Anomaly-Based Intrusion Detection for Detecting Blackhole Attack Mitigataion

被引:0
|
作者
Abdelhamid, Ashraf [1 ]
Elsayed, Mahmoud Said [2 ]
Aslan, Heba K. [1 ]
Azer, Marianne A. [3 ]
机构
[1] Nile Univ, Cairo, Egypt
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[3] Natl Telecommun Inst, Cairo, Egypt
关键词
L[!text type='JS']JS[!/text]Adhoc Networks; MANET; Routing Protocols; Blackhole Attacks; ROUTING PROTOCOLS;
D O I
10.1145/3664476.3670941
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the contemporary environment, mobile ad hoc networks (MANETs) are becoming necessary. They are absolutely vital in a variety of situations where setting up a network quickly is required; however, this is infeasible due to low resources. Ad hoc networks have many applications: education, on the front lines of battle, rescue missions, etc. These networks are distinguished by high mobility and constrained compute, storage, and energy capabilities. As a result of a lack of infrastructure, they do not use communication tools related to infrastructure. Instead, these networks rely on one another for routing and communication. Each node in a MANET searches for another node within its communication range and uses it as a hop to relay the message through a subsequent node, and so on. Traditional networks have routers, servers, firewalls, and specialized hardware. In contrast, each node in ad hoc networks has multiple functions. Nodes, for instance, manage the routing operation. Consequently, they are more vulnerable to attacks than traditional networks. This study's main goal is to develop an approach for detecting blackhole attacks using anomaly detection based on Support Vector Machine (SVM). This detection system looks at node activity to scan network traffic for irregularities. In blackhole scenarios, attacking nodes have distinct behavioral characteristics that distinguish them from other nodes. These traits can be efficiently detected by the proposed SVM-based detection system. To evaluate the effectiveness of this approach, traffic under blackhole attack is created using the OMNET++ simulator. Based on the categorization of the traffic into malicious and non-malicious, the malicious node is then identified. The results of the suggested approach show great accuracy in detecting blackhole attacks.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Stream Learning and Anomaly-based Intrusion Detection in the Adversarial Settings
    Viegas, Eduardo
    Santin, Altair
    Abreu, Vilmar
    Oliveira, Luiz S.
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 773 - 778
  • [32] Anomaly-based intrusion detection: privacy concerns and other problems
    Lundin, E
    Jonsson, E
    COMPUTER NETWORKS, 2000, 34 (04) : 623 - 640
  • [33] Enabling Anomaly-based Intrusion Detection Through Model Generalization
    Viegas, Eduardo
    Santin, Altair
    Ahreu, Vilmar
    Oliveira, Luiz S.
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 939 - 944
  • [34] Anomaly-based Intrusion Detection Using Auto-encoder
    Nguimbous, Yves Nsoga
    Ksantini, Riadh
    Bouhoula, Adel
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 505 - 509
  • [35] An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
    Chae, Younghun
    Katenka, Natallia
    DiPippo, Lisa
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 221 - 224
  • [36] An application of learning problem in anomaly-based intrusion detection systems
    Jecheva, Veselina G.
    Nikolova, Evgeniya P.
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 853 - 860
  • [37] An Application of Membrane Computing to Anomaly-Based Intrusion Detection System
    Idowu, Rufai Kazeem
    Maroosi, Ali
    Muniyandi, Ravie Chandren
    Othman, Zulaiha Ali
    4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013), 2013, 11 : 585 - 592
  • [38] USAID: Unifying signature-based and anomaly-based intrusion detection
    Li, ZW
    Das, A
    Zhou, JY
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 702 - 712
  • [39] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [40] Anomaly-Based Web Attack Detection: A Deep Learning Approach
    Liang, Jingxi
    Zhao, Wen
    Ye, Wei
    PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 80 - 85