Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1090))

Abstract

The mobile ad hoc networks (MANETs) had move towards the wireless networking technology. Due to its dynamic nature MANETs face the challenges towards critical attacks in OSI layers but research shows that in network layer the attacks are effectively done by intruders. In this survey, many of the attacks at network layer are identified in MANETs by most of the researchers which are outlined in this paper. Mostly, AODV routing protocols and other protocols are used for transferring packets to the destination. The communicated packets information is accumulated in the log files, to surveillance these routing of packets from these log files, the techniques used in MANETs are data mining, support vector machines (SVM), genetic algorithms (GA) and other machine-learning approaches. Further, the methodologies and techniques proposed for detecting and predicting these attacks from various kinds of intrusions within the MANETS are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Elboukhari, Mohamed, Mostafa Azizi, and Abdelmalek Azizi. 2014. Intrusion Detection Systems in Mobile Ad Hoc Networks: A Survey. In 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS), IEEE, 136–141, Morocco, Nov 2014.

    Google Scholar 

  2. Chadli, Sara, Mohamed Emharraf, Mohammed Saber, and Abdelhak Ziyyat. 2014. Combination of Hierarchical and Cooperative Models of an IDS for MANETs. In Tenth International Conference on Signal-Image Technology and Internet-Based Systems, IEEE, 230–236, Morocco, Nov 2014.

    Google Scholar 

  3. Saxena, Aumreesh Kumar, Sitesh Sinha, and Piyush Shukla. 2017. A Review on Intrusions Detection System in Mobile Ad-Hoc Network. In Proceeding of International conference on Recent Innovations is Signal Processing and Embedded Systems (RISE-2017), IEEE, 27–29 Oct 2017.

    Google Scholar 

  4. Banerjee, Sayan, Roshni Nandi, Rohan Dey, and Himadri Nath Saha. 2015. A Review on Different Intrusion Detection Systems for MANET and itsvulnerabilities. International Conference and Workshop on Computing and Communication (IEMCON), IEEE, 1–7, India, Oct 2015.

    Google Scholar 

  5. Poongothai, T., and K. Duraiswamy. 2014. Intrusion Detection in Mobile AdHoc Networks Using Machine Learning Approach. In International Conference on Information Communication and Embedded Systems (ICICES2014), IEEE, 1–5, India, Feb 2014.

    Google Scholar 

  6. Pavani, K., and A. Damodaram. 2013. Intrusion Detection Using MLP for MANETs. In Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 440–444, IEEE, India, Oct 2013.

    Google Scholar 

  7. Thanthrige, Udaya Sampath K. Perera Miriya, Jagath Samarabandu, and Xianbin Wang. 2016. A Machine Learning Techniques for Intrusion Detection on Public Dataset. In Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), IEEE.

    Google Scholar 

  8. Cannady, J., and J. Harrell. 1996. A Comparative Analysis of Current Intrusion Detection Technologies. In Proceedings of the Fourth Technology for Information Security Conference, Citeseer, vol. 96.

    Google Scholar 

  9. Salour, M., and X. Su. 2007. Dynamic Two-Layer Signature-Based IDS with Unequal Databases. In ITNG ’07. Fourth International Conference on Information Technology, 77–82, Apr 2007.

    Google Scholar 

  10. Saeed, N.H., M.F. Abbod, and H.S. Al-Raweshidy. 2008. An Intelligent MANET Routing System. IEEE.

    Google Scholar 

  11. Peterson, Erick, and Marco Antonio To. 2017. A Novel Online CEP Learning engine for MANET IDS. In IEEE 9th Latin-American Conference on Communications (LATINCOM).

    Google Scholar 

  12. Kazi, Samreen Banu, and Mohammed Azharuddin Adhoni. 2016. Secure IDS to Detect Malevolent Node in MANETS. In International Conference on Electrical, Electronics and Optimization Techniques (ICEEOT).

    Google Scholar 

  13. Johnson, David B., David A. Maltz, Josh Broch. 2001. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. ACM.

    Google Scholar 

  14. Marti, S., T.J. Giuli, K. Lai, and M. Baker. 2000. Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proceedings of the International Conference on Mobile Computing and Networking, 255–265.

    Google Scholar 

  15. Nadeem, Adnan, Michael P. Howarth. 2013. A Survey of MANET Intrusion Detection & Prevention Approaches for Network LayerAttacks. IEEE Communications Surveys & Tutorials, vol. 15.

    Google Scholar 

  16. Kurosawa, S., and A. Jamalipour. 2007. Detecting Blackhole Attack on AODV-Based Mobile AdHoc Networks by Dynamic Learning Method. International Journal of Network Security 5 (3): 338–345.

    Google Scholar 

  17. Sen, J., M. Chandra, S.G. Harihara, H. Reddy, and P. Balamuralidhar. 2007. A Mechanism for Detection of Gray Hole Attacks in Mobile Ad Hoc Networks. In Proceedings of the IEEE International Conference on Information Communication and Signal Processing ICICS, Singapore.

    Google Scholar 

  18. Piro, C., C. Shields, and B. Levine. 2006. Detecting the Sybil Attack in Mobile Ad hoc Networks. In Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks, IEEE.

    Google Scholar 

  19. Lee, S.B., and Y.H. Choi. 2006. A Resilient Packet Forwarding Scheme against Maliciously Packet Dropping Nodes in Sensor Networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SANS2006), 59–70, USA.

    Google Scholar 

  20. Gonzalez-Duque, O.F., M. Howarth, and G. Pavlou. 2013. Detection of Packet Forwarding Misbehaviour in Mobile Ad hoc Networks. In Proceedings of the International Conference on Wired/Wireless Internet Communications (WWIC 2007), 302–314, Portugal, June 2007.

    Google Scholar 

  21. Gonzalez-Duque, O.F., G. Ansa, M. Howarth, and G. Pavlou. 2008. Detection and Accusation of Packet Forwarding Misbehaviour in Mobile Ad hoc Networks. Journal of Internet Engineering 2 (8): 181–192.

    Google Scholar 

  22. Pavani, K., and A. Damodaram. 2013. Intrusion Detection Using MLP for MANETs. In Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 440–444, India.

    Google Scholar 

  23. Yi, P., Y. Jiang, Y. Zhong, and S. Zhang. 2005. Distributed Intrusion Detection, for Mobile Ad Hoc Networks. In Workshop on Proceedings of the IEEE Application and Internet.

    Google Scholar 

  24. Yang, H., J. Shu, X. Meng, and S. Lu. 2006. SCAN: Self-Organized Network- Layer Security in Mobile Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24 (2): 261–273.

    Article  Google Scholar 

  25. IEEE Std 802.11-2007, IEEE Standard for Information Technology-Telecommunication and Information Exchange Between Systems-Local and Metropolitan Area Network-Specific requirement, Part 11 Wireless LAN Medium Access Control and Physical Layer Specifications.

    Google Scholar 

  26. Yi, P., Y. Jiang, Y. Zhong, and S. Zhang. 2005. Distributed Intrusion Detection for Mobile Ad Hoc Networks. In Proceedings of the IEEE Application and Internet Workshop.

    Google Scholar 

  27. Hijazi, A., and N. Nasser. 2013. Using Mobile Agent for Intrusion Detection in Wireless Ad-Hoc Networks. In Proceedings of the IEEE Wireless Communication and Networking Conference WCNC, March 2005; Pavani, K., and A. Damodaram. 2013. Intrusion Detection Using MLP for MANETs. In Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 440–444, India.

    Google Scholar 

  28. Zhang, Y., and W. Lee. 2000. Intrusion Detection in Wireless Ad-Hoc Networks. In Proceedings of the ACM International Conference on Mobile Computing and Networking(MobiCom), 275–283, Boston, US.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Shabaz Hussain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hussain, M.S., Khan, K.U.R. (2020). A Survey of IDS Techniques in MANETs Using Machine-Learning. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_68

Download citation

Publish with us

Policies and ethics