Skip to main content
Log in

An Intrusion Detection Model Based on Hybridization of S-ROA in Deep Learning Model for MANET

  • Research Paper
  • Published:
Iranian Journal of Science and Technology, Transactions of Electrical Engineering Aims and scope Submit manuscript

Abstract

A kind of wireless network called a “mobile ad hoc network” (MANET) can transfer data without the aid of any infrastructure. Due to its short battery life, limited bandwidth, reliance on intermediaries or other nodes, distributed architecture, and self-organisation, the MANET node is vulnerable to many security-related attacks. The Internet of Things (IoT), a more modern networking pattern that can be seen as a superset of the paradigms discussed above, has recently come into existence. It is extremely difficult to secure these networks due to their scattered design and the few resources they have. A key function of intrusion detection systems (IDS) is the identification of hostile actions that impair network performance. It is extremely important that an IDS be able to adapt to such difficulties. As a result, the research creates a deep learning-based feature extraction to increase the machine learning technique's classification accuracy. The suggested model uses outstanding network-constructed feature extraction (RNBFE), which pulls structures from a deep residual network's many convolutional layers. Additionally, RNBFE's numerous parameters cause a lot of configuration issues because they require manual parameter adjustment. Therefore, the integration of the Rider Optimization Algorithm (ROA) and the Spotted Hyena Optimizer (SHO) to frame the new algorithm, Spotted Hyena-based Rider Optimization (S-ROA), is used to adjust the RNBFE’s settings. Attack classification is performed on the resulting feature vectors using fuzzy neural classifiers (FNC). The experimental analysis uses two datasets that are publicly accessible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data Availability

The data that support the findings of this study are available upon reasonable request from the authors.

References

  • Ahmad R, Wazirali R, Abu-Ain T (2022) Machine learning for wireless sensor networks security: an overview of challenges and issues. Sensors 22(13):4730

    Article  ADS  PubMed  PubMed Central  Google Scholar 

  • Choudhary S, Kesswani N (2020) Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Comput Sci 167:1561–1573

    Article  Google Scholar 

  • Daniel D, Preethi N, Jakka A, Eswaran S (2021) Collaborative intrusion detection system in cognitive smart city network (CSC-Net). Intern J Knowl Syst Sci 12(1):60–73. https://doi.org/10.4018/ijkss.2021010105

    Article  Google Scholar 

  • Di Mauro M, Galatro G, Fortino G, Liotta A (2021) Supervised feature selection techniques in network intrusion detection: a critical review. Eng Appl Artif Intell 101:104216. https://doi.org/10.1016/j.engappai.2021.104216

    Article  Google Scholar 

  • Eswaran S, Rani V, Ramakrishnan J, Selvakumar S (2021) An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure. Intern J Pervasive Comput Commun 18(1):59–78. https://doi.org/10.1108/ijpcc-04-2021-0102

    Article  Google Scholar 

  • Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure internet of things. 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud). IEEE, Vienna, pp 84–90

    Chapter  Google Scholar 

  • Gowdhaman V, Dhanapal R (2021) An intrusion detection system for wireless sensor networks using deep neural network. Soft Comput 17:1–9

    Google Scholar 

  • IoT bots cause massive Internet outage. https://www.beyondtrust.com/blog/iot-bots-cause-october-21st-2016-massive-internet-outage/. Accessed 22 Oct 2016

  • Kafle VP, Fukushima Y, Harai H (2016) Internet of things standardization in ITU and prospective networking technologies. IEEE Commun Mag 54(9):43–49

    Article  Google Scholar 

  • Karthic S, Kumar SM (2022) Hybrid optimised deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural Process Lett. https://doi.org/10.1007/s11063-022-10892-9

    Article  Google Scholar 

  • King J, Awad AI (2016) A distributed security mechanism for resource-constrained IoT devices. Informatica 40(1):133–143

    Google Scholar 

  • Krishna MM, Panda N, Majhi SK (2021) Solving travelling salesman problem using hybridization of rider optimization and spotted hyena optimization algorithm. Expert Syst Appl 183:115353

    Article  Google Scholar 

  • Manoharan JS (2021) Design of an intelligent approach on capsule networks to detect forged images. J Trends Comput Sci Smart Technol 3(3):205–221. https://doi.org/10.36548/jtcsst.2021.3.004

    Article  Google Scholar 

  • Rajasoundaran S, Prabu AV, Routray S, Malla PP, Kumar GS, Mukherjee A, Qi Y (2022) Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks. Comput Commun 1(187):71–82

    Article  Google Scholar 

  • Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusion detection in the internet of things. Ad Hoc Netw 11(8):2661–2674. https://doi.org/10.1016/j.adhoc.2013.04.014

    Article  Google Scholar 

  • Saif S, Das P, Biswas S, Khari M, Shanmuganathan V (2022) HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocess Microsyst 12:104622

    Article  Google Scholar 

  • Samuel Manoharan J (2021) Study of variants of extreme learning machine (ELM) brands and its performance measure on classification algorithm. J Soft Comput Paradig (JSCP) 3(2):83–95. https://doi.org/10.36548/jscp.2021.2.003

    Article  Google Scholar 

  • Subramani S, Selvi M (2022) Deep Learning based ids for secured routing in wireless sensor networks using fuzzy genetic approach

  • US-CERT. 2016. Alert (TA16–288A) Heightened DDoS threat posed by mirai and other botnets. https://www.us-cert.gov/ncas/alerts/TA16-288A

  • Weber M, Boban M (2016) Security challenges of the internet of things. In: 2016 39th international convention on information and communication technology, electronics and microelectronics (MIPRO). IEEE, Opatija. 638–643

  • Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32

    Article  Google Scholar 

  • Zhang J (2022) Network security situational awareness based on genetic algorithm in wireless sensor networks. J sens Aug 18; 2022

  • Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag 55:26–33

    Article  Google Scholar 

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

MGK & RV—Literature Review & Proposed Algorithm. US and MM—Implementation DJ and MVG—Results & Discussion.

Corresponding author

Correspondence to Ramesh Vatambeti.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Ethical Approval

The submitted work is original and has not been published elsewhere in any form or language.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karthik, M.G., Sivaji, U., Manohar, M. et al. An Intrusion Detection Model Based on Hybridization of S-ROA in Deep Learning Model for MANET. Iran J Sci Technol Trans Electr Eng (2024). https://doi.org/10.1007/s40998-024-00700-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s40998-024-00700-6

Keywords

Navigation