Abstract
A kind of wireless network called a “mobile ad hoc network” (MANET) can transfer data without the aid of any infrastructure. Due to its short battery life, limited bandwidth, reliance on intermediaries or other nodes, distributed architecture, and self-organisation, the MANET node is vulnerable to many security-related attacks. The Internet of Things (IoT), a more modern networking pattern that can be seen as a superset of the paradigms discussed above, has recently come into existence. It is extremely difficult to secure these networks due to their scattered design and the few resources they have. A key function of intrusion detection systems (IDS) is the identification of hostile actions that impair network performance. It is extremely important that an IDS be able to adapt to such difficulties. As a result, the research creates a deep learning-based feature extraction to increase the machine learning technique's classification accuracy. The suggested model uses outstanding network-constructed feature extraction (RNBFE), which pulls structures from a deep residual network's many convolutional layers. Additionally, RNBFE's numerous parameters cause a lot of configuration issues because they require manual parameter adjustment. Therefore, the integration of the Rider Optimization Algorithm (ROA) and the Spotted Hyena Optimizer (SHO) to frame the new algorithm, Spotted Hyena-based Rider Optimization (S-ROA), is used to adjust the RNBFE’s settings. Attack classification is performed on the resulting feature vectors using fuzzy neural classifiers (FNC). The experimental analysis uses two datasets that are publicly accessible.
Similar content being viewed by others
Data Availability
The data that support the findings of this study are available upon reasonable request from the authors.
References
Ahmad R, Wazirali R, Abu-Ain T (2022) Machine learning for wireless sensor networks security: an overview of challenges and issues. Sensors 22(13):4730
Choudhary S, Kesswani N (2020) Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Comput Sci 167:1561–1573
Daniel D, Preethi N, Jakka A, Eswaran S (2021) Collaborative intrusion detection system in cognitive smart city network (CSC-Net). Intern J Knowl Syst Sci 12(1):60–73. https://doi.org/10.4018/ijkss.2021010105
Di Mauro M, Galatro G, Fortino G, Liotta A (2021) Supervised feature selection techniques in network intrusion detection: a critical review. Eng Appl Artif Intell 101:104216. https://doi.org/10.1016/j.engappai.2021.104216
Eswaran S, Rani V, Ramakrishnan J, Selvakumar S (2021) An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure. Intern J Pervasive Comput Commun 18(1):59–78. https://doi.org/10.1108/ijpcc-04-2021-0102
Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure internet of things. 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud). IEEE, Vienna, pp 84–90
Gowdhaman V, Dhanapal R (2021) An intrusion detection system for wireless sensor networks using deep neural network. Soft Comput 17:1–9
IoT bots cause massive Internet outage. https://www.beyondtrust.com/blog/iot-bots-cause-october-21st-2016-massive-internet-outage/. Accessed 22 Oct 2016
Kafle VP, Fukushima Y, Harai H (2016) Internet of things standardization in ITU and prospective networking technologies. IEEE Commun Mag 54(9):43–49
Karthic S, Kumar SM (2022) Hybrid optimised deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural Process Lett. https://doi.org/10.1007/s11063-022-10892-9
King J, Awad AI (2016) A distributed security mechanism for resource-constrained IoT devices. Informatica 40(1):133–143
Krishna MM, Panda N, Majhi SK (2021) Solving travelling salesman problem using hybridization of rider optimization and spotted hyena optimization algorithm. Expert Syst Appl 183:115353
Manoharan JS (2021) Design of an intelligent approach on capsule networks to detect forged images. J Trends Comput Sci Smart Technol 3(3):205–221. https://doi.org/10.36548/jtcsst.2021.3.004
Rajasoundaran S, Prabu AV, Routray S, Malla PP, Kumar GS, Mukherjee A, Qi Y (2022) Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks. Comput Commun 1(187):71–82
Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusion detection in the internet of things. Ad Hoc Netw 11(8):2661–2674. https://doi.org/10.1016/j.adhoc.2013.04.014
Saif S, Das P, Biswas S, Khari M, Shanmuganathan V (2022) HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocess Microsyst 12:104622
Samuel Manoharan J (2021) Study of variants of extreme learning machine (ELM) brands and its performance measure on classification algorithm. J Soft Comput Paradig (JSCP) 3(2):83–95. https://doi.org/10.36548/jscp.2021.2.003
Subramani S, Selvi M (2022) Deep Learning based ids for secured routing in wireless sensor networks using fuzzy genetic approach
US-CERT. 2016. Alert (TA16–288A) Heightened DDoS threat posed by mirai and other botnets. https://www.us-cert.gov/ncas/alerts/TA16-288A
Weber M, Boban M (2016) Security challenges of the internet of things. In: 2016 39th international convention on information and communication technology, electronics and microelectronics (MIPRO). IEEE, Opatija. 638–643
Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32
Zhang J (2022) Network security situational awareness based on genetic algorithm in wireless sensor networks. J sens Aug 18; 2022
Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag 55:26–33
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Contributions
MGK & RV—Literature Review & Proposed Algorithm. US and MM—Implementation DJ and MVG—Results & Discussion.
Corresponding author
Ethics declarations
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose.
Ethical Approval
The submitted work is original and has not been published elsewhere in any form or language.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Karthik, M.G., Sivaji, U., Manohar, M. et al. An Intrusion Detection Model Based on Hybridization of S-ROA in Deep Learning Model for MANET. Iran J Sci Technol Trans Electr Eng (2024). https://doi.org/10.1007/s40998-024-00700-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s40998-024-00700-6