Skip to main content
Log in

Detecting Distributed Denial of Service (DDoS) in MANET Using Ad Hoc On-Demand Distance Vector (AODV) with Extra Tree Classifier (ETC)

  • Research Paper
  • Published:
Iranian Journal of Science and Technology, Transactions of Electrical Engineering Aims and scope Submit manuscript

Abstract

This paper concentrate on an option for mitigating distributed denial of service (DDoS) attacks that can stern consequences in mobile ad hoc network (MANET). Discovering a solution to a DDoS attack has gained research focus but challenges exists in performing attack detection with high accuracy along with developing a mechanism in detecting diverse methods to classify DDoS attack activities and also to classify it as an effective measure. The existing methods have numerous difficulties involving detection system performance limits, system scalability and stability, and the capability to develop large volumes of information. This paper concentrates on ETC with randomized search algorithm to detect attacks categorized as flooding, scheduling, black holes and gray holes, using a machine learning (ML) technique as classifier for understanding the behavior of these attacks and trains the better classification method in the MANET data transmitting dataset. The ETC algorithm employs the traditional top-down construction method to construct an ensemble of unpruned decision or regression trees. It separates nodes by selecting cut points thresholds completely at random, which sets it apart from previous tree-based ensemble approaches. When the data transmitted in the AODV, the behavior of node is analyzed and reported in the dataset as target which is trained through ML method. This AODV with ML proposed model can justify the behavior of network in MANET and classify the attack type for the current application. Moreover, the ML method performance has been developed through hyperparameter tuning which can be evaluated through confusion matrix metrics. This AODV with extra tree classifier (ETC) generate improved accuracy as 98.89% using hyperparameter tuning process in determining the safe data transaction in MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

The data and source codes used to support the findings of this study can be obtained from the corresponding author upon request.

References

  • Abdelshafy MA, King PJB (2016) Resisting blackhole attacks on MANETs. In: Proc 13th IEEE Annu Consum Commun Netw Conf (CCNC), Las Vegas, NV, USA, pp. 1048–1053

  • Adumbabu I, Selvakumar K (2022) Hybrid link states predicting model for cluster head selection and its routing analysis for WSN MANETS. In: 2022 International conference on electronics and renewable systems (ICEARS), Tuticorin, India, pp. 670–677

  • Agarkar PT, Chawhan MD, Kulat KD, Hajare PR (2022) Zone based selective neighbours to mitigate flooding & reliable routing for WSN. In: 2022 International conference on connected systems & intelligence (CSI), Trivandrum, India, 2022, pp. 1–7

  • Ahmed AJ, Rashid SA, Hamdi MM, Mustafa AS, Noori MS (2022) A review of wireless sensor network. In: 2022 international congress on human-computer interaction, optimization and robotic applications (HORA), Ankara, Turkey, pp. 1–5

  • Ananthalakshmi G, Ravindra T (2022) Design and analysis Of EE-LEACH routing protocols in MANET for wireless sensor network. In: 2022 3rd international conference for emerging technology (INCET), Belgaum, India, pp. 1–4

  • Ardianto B, Dwi Nurcahyo HS, Muftić H, Harwahyu R, Sari RF (2022) Performance comparison of AODV, AODV-ETX and modified AODV-ETX in VANET using NS3. In: 2022 IEEE international conference on cybernetics and computational intelligence (CyberneticsCom), Malang, Indonesia, pp. 156–161

  • Bruzgiene R, Narbutaite L, Adomkus T (2017) MANET network in Internet of Things system. In: Ortiz JH, de la Cruz AP (eds) Ad Hoc networks. InTech, Rijeka

    Google Scholar 

  • Daou L, Rafla N (2019) Analysis of black hole router attack in network-on-chip. In: Midwest Symp Circuits Syst, pp. 69–72

  • El-Semary AM, Diab H (2019) BP-AODV: blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7:95197–95211

    Article  Google Scholar 

  • Faghihniya MJ, Hosseini SM, Tahmasebi M (2017) ‘Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network.’ Wireless Netw 23(6):1863–1874

    Article  Google Scholar 

  • Gao Y, Wu H, Song B, Jin Y, Luo X, Zeng X (2019) A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560–154571

    Article  Google Scholar 

  • Gul H, Bin Ahmad M, Asif M (2019) A comparison of detection techniques for attacks on MANETs. In: Proc - 2019 4th Int Conf Inf Syst Eng ICISE, 2019, pp. 81–86

  • Gurulakshmi K, Nesarani A (2018) Analysis of IoT bots against DDoS attack using machine learning algorithm. In: Proc 2nd Int Conf Trends Electron Inform (ICOEI), pp. 1052–1057

  • Hmeidi I, Khamayseh Y, Al-Rousen M, Arrabi A (2018) Blackhole attack security issues, challenges and solution in manet. In: Dhinaharan Nagamalai et al. (Eds) CSEIT, NCS, SPM, NeTCoM - 2018 pp. 199–207, 2018. © CS & IT-CSCP

  • Jain AK, Choorasiya A (2017) Security enhancement of AODV routing protocol in mobile ad hoc network. In: Proc 2nd Int Conf Commun Electron Syst. (ICCES), Coimbatore, India, pp. 958–964

  • Kaur H, Mangat K (2017) Black hole attack in mobile ad hoc networks: a review. Int J Adv Res Ideas Innov Technol 3(2):189–191

    Google Scholar 

  • Khanna N, Sachdeva M (2019) A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs. Comput Sci Rev 32:24–44

    Article  MathSciNet  Google Scholar 

  • Ling C, Sun WS (2019) Wireless Sensor networks routing based on improved ant colony algorithm. Comput Eng Design 40(3):627–631

    Google Scholar 

  • Ochola EO, Mejaele LF, Eloff MM, van der Poll JA (2017) Manet reactive routing protocols node mobility variation effect in analyzing the impact of black hole attack. SAIEE Afr Res J 108(2):80–92

    Article  Google Scholar 

  • Pandey S, Singh V (2020) Blackhole attack detection using machine learning approach on MANET. In: 2020 international conference on electronics and sustainable communication systems (ICESC), Coimbatore, India, pp. 797–802

  • Panos C, Ntantogian C, Malliaros S, Xenakis C (2017) Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks’. Comput Netw 113:94–110

    Article  Google Scholar 

  • Praveen KS, Gururaj HL, Ramesh B (2016) Comparative analysis of black hole attack in ad hoc network using AODV and OLSR protocols. Proc Comput Sci 85:325–330

    Article  Google Scholar 

  • Saied A, Overill RE, Radzik T (2016) Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172:385–393

    Article  Google Scholar 

  • Singh U, Shukla M, Jain AK, Patsariya M, Itare R, Yadav S (2020) Trust based model for mobile ad-hoc network in Internet of Things. Invent Comput Technol 4:827–839

    Google Scholar 

  • Trivedi MC, Yadav S, Singh VK (2019) Securing ZRP routing protocol against DDoS attack in mobile ad hoc network. In: Kolhe ML, Trivedi MC, Tiwari S, Singh VK (eds) Advances in data and information sciences (Lecture Notes in Networks and Systems). Springer, Singapore, pp 387–396

    Chapter  Google Scholar 

  • Wang M, Wang X, Zhang Y, Gao Z (2018) ‘A novel chaotic encryption scheme based on image segmentation and multiple diffusion models.’ Opt Laser Technol 108:558–573

    Article  Google Scholar 

  • Xu J (2021) A modified AODV routing protocol using in WSN based on ant colony algorithm. In: 2021 2nd international conference on electronics, communications and information technology (CECIT), Sanya, China, pp. 87–90

  • Yasin A, Zant MA (2018) Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel Commun Mobile Comput 2018:9812135

    Article  Google Scholar 

  • Ye Y, Feng S, Liu M, Sun X, Xu T, Ting X (2018) A safe proactive routing protocol SDSDV for ad hoc network. Int J Wirel Inf Netw 25(3):348–357

    Article  Google Scholar 

  • Yuan X, Li C, Li X (2017) DeepDefense: identifying DDoS attack via deep learning. In: Proc IEEE Int Conf Smart Comput, pp. 1–8

  • Zekri M, El Kafhali S, Aboutabit N, Saadi Y (2017) DDoS attack detection using machine learning techniques in cloud computing environments. In: Proc 3rd Int Conf Cloud Comput Technol Appl (CloudTech), pp. 1–7

  • Zhang B, Zhang T, Yu Z (2017) DDoS detection and prevention based on artificial intelligence techniques. In: Proc 3rd IEEE Int Conf Comput Commun (ICCC), pp. 1276–1280

Download references

Funding

The authors have not received any funding for the work presented in the paper.

Author information

Authors and Affiliations

Authors

Contributions

NS involved in data collection and analysis, methodology, original draft, and validation. AR involved in corrections/revision of manuscript and validation. SA involved in methodology and validation. KSA involved in report writing and data analysis.

Corresponding author

Correspondence to N. Sivanesan.

Ethics declarations

Conflicts of interest

The authors declare that they have no competing interests.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sivanesan, N., Rajesh, A., Anitha, S. et al. Detecting Distributed Denial of Service (DDoS) in MANET Using Ad Hoc On-Demand Distance Vector (AODV) with Extra Tree Classifier (ETC). Iran J Sci Technol Trans Electr Eng (2023). https://doi.org/10.1007/s40998-023-00678-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s40998-023-00678-7

Keywords

Navigation