Abstract
The mobile ad hoc networks (MANETs) had move towards the wireless networking technology. Due to its dynamic nature MANETs face the challenges towards critical attacks in OSI layers but research shows that in network layer the attacks are effectively done by intruders. In this survey, many of the attacks at network layer are identified in MANETs by most of the researchers which are outlined in this paper. Mostly, AODV routing protocols and other protocols are used for transferring packets to the destination. The communicated packets information is accumulated in the log files, to surveillance these routing of packets from these log files, the techniques used in MANETs are data mining, support vector machines (SVM), genetic algorithms (GA) and other machine-learning approaches. Further, the methodologies and techniques proposed for detecting and predicting these attacks from various kinds of intrusions within the MANETS are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Elboukhari, Mohamed, Mostafa Azizi, and Abdelmalek Azizi. 2014. Intrusion Detection Systems in Mobile Ad Hoc Networks: A Survey. In 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS), IEEE, 136–141, Morocco, Nov 2014.
Chadli, Sara, Mohamed Emharraf, Mohammed Saber, and Abdelhak Ziyyat. 2014. Combination of Hierarchical and Cooperative Models of an IDS for MANETs. In Tenth International Conference on Signal-Image Technology and Internet-Based Systems, IEEE, 230–236, Morocco, Nov 2014.
Saxena, Aumreesh Kumar, Sitesh Sinha, and Piyush Shukla. 2017. A Review on Intrusions Detection System in Mobile Ad-Hoc Network. In Proceeding of International conference on Recent Innovations is Signal Processing and Embedded Systems (RISE-2017), IEEE, 27–29 Oct 2017.
Banerjee, Sayan, Roshni Nandi, Rohan Dey, and Himadri Nath Saha. 2015. A Review on Different Intrusion Detection Systems for MANET and itsvulnerabilities. International Conference and Workshop on Computing and Communication (IEMCON), IEEE, 1–7, India, Oct 2015.
Poongothai, T., and K. Duraiswamy. 2014. Intrusion Detection in Mobile AdHoc Networks Using Machine Learning Approach. In International Conference on Information Communication and Embedded Systems (ICICES2014), IEEE, 1–5, India, Feb 2014.
Pavani, K., and A. Damodaram. 2013. Intrusion Detection Using MLP for MANETs. In Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 440–444, IEEE, India, Oct 2013.
Thanthrige, Udaya Sampath K. Perera Miriya, Jagath Samarabandu, and Xianbin Wang. 2016. A Machine Learning Techniques for Intrusion Detection on Public Dataset. In Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), IEEE.
Cannady, J., and J. Harrell. 1996. A Comparative Analysis of Current Intrusion Detection Technologies. In Proceedings of the Fourth Technology for Information Security Conference, Citeseer, vol. 96.
Salour, M., and X. Su. 2007. Dynamic Two-Layer Signature-Based IDS with Unequal Databases. In ITNG ’07. Fourth International Conference on Information Technology, 77–82, Apr 2007.
Saeed, N.H., M.F. Abbod, and H.S. Al-Raweshidy. 2008. An Intelligent MANET Routing System. IEEE.
Peterson, Erick, and Marco Antonio To. 2017. A Novel Online CEP Learning engine for MANET IDS. In IEEE 9th Latin-American Conference on Communications (LATINCOM).
Kazi, Samreen Banu, and Mohammed Azharuddin Adhoni. 2016. Secure IDS to Detect Malevolent Node in MANETS. In International Conference on Electrical, Electronics and Optimization Techniques (ICEEOT).
Johnson, David B., David A. Maltz, Josh Broch. 2001. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. ACM.
Marti, S., T.J. Giuli, K. Lai, and M. Baker. 2000. Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proceedings of the International Conference on Mobile Computing and Networking, 255–265.
Nadeem, Adnan, Michael P. Howarth. 2013. A Survey of MANET Intrusion Detection & Prevention Approaches for Network LayerAttacks. IEEE Communications Surveys & Tutorials, vol. 15.
Kurosawa, S., and A. Jamalipour. 2007. Detecting Blackhole Attack on AODV-Based Mobile AdHoc Networks by Dynamic Learning Method. International Journal of Network Security 5 (3): 338–345.
Sen, J., M. Chandra, S.G. Harihara, H. Reddy, and P. Balamuralidhar. 2007. A Mechanism for Detection of Gray Hole Attacks in Mobile Ad Hoc Networks. In Proceedings of the IEEE International Conference on Information Communication and Signal Processing ICICS, Singapore.
Piro, C., C. Shields, and B. Levine. 2006. Detecting the Sybil Attack in Mobile Ad hoc Networks. In Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks, IEEE.
Lee, S.B., and Y.H. Choi. 2006. A Resilient Packet Forwarding Scheme against Maliciously Packet Dropping Nodes in Sensor Networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SANS2006), 59–70, USA.
Gonzalez-Duque, O.F., M. Howarth, and G. Pavlou. 2013. Detection of Packet Forwarding Misbehaviour in Mobile Ad hoc Networks. In Proceedings of the International Conference on Wired/Wireless Internet Communications (WWIC 2007), 302–314, Portugal, June 2007.
Gonzalez-Duque, O.F., G. Ansa, M. Howarth, and G. Pavlou. 2008. Detection and Accusation of Packet Forwarding Misbehaviour in Mobile Ad hoc Networks. Journal of Internet Engineering 2 (8): 181–192.
Pavani, K., and A. Damodaram. 2013. Intrusion Detection Using MLP for MANETs. In Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 440–444, India.
Yi, P., Y. Jiang, Y. Zhong, and S. Zhang. 2005. Distributed Intrusion Detection, for Mobile Ad Hoc Networks. In Workshop on Proceedings of the IEEE Application and Internet.
Yang, H., J. Shu, X. Meng, and S. Lu. 2006. SCAN: Self-Organized Network- Layer Security in Mobile Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24 (2): 261–273.
IEEE Std 802.11-2007, IEEE Standard for Information Technology-Telecommunication and Information Exchange Between Systems-Local and Metropolitan Area Network-Specific requirement, Part 11 Wireless LAN Medium Access Control and Physical Layer Specifications.
Yi, P., Y. Jiang, Y. Zhong, and S. Zhang. 2005. Distributed Intrusion Detection for Mobile Ad Hoc Networks. In Proceedings of the IEEE Application and Internet Workshop.
Hijazi, A., and N. Nasser. 2013. Using Mobile Agent for Intrusion Detection in Wireless Ad-Hoc Networks. In Proceedings of the IEEE Wireless Communication and Networking Conference WCNC, March 2005; Pavani, K., and A. Damodaram. 2013. Intrusion Detection Using MLP for MANETs. In Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 440–444, India.
Zhang, Y., and W. Lee. 2000. Intrusion Detection in Wireless Ad-Hoc Networks. In Proceedings of the ACM International Conference on Mobile Computing and Networking(MobiCom), 275–283, Boston, US.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hussain, M.S., Khan, K.U.R. (2020). A Survey of IDS Techniques in MANETs Using Machine-Learning. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_68
Download citation
DOI: https://doi.org/10.1007/978-981-15-1480-7_68
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1479-1
Online ISBN: 978-981-15-1480-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)