Anomaly-Based Intrusion Detection for Detecting Blackhole Attack Mitigataion

被引:0
|
作者
Abdelhamid, Ashraf [1 ]
Elsayed, Mahmoud Said [2 ]
Aslan, Heba K. [1 ]
Azer, Marianne A. [3 ]
机构
[1] Nile Univ, Cairo, Egypt
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[3] Natl Telecommun Inst, Cairo, Egypt
关键词
L[!text type='JS']JS[!/text]Adhoc Networks; MANET; Routing Protocols; Blackhole Attacks; ROUTING PROTOCOLS;
D O I
10.1145/3664476.3670941
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the contemporary environment, mobile ad hoc networks (MANETs) are becoming necessary. They are absolutely vital in a variety of situations where setting up a network quickly is required; however, this is infeasible due to low resources. Ad hoc networks have many applications: education, on the front lines of battle, rescue missions, etc. These networks are distinguished by high mobility and constrained compute, storage, and energy capabilities. As a result of a lack of infrastructure, they do not use communication tools related to infrastructure. Instead, these networks rely on one another for routing and communication. Each node in a MANET searches for another node within its communication range and uses it as a hop to relay the message through a subsequent node, and so on. Traditional networks have routers, servers, firewalls, and specialized hardware. In contrast, each node in ad hoc networks has multiple functions. Nodes, for instance, manage the routing operation. Consequently, they are more vulnerable to attacks than traditional networks. This study's main goal is to develop an approach for detecting blackhole attacks using anomaly detection based on Support Vector Machine (SVM). This detection system looks at node activity to scan network traffic for irregularities. In blackhole scenarios, attacking nodes have distinct behavioral characteristics that distinguish them from other nodes. These traits can be efficiently detected by the proposed SVM-based detection system. To evaluate the effectiveness of this approach, traffic under blackhole attack is created using the OMNET++ simulator. Based on the categorization of the traffic into malicious and non-malicious, the malicious node is then identified. The results of the suggested approach show great accuracy in detecting blackhole attacks.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos E.
    Traganitis, Apostolos P.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (02): : 276 - 294
  • [42] Hybrid Intrusion Detection System using an Unsupervised method for Anomaly-based Detection
    Bhadauria, Saumya
    Mohanty, Tamanna
    2021 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2021,
  • [43] Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 81 - 81
  • [44] Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
    Tavallaee, Mahbod
    Stakhanova, Natalia
    Ghorbani, Ali Akbar
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (05): : 516 - 524
  • [45] An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks
    Zachos, Georgios
    Essop, Ismael
    Mantas, Georgios
    Porfyrakis, Kyriakos
    Ribeiro, Jose C.
    Rodriguez, Jonathan
    ELECTRONICS, 2021, 10 (21)
  • [46] Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
    Gillen, Robert E.
    Carter, Jason M.
    Craig, Christopher
    Johnson, Jordan A.
    Scott, Stephen L.
    2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020), 2020, : 360 - 366
  • [47] Anomaly-Based Intrusion Detection System Using Support Vector Machine
    Krishnaveni, S.
    Vigneshwar, Palani
    Kishore, S.
    Jothi, B.
    Sivamohan, S.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 723 - 731
  • [48] A brief observation-centric analysis on anomaly-based intrusion detection
    Zhang, ZH
    Shen, H
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 178 - 191
  • [49] Proposals on assessment environments for anomaly-based network intrusion detection systems
    Bermudez-Edo, M.
    Salazar-Hernandez, R.
    Diaz-Verdejo, J.
    Garcia-Teodoro, P.
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 210 - +
  • [50] Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System
    Alamiedy, Taief Alaa
    Anbar, Mohammed
    Al-Ani, Ahmed K.
    Al-Tamimi, Bassam Naji
    Faleh, Nameer
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 605 - 619