SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 3, June 2020, pp. 2701~2709
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp2701-2709  2701
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
A technical review and comparative analysis of machine
learning techniques for intrusion detection systems in MANET
Safaa Laqtib1
, Khalid El Yassini2
, Moulay Lahcen Hasnaoui3
1,2
Informatics and Applications Laboratory (IA), Department of Mathematics and Computer Science,
Faculty of Sciences, Moulay Ismail University, Morocco
3
ISIC ESTM, L2MI Laboratory, ENSAM, Moulay Ismail University, Morocco
Article Info ABSTRACT
Article history:
Received Jun 28, 2019
Revised Nov 20, 2019
Accepted Dec 4, 2019
Machine learning techniques are being widely used to develop an intrusion
detection system (IDS) for detecting and classifying cyber attacks at
the network-level and the host-level in a timely and automatic manner.
However, Traditional Intrusion Detection Systems (IDS), based on
traditional machine learning methods, lacks reliability and accuracy. Instead
of the traditional machine learning used in previous researches, we think
deep learning has the potential to perform better in extracting features of
massive data considering the massive cyber traffic in real life. Generally
Mobile Ad Hoc Networks have given the low physical security for mobile
devices, because of the properties such as node mobility, lack of centralized
management and limited bandwidth. To tackle these security issues,
traditional cryptography schemes can-not completely safeguard MANETs in
terms of novel threats and vulnerabilities, thus by applying Deep learning
methods techniques in IDS are capable of adapting the dynamic
environments of MANETs and enables the system to make decisions on
intrusion while continuing to learn about their mobile environment. An IDS
in MANET is a sensoring mechanism that monitors nodes and network
activities in order to detect malicious actions and malicious attempt
performed by Intruders. Recently, multiple deep learning approaches have
been proposed to enhance the performance of intrusion detection system.
In this paper, we made a systematic comparison of three models, Inceprtion
architecture convolutional neural network (Inception-CNN), Bidirectional
long short-term memory (BLSTM) and deep belief network (DBN) on
the deep learning-based intrusion detection systems, using the NSL-KDD
dataset containing information about intrusion and regular network
connections, the goal is to provide basic guidance on the choice of deep
learning models in MANET.
Keywords:
Attack
BLSTM
DBN
Deep learning
Intrusion detection system IDS
Inception-CNN
MANET
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Laqtib Safaa,
Informatics and Applications Laboratory (IA),
Department of Mathematics and Computer Science, Faculty of Sciences,
Moulay Ismail University,
Meknes, Morocco.
Email: laq.safaa@gmail.com
1. INTRODUCTION
A Mobile ad hoc Network (MANET) is generally defined as a network that has many free or
autonomous nodes [1], often composed of mobile devices or other mobile nodes that can arrange themselves
in various ways and operate without strict top-down network administration. There are many different types
of setups that could be called MANET and the potential for this sort of network is still being studied. Inherent
vulnerability of Mobile ad hoc Networks introduces new security problems, which mostly address
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709
2702
the network and data link layer of the protocol stack. Because each packet must be passed through
intermediate nodes quickly, that packet has to travel from the source to the destination. Malicious routing
attacks may target the routing detection or maintenance process by failing to follow the specifications of
the routing protocol [2, 3]. This increases the possibility of attacks such as eavesdropping, spoofing, denial of
service, and impersonation. Compared to fixed networks, Mobile ad hoc Network security is taken into
account from various points such as availability, privacy, reliability, encryption, authentication, access
control, and usage control. Due to the prominent characteristics of Mobile ad hoc Networks, security methods
used to secure fixed networks are not feasible for MANET [4]. New threats such as attacks from internal
malicious nodes, Byzantine, and wormhole attacks are difficult to defend. An Intrusion Detection System
(IDS) is an effective way to identify when an attack occurs in a MANET.
For the above reasons, it is very important to deploy in MANET as a second line of defense an
intrusion detection system [5]. Intrusion detection systems (IDS) are a mechanism for monitoring and
investigating events occurring in a computer system. An IDS incorporates methods for modeling and
discovering abnormal behaviors and complex techniques. They try to determine whether or not the network is
going through any malicious activity. This is typically accomplished by gathering data automatically from
a variety of systems and network sources and then analyzing the information for potential security issues.
Current intrusion detection and prevention methods, such as firewalls, access control protocols and
authentication, have several drawbacks in defending networks and devices from ever more advanced attacks,
such as a denial of service [6]. However, most systems based on such techniques are suffering from high
false positive and false negative detection rates and lack of continuous adaptation to evolving malicious
behaviors. Deep learning, therefore, allows to quickly perform data analysis and visualization, the aim is to
enable the detection of device vulnerabilities and flaws by security professionals. Several Deep Learning
(DL) approaches have been applied to the issue of intrusion detection to increase detection rates and
adaptability. Such techniques are often used to establish the attacks existing and detailed knowledge base.
The remainder of this paper is organized as follows. Section 2 is dedicated to discuss Security
attacks in MANET. Then, Section 3 describes the intrusion detection system architectures in MANET.
Section 4 provides a deep learning models for intrusion detection system in MANET. In section 5
the experiments and resultas. In section 6 we conclude by conclusion.
2. SECURITY ATTACKS IN MANET
Compared to wired infrastructure networks, Mobile ad hoc Networks (MANET) [7] are more
vulnerable to attacks. MANET face more security threats than centralized networks due to their dynamic
topology and the lack of centralized network administration. In the Mobile ad hoc networks, several
characteristics could be used to classify attacks. Examples would include looking at the behavior of
the attacks (passive vs. active), the source of the attacks (external vs. internal).
In active attack, the attacker is actively involved in the network operations and tries to change
the messages being transmitted. By disrupting the entire network process, the attacker may modify, insert,
forge, drop data. The frequency of this attack is high because the whole network can be brought down [8].
They are easy to detect as the network performance degrades significantly. In passive attack, the attacker
does not corrupt the shared data but listens to it. They are attempting to gain confidential information and
analyze the traffic patterns transmitted. They are difficult to detect because they do not interrupt or modify
the information sent or received. It is also possible to classify the attacks into two categories depending on
the domain of the attacks, namely external attacks, and internal attacks. Internal attacks are carried out by
nodes that are not part of the domain of the network. External attacks are triggered by nodes that are already
part of the network. External attacks are more severe than internal attacks [9].
2.1. Denial of service attacks (DoS)
A denial of service attack is an attempt to make a machine or network resource unavailable to its
intended users [10, 11], such as to temporarily or indefinitely interrupt or suspend services of a host
connected to the Internet. This attack can be launched at different layers. the physical layer, network layer,
transport layer.
2.2. Remote to user attacks (R2L)
Occurs when an attacker does not have an account on the victim machine and attempts to gain
access by sending packets to a machine over a network in order to generate some vulnerability on that
machine that allows him/ her to gain local access as a user of that machine.
Int J Elec & Comp Eng ISSN: 2088-8708 
A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib)
2703
2.3. User to root attacks (U2R)
This attack occurs when normal system user illegally gains access to either root’s or super user’s
privileges such as Perl, xterm [12].
2.4. Probing
Probing occurs when an attacker scans a network in order to gather information or find known
vulnerabilities that allow him /her to hack the entire network. Usually, this method is used in information
mining such as saint, port sweep, Mscan, Nmap, etc [13].
3. INTRUSION DETECTION SYSTEM ARCHITECTURES IN MANET
Many intrusion detection systems (IDS) have been developed for MANET to detect various types of
attacks, IDS plays an important role in MANET to detect any type of attacks [14, 15]. An IDS is a software
system used to analyzes misbehavior and violation of policy, and then generate a report based on it,
Basically, intrusion detection system is classified into following three basic categories according to their
operational structure.
3.1. The standalone architecture
In this system, to determine intrusion, the intrusion detection system runs independently on
the individual node. All decisions made about a particular activity depend solely on information collected at
its own node, as there is no collaboration between nodes in the network [16]. Therefore, there is no transfer
of information. Even, as no alert information is transferred, a node in the same network does not have any
information about the other nodes in the network. Because of its limitations, this model is not efficient, it can
be used effectively in a network where all nodes already have an IDS installed. Compared to multi-layered
network infrastructure, this system is also suitable for single layer network. Since the information available
on any single node is not sufficient to detect intrusions, this system has not been chosen as MANET IDS.
3.2. The distributed and collaborative architecture
In this architecture, the intrusion detection engine is installed on each node in this architecture,
which monitors local audit data and detects intrusion We also participate in the cooperative detection and/or
response process by sharing audit information and/or detection results with neighboring nodes to solve
the problem. When the intrusion is captured, either a local response (e.g. alerting the local user) or a global
response may be issued by an IDS agent. Each node is involved in the method and response of intrusion
detection as having an IDS agent running on it [17]. An IDS agent is responsible for detecting and collecting
local information and data in order to identify any attack if an attack occurs in the network, as well as taking
an independent response. However, when the evidence is non-conclusive, neighboring IDS agents also
cooperate in global intrusion detection. This system, like standalone IDS, is also more suitable for flat
network systems, not multi-layer systems.
3.3. The hierarchical IDS intrusion detection architecture
Hierarchical IDS system Expand the distributed and cooperative IDS system functions and have been
implemented for multi-layer network infrastructures where the network is divided into various small
networks known as clusters. Usually, each cluster head has more functionality than other cluster members,
such as transmitting data packets to other clusters. We can therefore say that these cluster heads work in
some way as central points similar to wired network control devices such as routers, switches or gateways.
The multi- layering concept applies to intrusion detection systems where there is a proposal for hierarchical
IDS. Each IDS agent runs on a specific member node and is responsible for its node, i.e. monitoring and
deciding on intrusions detected locally. A cluster head is responsible for their node locally as well as globally
for their cluster, such as monitoring network traffic and announcing a global response when detecting
network intrusion [18].
4. DEEP LEARNING MODELS FOR INTRUSION DETECTION SYSTEM IN MANET
Deep learning is a class of Machine learning algorithms that uses multiple layers to progressively
extract higher level features from the raw input. The aim is to make machines like computers think and
understand how humans think by imitating the grid of the human brain connection, Deep learning
architectures such as deep neural networks, deep belief networks, recurrent neural networks and
convolutional neural networks have been applied to fields including computer vision, speech recognition,
natural language processing, audio recognition, social network filtering, machine translation, bioinformatics,
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709
2704
drug design, medical image analysis, material inspection and board game programs, where they have
produced results comparable to and in some cases superior to human experts [19]. Supervised learning
algorithm is applied to a dataset that has features and each of those features associated with a label. However,
deep learning algorithms comes under unsupervised learning algorithms which are applied to a dataset which
has many features in order to learn useful properties from the structure of the dataset [20].
The Security applications of deep learning models like Intrusion Detection System (IDS), malware
detection, spam-filtering have become essentials in designing tasks for data protection, classification, and
prediction. These different types of tasks depending on the intelligence to build a model that usually classifies
and discriminates between samples of "benign" and "malign," such as attacks and benign packets [21].
The complexity of attack techniques tools is increased with the rapid increase with the use of Deep learning
models.There are lots of popular variants of Deep learning models like CNNs and RNNs. To solve
the hardness of training, BLSTM is proposed to alleviate some limitations of the basic RNN, Inception
convolutional neural network (CNN) which a variant of basic CNN and deep belief network (DBN).
This section gives a brief introduction of the models we have used in our experiments: the inception
architecture CNN, BLSTM and DBN [22].
4.1. The inception architecture CNN
Szegedy et al [23] suggest the Inception architecture CNN to solve the problem of a large number of
parameters and speed up the learning of CNN. An Inception network is typically a network consisting of
modules of the above type stacked on each other, with occasional max-pooling layers with phase two to halve
grid resolution. It seemed useful to start using Inception modules only at higher layers for technical reasons
(memory capacity during training) while retaining the lower layers in traditional convolutional fashion.
As we can see in Figure 1, the 1x1 convolutions are used to compute reductions before the expensive
3x3 and 5x5 convolutions. Besides being used as reductions, they also include the use of rectified linear
activation which makes them dual-purpose [24]. One of the main benefits of this architecture is that it makes
it possible to dramatically increase the number of units at each stage without an uncontrolled blow-up in
computational complexity. Another practically useful aspect of this design is that it is in line with
the principle that visual information should be processed on different scales and then aggregated so that
the next stage can simultaneously abstract features from different scales. The improved use of computational
resources allows for increasing both the width of each stage as well as the number of stages without getting
into computational difficulties. Another way to utilize the inception architecture is to create slightly inferior,
but computationally cheaper versions of it.
Figure 1. Architecture of the inception module with dimentions reductions [25]
4.2. Bidirectional long short-term memory (BLSTM)
Instead of running an RNN only in the forward mode starting from the first symbol, we start another
one from the last symbol running from back to front. Bidirectional recurrent neural networks introduce
a hidden layer to more robust processes by passing information in a reverse direction. Figure 2 illustrates
the architecture of a bidirectional recurrent neural network. In fact, this is not too dissimilar to the forward
and backward recursion we encountered above. The main distinction is that in the previous case these
equations had a specific statistical meaning. Now they are devoid of such easily accessible interpretaton and

Recommended for you

Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP

In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.

multi- agentmibsnmp
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems

Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. It has been implemented in VC++. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.

attacksinformation securityintruders
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic

This document summarizes a research paper on current studies of intrusion detection systems using genetic algorithms and fuzzy logic. The paper presents an overview of intrusion detection systems, including different techniques like misuse detection and anomaly detection. It discusses using genetic algorithms to generate fuzzy rules to characterize normal and abnormal network behavior in order to reduce false alarms. The paper also outlines the dataset, genetic algorithm approach, and use of fuzzy logic that are proposed for the intrusion detection system.

Int J Elec & Comp Eng ISSN: 2088-8708 
A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib)
2705
we can just treat them as generic functions. This transition epitomizes many of the principles guiding
the design of modern deep networks: first, use the type of functional dependencies of classical statistical
models, and then use the models in a generic form [26].
Figure 2. Architecture of BLSTM [27]
4.3. Deep belief network (DBN)
To overcome the overfitting problem in Multi-Layer Perceptron (MLP), we can set up a DBN,
do unsupervised pretraining to get a decent set of feature representations for the inputs, then finetune on
the training set to actually get predictions from the network. While weights of an MLP are initialized
randomly, a DBN uses a greedy layer-by-layer pretraining algorithm to initialize the network weights through
probabilistic generative models composed of a visible layer and multiple layers of stochastic, latent variables,
which are called hidden units or feature detectors. Restricted Boltzmann Machines (RBM) in the DBN are
stacked, forming an undirected probabilistic graphical model similar to Markov Random Fields (MRF):
the two layers are composed of visible neurons and then hidden neurons. The top two layers in a stacked
RBM have undirected, symmetric connections between them and form an associative memory, whereas lower
layers receive top-down, directed connections from the layer above. A hybrid model is established by
stacking up RBMs, as illustrated in Figure 3. The top two layers form the RBM and the lower layers form
a directed belief net [28]. This hybrid model is called a deep belief network (DBN). The deep-belief-network
is a simple, clean, fast Python implementation of deep belief networks based on binary Restricted Boltzmann
Machines (RBM). In our case, it was based on NumPy and TensorFlow libraries to take advantage of GPU
computation.
Figure 3. Hybrid model of the DBN after greedy layer-wise learning. The top two layers form the RBM and
the bottom layers form a directed belief network [29]
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709
2706
5. EXPERIMENT AND RESULTS
5.1. Data preprocessing
The methodology discussed in this paper is applied on the entire NSL-KDD dataset. The NSL-KDD
dataset was proposed to deal with inherent problems of the KDD Cup 1999 dataset which contain too many
redundant records. An example of dataset record is ‘0 tcp ftp_data SF 491 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2
0 0 0 0 1 0 0 150 25 0.17 0.03 0.17 0 0 0 0.05 0 normal’. As you can see, data contains some text values
also. Pre-processing of original NSL-KDD dataset is necessary to make it a suitable input for learning
models. We need to transform the nominal features to numeric values. Only column number
2(Protocol_type), 3(Services), 4(Flag) and 42(Attack or Normal) contains nominal values [30].
5.2. Evaluation metrics
For evaluation purposes, Accuracy (ACC), Precision (P), Recall (R) metrics are used. These metrics
are calculated by using four different measures, true positive (TP), true negative (TN), false positive (FP)
and false negative (FN). Accuracy is the percentage of the records number classified correctly over total
the records. Precision means the percentage of your results which are relevant. On the other hand, recall
refers to the percentage of total relevant results correctly classified by your algorithm [31].
True Positive Rate (TPR): also known as Detection Rate (DR) is the percentage of the anomaly
records number correctly flagged as anomaly over the total number of anomaly records in (4):
Accuracy =
TP+TN
TP+FP+FN+TN
(1)
Precision =
TP
TP+FP
(2)
Recall =
TP
TP+Fn
(3)
DR = TPR =
TP
TP+Fn
(4)
False Positive Rate (FPR): the percentage of the normal records number wrongly flagged as
anomaly is divided by the total number of normal records in (5) [32].
FPR =
FP
FP+TN
(5)
5.3. Comparative study of three deep learning models-based intrusion detection system
The research on security issues relating to IDS exists since the birth of computer architectures.
In recent days, applying deep learning to IDS is of prime interest among security researchers and specialists.
A comparative study of three deep learning models, Inception convolutional neural network (CNN),
Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) applied to IDS.
Tables 1-3 illustrate the accuracy, precision, and recall of our three deep learning models in KDD+
and KDD-21, as we can see that the inception CNN and BLSTM exceed the DBN. Figures 4-7 provide
a comparison of the experimental results of Tables 1-3. From the results, we could find that the inception
architecture CNN got the highest overall accuracy (ACC). Besides, the BLSTM model surpassed the DBN
model on both the overall precision and overall recall rate in KDD+ and KDD-21. Although the DBN model
performed worse than the other three models on ACC, precision, recall rate in KDD+ and KDD-21,
it obviously failed on information on the attack. The proper explanation that BLSTM tried a lot on
the whole sequence comprehension and Inception-CNN could extract the key information more quickly.
Inception-CNN and BLSTM perform better than DBN. In theory, DBN should be the best model but it is
very hard to estimate joint probabilities accurately at the moment.
We found that all three models had good performance on the Normal data and DoS data and Probe.
Table 4 shows the DR of KDDTest+; Table 5 shows the FPR of KDDTest+; Table 6 shows the DR of
KDDTest-21; Table 7 shows the FPR of KDDTest-21. Results in Tables 4, 5, 6 and 7 compare DR and FPR
of KDDTest+ and KDDTest-21 we can conclude that the Inception-CNN and BLSTM provide better results
in DR and FPR compared to DBN, we can find that results of R2L and U2R are relatively quite small for all
models, which might because of the insufficiency of their records in the dataset. However, the models still
can detect some of them. Bidirectional long short-term memory (BLSTM) and Inception-CNN, are used to
detect anomalies in sequence. The results show that the Inception-CNN and BLSTM showed superiority over
the other DBN model. We tie that to the fact that Inception-CNN and BLSTM has the ability to define normal
behavior from large datasets and can be used to detect a new unseen threat. It can be concluded that if one
only wants to classify the network traffic as normal or attack, Inception CNN or BLSTM they will be
a better choice.
Int J Elec & Comp Eng ISSN: 2088-8708 
A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib)
2707
Table 1. Accuracy for each model
Inception-
CNN
BLSTM DBN
KDDTest+ 88,03% 84,03% 71.91%
KDDTest–21 73.98% 75.36% 66.73%
Table 2. Precision for each model
Inception-
CNN
BLSTM DBN
KDDTest+ 85.90% 93.98% 73.86%
KDDTest–21 83.66% 77.89% 74,.65%
Table 3. Recall for each model
Inception-
CNN
BLSTM DBN
KDDTest+ 85.58% 86.01% 80.67%
KDDTest–21 72.11% 72.98% 69,23%
Table 4. DR of KDD Test+
Normal Dos Probe R2L U2R
Inception-CNN 88.468% 69.548% 61.357% 18.579% 22.348%
BLSTM 87.975% 71.576% 63.574% 29.110% 24.022%
DBN 79.697% 66.241% 57.957% 16.436% 17.043%
Table 5. FPR of KDD Test+
Normal Dos Probe R2L U2R
Inception- CNN 28.576% 28.622% 6.061% 2.178% 0.063%
BLSTM 65.448% 24.659% 10.323% 7.810% 0.082%
DBN 46.533% 25.2108% 14.073% 6.073% 1.065%
Table 6. DR of KDD Test- 21
Normal Dos Probe R2L U2R
Inception-CNN 95.870% 77.182% 67.245% 22.323% 20.819%
BLSTM 82.451% 67.584% 61.865% 20.567% 21.634%
DBN 72.211% 54.987% 60.773% 16.765% 19.984%
Table 7. FPR of KDD Test- 21
Normal Dos Probe R2L U2R
Inception-CNN 36.870% 14.53% 2.357% 0.479% 0.068%
BLSTM 51.975% 19.576% 7.574% 1.110% 0.022%
DBN 63.432% 22.653% 7.325% 2.972% 1.086%
Figure 4. Accuracy, precision and recall of
KDDTest+
Figure 5. DR of KDDTest+ using inception-CNN,
BLSTM, DBN
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709
2708
Figure 6. Accuracy, precision and recall of
KDDTest-21
Figure 7. DR of KDDTest-21 using inception-CNN,
BLSTM, DBN
6. CONCLUSION
Recently, Deep learning for intrusion detection system has received much deliberation. In any IDS,
audit data samples are analyzed to set detection rules in highly mobile node network to protect against
number of novel attacks. The primary advantage of using Deep learning based intrusion detection systems is
that it is highly accurate and able to detect or categorize attacks without any environmental influence.
Different Deep learning based IDS approaches have their own benefits and disadvantages. Therefore,
considering the MANET scenarios, it is important to choose a precise method for implementing IDS.
This paper is motivated by the need to develop good training algorithms for deep architectures-based
IDS, since these can be much more representationally efficient than shallow ones such as SVMs and one-
hiddenlayer neural nets. which may be proved important for selecting the appropriate methods on bases of
the situation in MANET. In this work, the practical problems of existing IDS have been addressed and
different Deep Learning models (Inception-CNN, BLSTM and Deep Belief model) are compared to solve
these problems. The models have been implemented and tested on NSL-KDD dataset. The reason behind
the superiority of Inception-CNN in general that, it’s the ability to define normal behavior from a large
dataset and can be used to detect a new unseen threat. This work can be extended in two directions: first,
implement other deep models and create hybrid models and voting systems across different models to detect
and recognize low false alarm threats. Second, provide existing systems with real-world data for multiple
networks in such a way that the model can increase its accuracy by adapting the definition of normal
activities through different un-calibrated datasets.
REFERENCES
[1] E. Amiri, H. Keshavarz, H. Heidari, E. Mohamadi, and H. Moradzadeh, “Intrusion Detection Systems in MANET:
A Review,” Procedia - Social and Behavioral Sciences, vol. 129, pp. 453–459, 2014.
[2] S. Laqtib, K. E. Yassini, M. Houmer, M. D. E. Ouadghiri, and M. L. Hasnaoui, “Impact of mobility models on
Optimized Link State Routing Protocol in MANET,” 2016 International Conference on Wireless Networks and
Mobile Communications (WINCOM), 2016.
[3] S. Laqtib, K. E. Yassini, and M. L. Hasnaoui, “Performance Evaluation of Multicast Routing Protocols in
MANET,” in International Conference on Advanced Intelligent Systems for Sustainable Development, Springer,
Cham, 2018.
[4] S. Laqtib, K. E. Yassini, and M. L. Hasnaoui, “Link-state QoS routing protocol under various mobility
models,” Indonesian Journal of Electrical Engineering and Computer Science Science (IJEECS), vol. 16, no. 2,
pp. 906-916, Nov. 2019.
[5] I. Butun, S. Morgera and R. Sankar, “A Survey of Intrusion Detection Systems in Wireless Sensor Networks,”
IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, 2014.
[6] S. Iqbal, M. L. M. Kiah, B. Dhaghighi, M. Hussain, S. Khan, M. K. Khan, and K.-K. R. Choo, “On cloud security
attacks: A taxonomy and intrusion detection and prevention as a service,” Journal of Network and Computer
Applications, vol. 74, pp. 98–120, 2016.
[7] A. Fudholi and K. Sopian, “Review on Solar Collector for Agricultural Produce,” International Journal of Power
Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 414-419, Jan. 2018.
[8] T. Laagoubi, M. Bouzi, and M. Benchagra, “MPPT and Power Factor Control for Grid Connected PV Systems with
Fuzzy Logic Controllers,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1,
pp. 105-113, Jan. 2018.

Recommended for you

Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System

With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system or network activities for malicious activities or policy violations. It produces reports to a management station [1]. In this paper we are mainly focused on different IDS concepts based on Host and Network systems.

intrusionnetwork based intrusion detection system (nids)host based intrusion detection system (hids)
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...

IEEE 802.16, known as WiMax, is at the top of communication technology because it is gaining a great position in the wireless networks. In this paper, an intrusion detection system for DDOS attacks diagnosis is proposed, inspired by artificial immune system. Since the detection unit on all subscriber stations in the network is WIMAX, proposed system is a fully distributed system. A risk theory is used for antigens detection in attack time. The proposed system decreases the attack effects and increases network performance. Results of simulation show that the proposed system improves negative selection time, detection Precision, and ability to identify new attacks compared to the similar algorithm.

wimax networkartificial immune systemddos attack
M026075079
M026075079M026075079
M026075079

This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.

Int J Elec & Comp Eng ISSN: 2088-8708 
A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib)
2709
[9] A. Fudholi, et. al., “Primary Study of Tracking Photovoltaic System for Mobile Station in Malaysia,” International
Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 427-432, Jan. 2018.
[10] A. Fudholi and K. Sopian, “Review on Exergy and Energy Analysis of Solar Air Heater,” International Journal of
Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 420-426, Jan. 2018.
[11] S. Suraya, P. S. Sujatha, and B. K. P, “A Novel Control Strategy for Compensation of Voltage Quality Problem in
AC Drives,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 8-16, 2018.
[12] S. Samadi, et. al., “Optimum range of angle tracking radars: a theoretical computing,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1765, Jan. 2019.
[13] T. Zaidi and R. Rampratap, “Virtual Machine Allocation Policy in Cloud Computing Environment using
CloudSim,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 344-454,
Jan. 2018.
[14] G. S. N. Rao, et. al., “Dynamic Time Slice Calculation for Round Robin Process Scheduling Using NOC,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 5, no. 6, pp. 1480-1485, Jan. 2015.
[15] A. Oukennou, A. Sandali, and S. Elmoumen, “Coordinated Placement and Setting of FACTS in Electrical Network
based on Kalai-smorodinsky Bargaining Solution and Voltage Deviation Index,” International Journal of Electrical
and Computer Engineering (IJECE), vol. 8, no. 6, pp. 4079-4088, Jan. 2018.
[16] A. Othman, N.I.S. Shaari, A.M. Zobilah, N.A. Shairi, Z. Zakaria, “Design of Compact Ultra Wideband Antenna for
Microwave Medical Imaging Application,” Indonesian Journal of Electrical Engineering and Computer Science
(IJEECS), vol. 15, no. 3, pp. 1197-1202, Sep. 2019.
[17] N. Batayev, “Axial Compressor Fouling Detection for Gas Turbine Driven Gas Compression Unit,” Indonesian
Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1257-1263, Sep. 2019.
[18] djelloul kheira, “Performance of channel selection used for Multi-class EEG signal classification of motor
imagery,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3,
pp. 1305-1312, Sep. 2019.
[19] S.H. Ahammad, “Automatic Segmentation of Spinal Cord Diffusion MR Images for disease location finding,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1313-1321,
Sep. 2019.
[20] M. Lalaoui, A.E. Afia, R. Chiheb, “A Self-Tuned Simulated Annealing Algorithm Using Hidden Markov Model,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 291-298, Jan. 2018.
[21] A. Fudholi and K. Sopian, “Review on Solar Collector for Agricultural Produce,” International Journal of Power
Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 414-419, Jan. 2018.
[22] A.F. Majid, Y. Mukhlis, “Aperture Coupling Rectangular Slotted Circular Ring Microstrip Patch Antenna,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1419-1427,
Sep. 2019.
[23] Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan,
Vincent Vanhoucke, Andrew Rabinovich, “MPPT Going deeper with convolutions,” Conference on Computer
Vision and Pattern Recognition (CVPR). IEEE Conference on 2015.
[24] Fudholi, Ahmad, and Kamaruzzaman Sopian, “Review on exergy and energy analysis of solar air heater,”
International Journal of Power Electronics and Drive Systems(IJPEDS), vol. 9, no. 1, pp. 420-426, 2018.
[25] Kuchibhatla, Samanthaka Mani, D. Padmavathi, and R. Srinivasa Rao, “Effect of Carrier Frequency in Grid Inter
Connected Wind System with SSFC Controller,” International Journal of Power Electronics and Drive Systems
(IJPEDS), vol. 9, no. 3, pp. 1349-1355, 2018.
[26] Neethu B, “Classification of intrusion detection dataset using machine learning approaches,” International Journal
of Electronics and Computer Science Engineering, pp. 1044-1051, 2012.
[27] Ramkumar, Purigilla Venkata, and Munagala Surya Kalavathi, “Fractional Order PID Controlled Interleaved Boost
converter Fed Shunt Active Filter System,” International Journal of Power Electronics and Drive Systems
(IJPEDS), vol. 9, no. 1, pp. 126-138, 2018.
[28] Pane, Syafrial Fachri, et al., “RFID-based conveyor belt for improve warehouse operations,” TELKOMNIKA
(Telecommunication Computing Electronics and Control), vol. 17, no. 2, pp. 794-800, 2019.
[29] Mohsen, Mowafak K., et al., “Electronically controlled radiation pattern leaky wave antenna array for
(C band) application,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 2,
pp. 573-579, 2019.
[30] Rahardja, Untung, Eka Purnama Harahap, and Shylvia Ratna Dewi, “The strategy of enhancing article citation and
H-index on SINTA to improve tertiary reputation,” TELKOMNIKA (Telecommunication Computing Electronics
and Control), vol. 17, no. 2, pp. 683-692, 2019.
[31] Zainuri, Akhmad, et al., “VRLA battery state of health estimation based on charging time,” TELKOMNIKA
(Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1577-1583, 2019.
[32] H. Setti, et. al., “A new configuration of a printed diplexer designed for DCS and ISM bands,” TELKOMNIKA
(Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1090-1095, Jan. 2019.

More Related Content

What's hot

Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
IJERA Editor
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
Manasa Deshaboina
 
Context-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsContext-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETs
IDES Editor
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
IJNSA Journal
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
CSCJournals
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
ijdpsjournal
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
Eswar Publications
 
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
Editor IJCATR
 
M026075079
M026075079M026075079
M026075079
ijceronline
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
1776 1779
1776 17791776 1779
1776 1779
Editor IJARCET
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
nicfs
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...
redpel dot com
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
IJNSA Journal
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
IJNSA Journal
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
IAEME Publication
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
IJCI JOURNAL
 

What's hot (18)

Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Context-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsContext-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETs
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
 
M026075079
M026075079M026075079
M026075079
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
1776 1779
1776 17791776 1779
1776 1779
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
 

Similar to A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET

HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...
IJECEIAES
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
International Journal of Engineering Inventions www.ijeijournal.com
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
ClaraZara1
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
Jennifer Wood
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Eswar Publications
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
ijceronline
 
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMCYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
ijistjournal
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
IJNSA Journal
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
Kelly Taylor
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
IJCNCJournal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
IJERA Editor
 
40120140502001
4012014050200140120140502001
40120140502001
IAEME Publication
 
A review on machine learning based intrusion detection system for internet of...
A review on machine learning based intrusion detection system for internet of...A review on machine learning based intrusion detection system for internet of...
A review on machine learning based intrusion detection system for internet of...
IJECEIAES
 
1776 1779
1776 17791776 1779
1776 1779
Editor IJARCET
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
IJECEIAES
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System

Similar to A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET (20)

HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...Three level intrusion detection system based on conditional generative advers...
Three level intrusion detection system based on conditional generative advers...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMCYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
40120140502001
4012014050200140120140502001
40120140502001
 
A review on machine learning based intrusion detection system for internet of...
A review on machine learning based intrusion detection system for internet of...A review on machine learning based intrusion detection system for internet of...
A review on machine learning based intrusion detection system for internet of...
 
1776 1779
1776 17791776 1779
1776 1779
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 

More from IJECEIAES

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
IJECEIAES
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zoneA review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
IJECEIAES
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 

More from IJECEIAES (20)

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zoneA review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 

Recently uploaded

Software Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project ManagementSoftware Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project Management
Prakhyath Rai
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
Mani Krishna Sarkar
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
sanabts249
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model SafeBangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
bookhotbebes1
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Bert Blevins
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
Mani Krishna Sarkar
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
KishorMahale5
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
IJAEMSJORNAL
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
pavanaroshni1977
 
kiln burning and kiln burner system for clinker
kiln burning and kiln burner system for clinkerkiln burning and kiln burner system for clinker
kiln burning and kiln burner system for clinker
hamedmustafa094
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
Kamal Acharya
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
ProexportColombia1
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
Blesson Easo Varghese
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
Celine George
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
sharvaridhokte
 
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
binna singh$A17
 
Conservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic RegenerationConservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic Regeneration
PriyankaKarn3
 
Lecture 3 Biomass energy...............ppt
Lecture 3 Biomass energy...............pptLecture 3 Biomass energy...............ppt
Lecture 3 Biomass energy...............ppt
RujanTimsina1
 

Recently uploaded (20)

Software Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project ManagementSoftware Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project Management
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model SafeBangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
 
kiln burning and kiln burner system for clinker
kiln burning and kiln burner system for clinkerkiln burning and kiln burner system for clinker
kiln burning and kiln burner system for clinker
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
 
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
 
Conservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic RegenerationConservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic Regeneration
 
Lecture 3 Biomass energy...............ppt
Lecture 3 Biomass energy...............pptLecture 3 Biomass energy...............ppt
Lecture 3 Biomass energy...............ppt
 

A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 3, June 2020, pp. 2701~2709 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp2701-2709  2701 Journal homepage: http://ijece.iaescore.com/index.php/IJECE A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET Safaa Laqtib1 , Khalid El Yassini2 , Moulay Lahcen Hasnaoui3 1,2 Informatics and Applications Laboratory (IA), Department of Mathematics and Computer Science, Faculty of Sciences, Moulay Ismail University, Morocco 3 ISIC ESTM, L2MI Laboratory, ENSAM, Moulay Ismail University, Morocco Article Info ABSTRACT Article history: Received Jun 28, 2019 Revised Nov 20, 2019 Accepted Dec 4, 2019 Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET. Keywords: Attack BLSTM DBN Deep learning Intrusion detection system IDS Inception-CNN MANET Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Laqtib Safaa, Informatics and Applications Laboratory (IA), Department of Mathematics and Computer Science, Faculty of Sciences, Moulay Ismail University, Meknes, Morocco. Email: laq.safaa@gmail.com 1. INTRODUCTION A Mobile ad hoc Network (MANET) is generally defined as a network that has many free or autonomous nodes [1], often composed of mobile devices or other mobile nodes that can arrange themselves in various ways and operate without strict top-down network administration. There are many different types of setups that could be called MANET and the potential for this sort of network is still being studied. Inherent vulnerability of Mobile ad hoc Networks introduces new security problems, which mostly address
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709 2702 the network and data link layer of the protocol stack. Because each packet must be passed through intermediate nodes quickly, that packet has to travel from the source to the destination. Malicious routing attacks may target the routing detection or maintenance process by failing to follow the specifications of the routing protocol [2, 3]. This increases the possibility of attacks such as eavesdropping, spoofing, denial of service, and impersonation. Compared to fixed networks, Mobile ad hoc Network security is taken into account from various points such as availability, privacy, reliability, encryption, authentication, access control, and usage control. Due to the prominent characteristics of Mobile ad hoc Networks, security methods used to secure fixed networks are not feasible for MANET [4]. New threats such as attacks from internal malicious nodes, Byzantine, and wormhole attacks are difficult to defend. An Intrusion Detection System (IDS) is an effective way to identify when an attack occurs in a MANET. For the above reasons, it is very important to deploy in MANET as a second line of defense an intrusion detection system [5]. Intrusion detection systems (IDS) are a mechanism for monitoring and investigating events occurring in a computer system. An IDS incorporates methods for modeling and discovering abnormal behaviors and complex techniques. They try to determine whether or not the network is going through any malicious activity. This is typically accomplished by gathering data automatically from a variety of systems and network sources and then analyzing the information for potential security issues. Current intrusion detection and prevention methods, such as firewalls, access control protocols and authentication, have several drawbacks in defending networks and devices from ever more advanced attacks, such as a denial of service [6]. However, most systems based on such techniques are suffering from high false positive and false negative detection rates and lack of continuous adaptation to evolving malicious behaviors. Deep learning, therefore, allows to quickly perform data analysis and visualization, the aim is to enable the detection of device vulnerabilities and flaws by security professionals. Several Deep Learning (DL) approaches have been applied to the issue of intrusion detection to increase detection rates and adaptability. Such techniques are often used to establish the attacks existing and detailed knowledge base. The remainder of this paper is organized as follows. Section 2 is dedicated to discuss Security attacks in MANET. Then, Section 3 describes the intrusion detection system architectures in MANET. Section 4 provides a deep learning models for intrusion detection system in MANET. In section 5 the experiments and resultas. In section 6 we conclude by conclusion. 2. SECURITY ATTACKS IN MANET Compared to wired infrastructure networks, Mobile ad hoc Networks (MANET) [7] are more vulnerable to attacks. MANET face more security threats than centralized networks due to their dynamic topology and the lack of centralized network administration. In the Mobile ad hoc networks, several characteristics could be used to classify attacks. Examples would include looking at the behavior of the attacks (passive vs. active), the source of the attacks (external vs. internal). In active attack, the attacker is actively involved in the network operations and tries to change the messages being transmitted. By disrupting the entire network process, the attacker may modify, insert, forge, drop data. The frequency of this attack is high because the whole network can be brought down [8]. They are easy to detect as the network performance degrades significantly. In passive attack, the attacker does not corrupt the shared data but listens to it. They are attempting to gain confidential information and analyze the traffic patterns transmitted. They are difficult to detect because they do not interrupt or modify the information sent or received. It is also possible to classify the attacks into two categories depending on the domain of the attacks, namely external attacks, and internal attacks. Internal attacks are carried out by nodes that are not part of the domain of the network. External attacks are triggered by nodes that are already part of the network. External attacks are more severe than internal attacks [9]. 2.1. Denial of service attacks (DoS) A denial of service attack is an attempt to make a machine or network resource unavailable to its intended users [10, 11], such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. This attack can be launched at different layers. the physical layer, network layer, transport layer. 2.2. Remote to user attacks (R2L) Occurs when an attacker does not have an account on the victim machine and attempts to gain access by sending packets to a machine over a network in order to generate some vulnerability on that machine that allows him/ her to gain local access as a user of that machine.
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib) 2703 2.3. User to root attacks (U2R) This attack occurs when normal system user illegally gains access to either root’s or super user’s privileges such as Perl, xterm [12]. 2.4. Probing Probing occurs when an attacker scans a network in order to gather information or find known vulnerabilities that allow him /her to hack the entire network. Usually, this method is used in information mining such as saint, port sweep, Mscan, Nmap, etc [13]. 3. INTRUSION DETECTION SYSTEM ARCHITECTURES IN MANET Many intrusion detection systems (IDS) have been developed for MANET to detect various types of attacks, IDS plays an important role in MANET to detect any type of attacks [14, 15]. An IDS is a software system used to analyzes misbehavior and violation of policy, and then generate a report based on it, Basically, intrusion detection system is classified into following three basic categories according to their operational structure. 3.1. The standalone architecture In this system, to determine intrusion, the intrusion detection system runs independently on the individual node. All decisions made about a particular activity depend solely on information collected at its own node, as there is no collaboration between nodes in the network [16]. Therefore, there is no transfer of information. Even, as no alert information is transferred, a node in the same network does not have any information about the other nodes in the network. Because of its limitations, this model is not efficient, it can be used effectively in a network where all nodes already have an IDS installed. Compared to multi-layered network infrastructure, this system is also suitable for single layer network. Since the information available on any single node is not sufficient to detect intrusions, this system has not been chosen as MANET IDS. 3.2. The distributed and collaborative architecture In this architecture, the intrusion detection engine is installed on each node in this architecture, which monitors local audit data and detects intrusion We also participate in the cooperative detection and/or response process by sharing audit information and/or detection results with neighboring nodes to solve the problem. When the intrusion is captured, either a local response (e.g. alerting the local user) or a global response may be issued by an IDS agent. Each node is involved in the method and response of intrusion detection as having an IDS agent running on it [17]. An IDS agent is responsible for detecting and collecting local information and data in order to identify any attack if an attack occurs in the network, as well as taking an independent response. However, when the evidence is non-conclusive, neighboring IDS agents also cooperate in global intrusion detection. This system, like standalone IDS, is also more suitable for flat network systems, not multi-layer systems. 3.3. The hierarchical IDS intrusion detection architecture Hierarchical IDS system Expand the distributed and cooperative IDS system functions and have been implemented for multi-layer network infrastructures where the network is divided into various small networks known as clusters. Usually, each cluster head has more functionality than other cluster members, such as transmitting data packets to other clusters. We can therefore say that these cluster heads work in some way as central points similar to wired network control devices such as routers, switches or gateways. The multi- layering concept applies to intrusion detection systems where there is a proposal for hierarchical IDS. Each IDS agent runs on a specific member node and is responsible for its node, i.e. monitoring and deciding on intrusions detected locally. A cluster head is responsible for their node locally as well as globally for their cluster, such as monitoring network traffic and announcing a global response when detecting network intrusion [18]. 4. DEEP LEARNING MODELS FOR INTRUSION DETECTION SYSTEM IN MANET Deep learning is a class of Machine learning algorithms that uses multiple layers to progressively extract higher level features from the raw input. The aim is to make machines like computers think and understand how humans think by imitating the grid of the human brain connection, Deep learning architectures such as deep neural networks, deep belief networks, recurrent neural networks and convolutional neural networks have been applied to fields including computer vision, speech recognition, natural language processing, audio recognition, social network filtering, machine translation, bioinformatics,
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709 2704 drug design, medical image analysis, material inspection and board game programs, where they have produced results comparable to and in some cases superior to human experts [19]. Supervised learning algorithm is applied to a dataset that has features and each of those features associated with a label. However, deep learning algorithms comes under unsupervised learning algorithms which are applied to a dataset which has many features in order to learn useful properties from the structure of the dataset [20]. The Security applications of deep learning models like Intrusion Detection System (IDS), malware detection, spam-filtering have become essentials in designing tasks for data protection, classification, and prediction. These different types of tasks depending on the intelligence to build a model that usually classifies and discriminates between samples of "benign" and "malign," such as attacks and benign packets [21]. The complexity of attack techniques tools is increased with the rapid increase with the use of Deep learning models.There are lots of popular variants of Deep learning models like CNNs and RNNs. To solve the hardness of training, BLSTM is proposed to alleviate some limitations of the basic RNN, Inception convolutional neural network (CNN) which a variant of basic CNN and deep belief network (DBN). This section gives a brief introduction of the models we have used in our experiments: the inception architecture CNN, BLSTM and DBN [22]. 4.1. The inception architecture CNN Szegedy et al [23] suggest the Inception architecture CNN to solve the problem of a large number of parameters and speed up the learning of CNN. An Inception network is typically a network consisting of modules of the above type stacked on each other, with occasional max-pooling layers with phase two to halve grid resolution. It seemed useful to start using Inception modules only at higher layers for technical reasons (memory capacity during training) while retaining the lower layers in traditional convolutional fashion. As we can see in Figure 1, the 1x1 convolutions are used to compute reductions before the expensive 3x3 and 5x5 convolutions. Besides being used as reductions, they also include the use of rectified linear activation which makes them dual-purpose [24]. One of the main benefits of this architecture is that it makes it possible to dramatically increase the number of units at each stage without an uncontrolled blow-up in computational complexity. Another practically useful aspect of this design is that it is in line with the principle that visual information should be processed on different scales and then aggregated so that the next stage can simultaneously abstract features from different scales. The improved use of computational resources allows for increasing both the width of each stage as well as the number of stages without getting into computational difficulties. Another way to utilize the inception architecture is to create slightly inferior, but computationally cheaper versions of it. Figure 1. Architecture of the inception module with dimentions reductions [25] 4.2. Bidirectional long short-term memory (BLSTM) Instead of running an RNN only in the forward mode starting from the first symbol, we start another one from the last symbol running from back to front. Bidirectional recurrent neural networks introduce a hidden layer to more robust processes by passing information in a reverse direction. Figure 2 illustrates the architecture of a bidirectional recurrent neural network. In fact, this is not too dissimilar to the forward and backward recursion we encountered above. The main distinction is that in the previous case these equations had a specific statistical meaning. Now they are devoid of such easily accessible interpretaton and
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib) 2705 we can just treat them as generic functions. This transition epitomizes many of the principles guiding the design of modern deep networks: first, use the type of functional dependencies of classical statistical models, and then use the models in a generic form [26]. Figure 2. Architecture of BLSTM [27] 4.3. Deep belief network (DBN) To overcome the overfitting problem in Multi-Layer Perceptron (MLP), we can set up a DBN, do unsupervised pretraining to get a decent set of feature representations for the inputs, then finetune on the training set to actually get predictions from the network. While weights of an MLP are initialized randomly, a DBN uses a greedy layer-by-layer pretraining algorithm to initialize the network weights through probabilistic generative models composed of a visible layer and multiple layers of stochastic, latent variables, which are called hidden units or feature detectors. Restricted Boltzmann Machines (RBM) in the DBN are stacked, forming an undirected probabilistic graphical model similar to Markov Random Fields (MRF): the two layers are composed of visible neurons and then hidden neurons. The top two layers in a stacked RBM have undirected, symmetric connections between them and form an associative memory, whereas lower layers receive top-down, directed connections from the layer above. A hybrid model is established by stacking up RBMs, as illustrated in Figure 3. The top two layers form the RBM and the lower layers form a directed belief net [28]. This hybrid model is called a deep belief network (DBN). The deep-belief-network is a simple, clean, fast Python implementation of deep belief networks based on binary Restricted Boltzmann Machines (RBM). In our case, it was based on NumPy and TensorFlow libraries to take advantage of GPU computation. Figure 3. Hybrid model of the DBN after greedy layer-wise learning. The top two layers form the RBM and the bottom layers form a directed belief network [29]
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709 2706 5. EXPERIMENT AND RESULTS 5.1. Data preprocessing The methodology discussed in this paper is applied on the entire NSL-KDD dataset. The NSL-KDD dataset was proposed to deal with inherent problems of the KDD Cup 1999 dataset which contain too many redundant records. An example of dataset record is ‘0 tcp ftp_data SF 491 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 0 0 0 1 0 0 150 25 0.17 0.03 0.17 0 0 0 0.05 0 normal’. As you can see, data contains some text values also. Pre-processing of original NSL-KDD dataset is necessary to make it a suitable input for learning models. We need to transform the nominal features to numeric values. Only column number 2(Protocol_type), 3(Services), 4(Flag) and 42(Attack or Normal) contains nominal values [30]. 5.2. Evaluation metrics For evaluation purposes, Accuracy (ACC), Precision (P), Recall (R) metrics are used. These metrics are calculated by using four different measures, true positive (TP), true negative (TN), false positive (FP) and false negative (FN). Accuracy is the percentage of the records number classified correctly over total the records. Precision means the percentage of your results which are relevant. On the other hand, recall refers to the percentage of total relevant results correctly classified by your algorithm [31]. True Positive Rate (TPR): also known as Detection Rate (DR) is the percentage of the anomaly records number correctly flagged as anomaly over the total number of anomaly records in (4): Accuracy = TP+TN TP+FP+FN+TN (1) Precision = TP TP+FP (2) Recall = TP TP+Fn (3) DR = TPR = TP TP+Fn (4) False Positive Rate (FPR): the percentage of the normal records number wrongly flagged as anomaly is divided by the total number of normal records in (5) [32]. FPR = FP FP+TN (5) 5.3. Comparative study of three deep learning models-based intrusion detection system The research on security issues relating to IDS exists since the birth of computer architectures. In recent days, applying deep learning to IDS is of prime interest among security researchers and specialists. A comparative study of three deep learning models, Inception convolutional neural network (CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) applied to IDS. Tables 1-3 illustrate the accuracy, precision, and recall of our three deep learning models in KDD+ and KDD-21, as we can see that the inception CNN and BLSTM exceed the DBN. Figures 4-7 provide a comparison of the experimental results of Tables 1-3. From the results, we could find that the inception architecture CNN got the highest overall accuracy (ACC). Besides, the BLSTM model surpassed the DBN model on both the overall precision and overall recall rate in KDD+ and KDD-21. Although the DBN model performed worse than the other three models on ACC, precision, recall rate in KDD+ and KDD-21, it obviously failed on information on the attack. The proper explanation that BLSTM tried a lot on the whole sequence comprehension and Inception-CNN could extract the key information more quickly. Inception-CNN and BLSTM perform better than DBN. In theory, DBN should be the best model but it is very hard to estimate joint probabilities accurately at the moment. We found that all three models had good performance on the Normal data and DoS data and Probe. Table 4 shows the DR of KDDTest+; Table 5 shows the FPR of KDDTest+; Table 6 shows the DR of KDDTest-21; Table 7 shows the FPR of KDDTest-21. Results in Tables 4, 5, 6 and 7 compare DR and FPR of KDDTest+ and KDDTest-21 we can conclude that the Inception-CNN and BLSTM provide better results in DR and FPR compared to DBN, we can find that results of R2L and U2R are relatively quite small for all models, which might because of the insufficiency of their records in the dataset. However, the models still can detect some of them. Bidirectional long short-term memory (BLSTM) and Inception-CNN, are used to detect anomalies in sequence. The results show that the Inception-CNN and BLSTM showed superiority over the other DBN model. We tie that to the fact that Inception-CNN and BLSTM has the ability to define normal behavior from large datasets and can be used to detect a new unseen threat. It can be concluded that if one only wants to classify the network traffic as normal or attack, Inception CNN or BLSTM they will be a better choice.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib) 2707 Table 1. Accuracy for each model Inception- CNN BLSTM DBN KDDTest+ 88,03% 84,03% 71.91% KDDTest–21 73.98% 75.36% 66.73% Table 2. Precision for each model Inception- CNN BLSTM DBN KDDTest+ 85.90% 93.98% 73.86% KDDTest–21 83.66% 77.89% 74,.65% Table 3. Recall for each model Inception- CNN BLSTM DBN KDDTest+ 85.58% 86.01% 80.67% KDDTest–21 72.11% 72.98% 69,23% Table 4. DR of KDD Test+ Normal Dos Probe R2L U2R Inception-CNN 88.468% 69.548% 61.357% 18.579% 22.348% BLSTM 87.975% 71.576% 63.574% 29.110% 24.022% DBN 79.697% 66.241% 57.957% 16.436% 17.043% Table 5. FPR of KDD Test+ Normal Dos Probe R2L U2R Inception- CNN 28.576% 28.622% 6.061% 2.178% 0.063% BLSTM 65.448% 24.659% 10.323% 7.810% 0.082% DBN 46.533% 25.2108% 14.073% 6.073% 1.065% Table 6. DR of KDD Test- 21 Normal Dos Probe R2L U2R Inception-CNN 95.870% 77.182% 67.245% 22.323% 20.819% BLSTM 82.451% 67.584% 61.865% 20.567% 21.634% DBN 72.211% 54.987% 60.773% 16.765% 19.984% Table 7. FPR of KDD Test- 21 Normal Dos Probe R2L U2R Inception-CNN 36.870% 14.53% 2.357% 0.479% 0.068% BLSTM 51.975% 19.576% 7.574% 1.110% 0.022% DBN 63.432% 22.653% 7.325% 2.972% 1.086% Figure 4. Accuracy, precision and recall of KDDTest+ Figure 5. DR of KDDTest+ using inception-CNN, BLSTM, DBN
  • 8.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709 2708 Figure 6. Accuracy, precision and recall of KDDTest-21 Figure 7. DR of KDDTest-21 using inception-CNN, BLSTM, DBN 6. CONCLUSION Recently, Deep learning for intrusion detection system has received much deliberation. In any IDS, audit data samples are analyzed to set detection rules in highly mobile node network to protect against number of novel attacks. The primary advantage of using Deep learning based intrusion detection systems is that it is highly accurate and able to detect or categorize attacks without any environmental influence. Different Deep learning based IDS approaches have their own benefits and disadvantages. Therefore, considering the MANET scenarios, it is important to choose a precise method for implementing IDS. This paper is motivated by the need to develop good training algorithms for deep architectures-based IDS, since these can be much more representationally efficient than shallow ones such as SVMs and one- hiddenlayer neural nets. which may be proved important for selecting the appropriate methods on bases of the situation in MANET. In this work, the practical problems of existing IDS have been addressed and different Deep Learning models (Inception-CNN, BLSTM and Deep Belief model) are compared to solve these problems. The models have been implemented and tested on NSL-KDD dataset. The reason behind the superiority of Inception-CNN in general that, it’s the ability to define normal behavior from a large dataset and can be used to detect a new unseen threat. This work can be extended in two directions: first, implement other deep models and create hybrid models and voting systems across different models to detect and recognize low false alarm threats. Second, provide existing systems with real-world data for multiple networks in such a way that the model can increase its accuracy by adapting the definition of normal activities through different un-calibrated datasets. REFERENCES [1] E. Amiri, H. Keshavarz, H. Heidari, E. Mohamadi, and H. Moradzadeh, “Intrusion Detection Systems in MANET: A Review,” Procedia - Social and Behavioral Sciences, vol. 129, pp. 453–459, 2014. [2] S. Laqtib, K. E. Yassini, M. Houmer, M. D. E. Ouadghiri, and M. L. Hasnaoui, “Impact of mobility models on Optimized Link State Routing Protocol in MANET,” 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 2016. [3] S. Laqtib, K. E. Yassini, and M. L. Hasnaoui, “Performance Evaluation of Multicast Routing Protocols in MANET,” in International Conference on Advanced Intelligent Systems for Sustainable Development, Springer, Cham, 2018. [4] S. Laqtib, K. E. Yassini, and M. L. Hasnaoui, “Link-state QoS routing protocol under various mobility models,��� Indonesian Journal of Electrical Engineering and Computer Science Science (IJEECS), vol. 16, no. 2, pp. 906-916, Nov. 2019. [5] I. Butun, S. Morgera and R. Sankar, “A Survey of Intrusion Detection Systems in Wireless Sensor Networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, 2014. [6] S. Iqbal, M. L. M. Kiah, B. Dhaghighi, M. Hussain, S. Khan, M. K. Khan, and K.-K. R. Choo, “On cloud security attacks: A taxonomy and intrusion detection and prevention as a service,” Journal of Network and Computer Applications, vol. 74, pp. 98–120, 2016. [7] A. Fudholi and K. Sopian, “Review on Solar Collector for Agricultural Produce,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 414-419, Jan. 2018. [8] T. Laagoubi, M. Bouzi, and M. Benchagra, “MPPT and Power Factor Control for Grid Connected PV Systems with Fuzzy Logic Controllers,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 105-113, Jan. 2018.
  • 9. Int J Elec & Comp Eng ISSN: 2088-8708  A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib) 2709 [9] A. Fudholi, et. al., “Primary Study of Tracking Photovoltaic System for Mobile Station in Malaysia,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 427-432, Jan. 2018. [10] A. Fudholi and K. Sopian, “Review on Exergy and Energy Analysis of Solar Air Heater,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 420-426, Jan. 2018. [11] S. Suraya, P. S. Sujatha, and B. K. P, “A Novel Control Strategy for Compensation of Voltage Quality Problem in AC Drives,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 8-16, 2018. [12] S. Samadi, et. al., “Optimum range of angle tracking radars: a theoretical computing,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1765, Jan. 2019. [13] T. Zaidi and R. Rampratap, “Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 344-454, Jan. 2018. [14] G. S. N. Rao, et. al., “Dynamic Time Slice Calculation for Round Robin Process Scheduling Using NOC,” International Journal of Electrical and Computer Engineering (IJECE), vol. 5, no. 6, pp. 1480-1485, Jan. 2015. [15] A. Oukennou, A. Sandali, and S. Elmoumen, “Coordinated Placement and Setting of FACTS in Electrical Network based on Kalai-smorodinsky Bargaining Solution and Voltage Deviation Index,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 6, pp. 4079-4088, Jan. 2018. [16] A. Othman, N.I.S. Shaari, A.M. Zobilah, N.A. Shairi, Z. Zakaria, “Design of Compact Ultra Wideband Antenna for Microwave Medical Imaging Application,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1197-1202, Sep. 2019. [17] N. Batayev, “Axial Compressor Fouling Detection for Gas Turbine Driven Gas Compression Unit,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1257-1263, Sep. 2019. [18] djelloul kheira, “Performance of channel selection used for Multi-class EEG signal classification of motor imagery,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1305-1312, Sep. 2019. [19] S.H. Ahammad, “Automatic Segmentation of Spinal Cord Diffusion MR Images for disease location finding,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1313-1321, Sep. 2019. [20] M. Lalaoui, A.E. Afia, R. Chiheb, “A Self-Tuned Simulated Annealing Algorithm Using Hidden Markov Model,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 291-298, Jan. 2018. [21] A. Fudholi and K. Sopian, “Review on Solar Collector for Agricultural Produce,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 414-419, Jan. 2018. [22] A.F. Majid, Y. Mukhlis, “Aperture Coupling Rectangular Slotted Circular Ring Microstrip Patch Antenna,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1419-1427, Sep. 2019. [23] Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, Andrew Rabinovich, “MPPT Going deeper with convolutions,” Conference on Computer Vision and Pattern Recognition (CVPR). IEEE Conference on 2015. [24] Fudholi, Ahmad, and Kamaruzzaman Sopian, “Review on exergy and energy analysis of solar air heater,” International Journal of Power Electronics and Drive Systems(IJPEDS), vol. 9, no. 1, pp. 420-426, 2018. [25] Kuchibhatla, Samanthaka Mani, D. Padmavathi, and R. Srinivasa Rao, “Effect of Carrier Frequency in Grid Inter Connected Wind System with SSFC Controller,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 3, pp. 1349-1355, 2018. [26] Neethu B, “Classification of intrusion detection dataset using machine learning approaches,” International Journal of Electronics and Computer Science Engineering, pp. 1044-1051, 2012. [27] Ramkumar, Purigilla Venkata, and Munagala Surya Kalavathi, “Fractional Order PID Controlled Interleaved Boost converter Fed Shunt Active Filter System,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 126-138, 2018. [28] Pane, Syafrial Fachri, et al., “RFID-based conveyor belt for improve warehouse operations,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 2, pp. 794-800, 2019. [29] Mohsen, Mowafak K., et al., “Electronically controlled radiation pattern leaky wave antenna array for (C band) application,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 2, pp. 573-579, 2019. [30] Rahardja, Untung, Eka Purnama Harahap, and Shylvia Ratna Dewi, “The strategy of enhancing article citation and H-index on SINTA to improve tertiary reputation,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 2, pp. 683-692, 2019. [31] Zainuri, Akhmad, et al., “VRLA battery state of health estimation based on charging time,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1577-1583, 2019. [32] H. Setti, et. al., “A new configuration of a printed diplexer designed for DCS and ISM bands,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1090-1095, Jan. 2019.