A Trust Management Scheme for Intrusion Detection System in MANET using Weighted Naïve Bayes Classifier

A Trust Management Scheme for Intrusion Detection System in MANET using Weighted Naïve Bayes Classifier

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-2
Year of Publication : 2022
Authors : Fouziah Hamza, S. Maria Celestin Vigila
DOI :  10.14445/22315381/IJETT-V70I2P211

How to Cite?

Fouziah Hamza, S. Maria Celestin Vigila, "A Trust Management Scheme for Intrusion Detection System in MANET using Weighted Naïve Bayes Classifier," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 95-107, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I2P211

Abstract
The primary research considerations are the development of intrusion detection and preventing mobile ad hoc networks (MANET) techniques with an exact detection rate and energy consumption with low packet loss. Node energy and node mobility are two major optimization challenges in MANETs, in which nodes move insecurely in all directions, and the topology is constantly changing. A significant clustering is carried out by the Emperor Penguin Optimization (EPO) algorithm. The cluster head selection is processed using a fuzzy strategy with a genetic algorithm (GA). The motive of this work is to use a trust management method based on DempsterShafer (D-S) evidence theory to identify intrusion behaviour. In addition, the attack pattern classification using the weighted Naive-Bayes method reduces the complexity of the classification. The features are extracted from the recognized pattern and finally transferred to the classifier for classification. Learning complexities can be overcome during the classification process using the Social Spider Optimization (SSO) technique. The proposed mathematical model detects the intrusion based on the final trust score. The robustness of the proposed model is executed based on attack detection rate, energy usage, and throughput for detecting and isolating the intruder. According to simulation results, the proposed solution effectively reduces IDS traffic and overall energy usage while maintaining a high attack detection rate and throughput.

Keywords
Intrusion detection system (IDS), clustering, cluster head election, classification, weight optimization, security.

Reference
[1] E.A. Shams, and A. Rizaner, A novel support vector machine-based intrusion detection system for mobile ad hoc networks, Wireless Networks, 24(5) (2018) 1821-1829.
[2] K. Murugan, and P. Suresh, Efficient Anomaly Intrusion Detection Using Probabilistic Hybrid Techniques in Wireless Ad Hoc Network, IJ Network Security, 20(4) (2018)730-737.
[3] K.P. Kumar, and B.R. Prasad Babu, A Simple and Cost-Effective Anomaly Detection Paradigm on the Basis of Computational Intelligence for Mobile Ad-Hoc Networks from a Security Viewpoint, In Computer Science On-line Conference, Springer, Cham, (2019) 78-86.
[4] H. Vegda, and N. Modi, Secure and Efficient Approach to Prevent Ad Hoc Network Attacks Using Intrusion Detection System, In Second International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, (2018) 129-133.
[5] R.K. Kovarasan, and M. Rajkumar, An Effective Intrusion Detection System Using Flawless Feature Selection, Outlier Detection and Classification, In Progress in Advanced Computing and Intelligent Engineering, Springer, Singapore, (2019) 203-213.
[6] P. Pandey, and A. Barve, An Energy-Efficient Intrusion Detection System for MANET, In Data, Engineering and Applications, Springer, Singapore, pp.103-117, 2019.
[7] A.M. Desai, and R.H. Jhaveri, Secure routing in mobile ad hoc networks, a predictive approach, International Journal of Information Technology, (2018) 1-12.
[8] G. Vaseer, G. Ghai, and D. Ghai, Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks, A Single-and Multiattack Case Study, IEEE Consumer Electronics Magazine, 8(3) (2019) 35-39.
[9] T. Poongodi, and M. Karthikeyan, Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks, Wireless Personal Communications, 90(2) (2016) 1039-1050.
[10] A. Lupia, and FD. Rango, Trust management using probabilistic energy-aware monitoring for intrusion detection in mobile ad-hoc networks, In 2016 Wireless Telecommunications Symposium (WTS) IEEE, (2016) 1-6.
[11] M. Bouhaddi, K. Adi, and M.S. Radjef, Evolutionary game-based defence mechanism in the manets, In Proceedings of the 9th International Conference on Security of Information and Networks, ACM, (2016) 88–95.
[12] T. Spyridopoulos, G. Karanikas, T. Tryfonas, and G. Oikonomou, A game-theoretic defence framework against dos/ddos cyber-attacks, Computers & Security, 38 (2013) 39–50.
[13] B. Subba, S. Biswas, and S. Karmakar, Intrusion detection in Mobile Ad-hoc Networks, Bayesian game formulation, Engineering Science and Technology, an International Journal, 19(2) (2016).782-799.
[14] D. Fudenberg, J. Tirole, Game Theory, Cambridge, Massachusetts. ISBN, 9780262061414. (1991).
[15] A. Nadeem, K. Ahsan, and M. Sarim, Illustration, Detection & Prevention of Sleep Deprivation Anomaly in Mobile Ad Hoc Networks, Mehran University Research Journal of Engineering and Technology, 36(2) (2017) 233-242.
[16] A.A. Korba, M. Nafaa, and Y. Ghamri-Doudane, Anomaly-based intrusion detection system for ad hoc networks, In 2016 7th International Conference on the Network of the Future (NOF), IEEE, (2016) 1-3.
[17] NJ. Patel, and R.H. Jhaveri, Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network, A survey, In 2015 International Conference on Signal Processing and Communication Engineering Systems, IEEE, (2015) 468-472.
[18] S. Sankaranarayanan, and G. Murugaboopathi, Secure intrusion detection system in mobile ad hoc networks using RSA algorithm, In 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), IEEE, (2017) 354-357.
[19] A. Chaudhary, V.N. Tiwari, and A. Kumar, A cooperative intrusion detection system for sleep deprivation attack using neuro-fuzzy classifier in mobile ad hoc networks, In Computational Intelligence in Data Mining-Volume Springer, New Delhi, 2 (2015) 345-353.
[20] R.S. Krishnan, E.G. Julie, Y.H. Robinson, R. Kumar, T.A. Tuan, and H.V. Long, Modified zone-based intrusion detection system for security enhancement in mobile ad hoc networks, Wireless Networks, 26(2) (2020) 1275-1289, 2020.
[21] D. Singh, and S. Bedi, Trust aware intrusion detection system based on a cluster, International Journal of Computer Applications, 131(7) (2015) 7-13.
[22] N. Veeraiah, and BT. Krishna, An approach for optimal-secure multipath routing and intrusion detection in MANET, Evolutionary Intelligence, (2020) 1-15.
[23] M. Islabudeen, and K. Devi, A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks, Wireless Personal Communications, 112(1) (2020) 193-224.
[24] N. Lal, S. Kumar, A. Saxena, and V.K. Chaurasiya, Detection of malicious node behaviour via I-watchdog protocol in mobile ad hoc network with DSDV routing scheme, Procedia Computer Science, 49 (2015) .264–273.
[25] J.M. Chang, P.C. Tsou, I. Woungang, H.C. Chao, and C.F. Lai, Defending against collaborative attacks by malicious nodes in MANETs, A cooperative bait detection approach. IEEE Syst. J, 9(1) (2015) 65–75.
[26] M. Poongodi, S. Bose, Design of Intrusion Detection and Prevention System (IDPs) using DGSOTFC in collaborative protection networks, In Advanced Computing (ICoAC), Fifth International Conference on IEEE, (2013).
[27] M. Poongodi, S. Bose, N. Ganesh Kumar, The effective intrusion detection system using optimal feature selection algorithm, Int. J. Enterp. Netw. Manag. Forth Comingissue, http,//www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijenm. (2015).
[28] C. Manikopoulos, S. Papavassiliou, Network intrusion and fault detection, a statistical anomaly approach. Telecommunications network security, IEEE Commun. Mag, vol. 40 no. 10 (2002) 76–82.
[29] E. Aivaloglou, S. Gritzalis, Hybrid trust and reputation management for sensor networks, Wirel. Netw, 16(5) (2010) 1493–1510.
[30] F. Luo, L. Khan, F. Bastani, I.L. Yen, J. Zhou, A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles, Bioinformatics, 20 (2004) 2605–2617.
[31] J. Dopazo, J. Carazo, Phylogenetic reconstruction using an unsupervised growing neural network that adopts the topology of a phylogenetic tree, J. Mol. Evol, 44 (1997) 226–233.
[32] F. Heylighen, The science of self-organization and adaptivity. In, Kiel, L.D. (ed.) Knowledge Management, Organizational Intelligence and Learning, and Complexity, In The Encyclopedia of Life Support Systems (EOLSS). Eolss Publishers, Oxford. http,//www. eolss.net, (2001).
[33] F. Heylighen, Complexity and self-organization, In Bates, M.J., Maack, M.N. Encyclopedia of Library and Information Sciences, CRC Press, Boca Raton, (2009).
[34] MS. Oswaldo Aguirre, H. Taboada, A clustering method based on dynamic self-organizing trees for post-Pareto optimality analysis, Sciverse Science Direct, Procedia Computer Science, Conference Organized by Missouri University of Science and Technology 2011- Chicago, IL, 6 (2011) 195– 200.
[35] X. Li, F. Zhou, J. Du, LDTS, a lightweight and dependable trust system for clustered wireless sensor networks, In IEEE Transactions on Information Forensics and Security, (2013) 451–551.
[36] F. Bao, I.R. Chen, M.J. Chang, J.H. Cho, Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection, IEEE Trans. Netw. Serv. Manag, 9(2) 169–1832012.
[37] S. Sett, P.K. Thakurta, Effect of optimal cluster head placement in MANET through multi-objective GA, In2015 International Conference on Advances in Computer Engineering and Applications IEEE, (2015) 832-837.
[38] F. Hamza, S.M.C. Vigila, Review of Machine Learning-Based Intrusion Detection Techniques for MANETs, In Peng SL., Dey N., Bundele M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, Springer, Singapore, 75(1) (2019) 367-374.
[39] F. Hamza & S.M.C. Vigila, Cluster Head Selection Algorithm for MANETs Using Hybrid Particle Swarm Optimization-Genetic Algorithm, International Journal of Computer Networks and Applications (IJCNA), 8(2) (2021) 119-129.
[40] F. Hamza and S.M.C. Vigila, Integrated Elephant Herd Optimization and Reputation Signaling Game for efficient Intrusion Detection in Mobile Ad hoc Networks. Design Engineering, (2021) 12946-12966.
[41] K. Spurthi, T.N.Shankar, An Improved Zone Routing Protocol For Secure And Efficient Energy Management International Journal of Engineering Trends and Technology, 69(1) 29-34.
[42] M.A. Hussain, B. Duraisamy, Review on Packet drop prevention in MANET by counter-based digester ACK International Journal of Engineering Trends and Technology, 68(8) 102-107.
[43] M. Tahboush, M. Agoyi, A. Esaid, Multistage Security Detection in Mobile Ad-Hoc Network (MANET) International Journal of Engineering Trends and Technology, 68(11) 97-104.