Intrusion detection in ad hoc network using machine learning technique

Mahendra Prasad*, Sachin Tripathi, Keshav Dahal

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)
36 Downloads (Pure)

Abstract

Ad hoc network is a temporary self-organizing and infrastructure less network. So, it is mostly applied in the military field and disaster relief. Due to wireless communication and self-organizing property ad hoc network is more vulnerable to several intrusions or attacks than the traditional system. Blackhole attack is an important routing disruption attack that malicious node advertises itself as part of a path to the destination. In this paper, we have simulated blackhole attack in ad hoc network environment and collected data of essential features for attack behaviors classification. Then, many machine learning techniques have applied for classification of benign and malicious packet information. It suggests a new approach for select features, essential information collection, and intrusion detection in ad hoc network using machine learning techniques. We have shown comparative results of different machine learning techniques. Our results indicate that this approach can use with different classifiers and can extend it with other intrusions.
Original languageEnglish
Title of host publicationBig Data, Machine Learning, and Applications. BigDML 2019
EditorsR. Patgiri, S. Bandyopadhyay, M.D. Borah, D.M. Thounaojam
Place of PublicationSwitzerland
PublisherSpringer Nature
Pages60-71
Number of pages12
ISBN (Electronic)9783030626259
ISBN (Print)9783030626242
DOIs
Publication statusPublished - 28 Nov 2020

Publication series

NameCommunications in Computer and Information Science
PublisherSpringer Nature
Volume1317
ISSN (Print)1865-0929

Keywords

  • intrusion detection
  • blackhole attack
  • ad hoc network
  • machine learning

Fingerprint

Dive into the research topics of 'Intrusion detection in ad hoc network using machine learning technique'. Together they form a unique fingerprint.

Cite this