introduced. This acronym stands for a bidirectional Long Short-Term Memory (LSTM) model and an adaptive synthetic auto-encoder attention mechanism. The Dung Beetle Optimizer is used to identify optimal features after data preprocessing, followed by classification using ADSY-AEAMBi-LSTM. The study evaluates this model using three datasets: CIC-IDS 2017, UNSW-NB15, and WSN-DS.


Keywords


mobile ad-hoc network; intrusion detection; dung beetle optimizer; attention mechanism; bidirectional long short-term memory

Full Text:

PDF

References


1. Sun P, Liu P, Li Q, et al. DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System. Security and Communication Networks. 2020, 2020: 1-11. doi: 10.1155/2020/8890306

2. Alkahtani H, Aldhyani THH. Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms. Uddin MI, ed. Complexity. 2021, 2021: 1-18. doi: 10.1155/2021/5579851

3. Edeh DI. Network intrusion detection system using deep learning technique. M.S. thesis. Dept. Comput, University of Turku, 2021. Turku, Finland. 683..

4. Jabbar MA, Aluvalu R, Reddy S SS. RFAODE: A Novel Ensemble Intrusion Detection System. Procedia Computer Science. 2017, 115: 226-234. doi: 10.1016/j.procs.2017.09.129

5. Dattatraya KN, Rao KR. Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN. Journal of King Saud University - Computer and Information Sciences. 2022, 34(3): 716-726. doi: 10.1016/j.jksuci.2019.04.003

6. Sharief Shaik M, Mira F. A Comprehensive Mechanism of MANET Network Layer Based Security Attack Prevention. International Journal of Wireless and Microwave Technologies. 2020, 10(1): 38-47. doi: 10.5815/ijwmt.2020.01.04

7. Kantipudi MP, Aluvalu R, Velamuri S. An Intelligent Approach of Intrusion Detection in Mobile Crowd Sourcing Systems in the Context of IoT Based SMART City. Smart Science. 2022, 11(1): 234-240. doi: 10.1080/23080477.2022.2117889

8. Hussain K, Hussain SJ, Jhanjhi N, et al. SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET. 2019 International Conference on Computer and Information Sciences (ICCIS). Published online April 2019. doi: 10.1109/iccisci.2019.8716416

9. N S, Archana KS. Performance Analysis of Machine Learning-based Detection of Sinkhole Network Layer Attack in MANET. International Journal of Advanced Computer Science and Applications. 2022, 13(12). doi: 10.14569/ijacsa.2022.0131262

10. Aluvalu R, Kumaran V. N. S, Thirumalaisamy M, Basheer S, Ali aldhahri E, Selvarajan S. Efficient data transmission on wireless communication through a privacy-enhanced blockchain process. PeerJ Computer Science. 2023, 9: e1308. doi: 10.7717/peerj-cs.1308

11. Benmeziane H. Comparison of deep learning frameworks and compilers. M.S. thesis. 2022. Computer Science Department, École NationaleSuperieured’Informatique. Oued Smar, Algeri.

12. Laqtib S, Yassini KE, Hasnaoui ML. A deep learning methods for intrusion detection systems based machine learning in MANET. Proceedings of the 4th International Conference on Smart City Applications. Published online October 2, 2019. doi: 10.1145/3368756.3369021

13. Venkatasubramanian S. Multistage Optimized Fuzzy Based Intrusion Detection protocol for NIDS in manet. Internation al journal of innovative research in technology. 2021; 8(6): pp.301-311.

14. Meddeb R, Jemili F, Triki B, et al. A Deep Learning based Intrusion Detection Approach for MANET. Published online August 30, 2022. doi: 10.21203/rs.3.rs-1349334/v1

15. Prashanth SK, Iqbal H, Illuri B. An Enhanced Grey Wolf Optimisation–Deterministic Convolutional Neural Network (GWO–DCNN) Model-Based IDS in MANET. Journal of Information & Knowledge Management. 2023, 22(04). doi: 10.1142/s0219649223500107

16. Prasad M, Tripathi S, Dahal K. An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks. Engineering Applications of Artificial Intelligence. 2023, 119: 105760. doi: 10.1016/j.engappai.2022.105760

17. Ponnusamy V, Humayun M, Z. Jhanjhi N, Yichiet A, Fahhad Almufareh M. Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks. Computer Systems Science and Engineering. 2022, 40(3): 1199-1215. doi: 10.32604/csse.2022.018518

18. Sbai O, Elboukhari M. Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks. IAES International Journal of Artificial Intelligence (IJ-AI). 2022, 11(3): 878. doi: 10.11591/ijai.v11.i3.pp878-885

19. Ali Abbood Z, Çağdaş Atilla D, Aydin Ç. Intrusion Detection System Through Deep Learning in Routing MANET Networks. Intelligent Automation & Soft Computing. 2023, 37(1): 269-281. doi: 10.32604/iasc.2023.035276

20. Ninu SB. An intrusion detection system using Exponential Henry Gas Solubility Optimization based Deep Neuro Fuzzy Network in MANET. Engineering Applications of Artificial Intelligence. 2023, 123: 105969. doi: 10.1016/j.engappai.2023.105969

21. Halbouni A, Gunawan TS, Habaebi MH, et al. Machine Learning and Deep Learning Approaches for CyberSecurity: A Review. IEEE Access. 2022, 10: 19572-19585. doi: 10.1109/access.2022.3151248

22. Halbouni A, Gunawan TS, Habaebi MH, et al. CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System. IEEE Access. 2022, 10: 99837-99849. doi: 10.1109/access.2022.3206425

23. Xue J, Shen B. Dung beetle optimizer: a new meta-heuristic algorithm for global optimization. The Journal of Supercomputing. 2022, 79(7): 7305-7336. doi: 10.1007/s11227-022-04959-6

24. Available online:https://www.jeremyjordan.me/content/images/2018/03/Screen-Shot-2018-03-06-at-3.17.13-PM.png (accessed on 2 December 2023).

25. Fu Y, Du Y, Cao Z, et al. A Deep Learning Model for Network Intrusion Detection with Imbalanced Data. Electronics. 2022, 11(6): 898. doi: 10.3390/electronics11060898

26. Gui Z, Sun Y, Yang L, et al. LSI-LSTM: An attention-aware LSTM for real-time driving destination prediction by considering location semantics and location importance of trajectory points. Neurocomputing. 2021, 440: 72-88. doi: 10.1016/j.neucom.2021.01.067

27. Available online:https://ai2-s2-public.s3.amazonaws.com/figures/2017808/f7bdb849dafe17c952bfd88b879e01f 74cf59d78/4-Figure3-1.png (accessed on 2 December 2023).




DOI: https://doi.org/10.32629/jai.v7i4.1094

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Venkatasubramanian Srinivasan, Vijilius Helena Raj, Arunadevi Thirumalraj, Kavitha Nagarathinam

License URL: https://creativecommons.org/licenses/by-nc/4.0/