In the past few years, an evolution in the wireless communication has been emerged, along with the evolution a new type with large potential application of wireless network appears, which is the Mobile Ad-Hoc Network (MANET). Black hole attack consider one of the most affected kind on MANET. Therefore, the use of intrusion detection system (IDS) has a major importance in the MANET protection. In this paper, an optimization of a fuzzy based intrusion detection system is proposed which automate the process of producing a fuzzy system by using an Adaptive Neuro-Fuzzy Inference System (ANFIS) for the initialization of the FIS and then optimize this initialized system by using Genetic Algorithm (GA). In addition, a normal estimated fuzzy based IDS is introduces to see the effect of the optimization on the system. From this study, it is proven that the optimized proposed IDS perform better that the normal estimated systems.
Summary The number of internet users and connected devices has dramatically expanded due to the recent technological boom and the benefits that the internet of things offers to ease our lives. Network scheduling, quality of service, resource allocation, and security issues are now being addressed via software‐defined networking (SDN). SDN has several benefits over traditional networks, including global centralized control, managing network traffic, and separating the forwarding and control plane. The work done in this paper aims to design and implement a traffic‐aware routing framework based on routing optimization presented as an integer linear programming (ILP) to improve heterogeneous traffic flows' quality of service (QoS) in a simulated SDN environment. With the knowledge that the routing problem is a nondeterministic polynomial‐time‐hard problem, the proposed scheme aims to decrease the computational routing time to make the ILP‐based routing system more suitable for real‐time processing. The simulation results illustrate that the proposed framework reduces the computational time by 23% and 49% for Abilene and Goodnet topology, respectively. Additionally, with 1000 flows in the network, the suggested scheme reduces the number of network flows that violate the QoS by 9% and 22% (with Abilene topology) and 16% and 51% (with Goodnet topology) as compared to the existing shortest path delay and sway methods, respectively.
Wireless networking is becoming one of the most important technologies nowadays, allowing users to get services and access information regardless of their location and allows users to communicate with each other wirelessly without depending on any fixed infrastructure. However, MANET works under an assumption that all nodes in the network are collaborating to forward packets which in fact isn't true as there are selfish nodes which refuse to forward the packets to reserve its energy and other resources, also there are misbehaving nodes (attack nodes) which drop packet to harm the network. So, with the presence of the selfish nodes and dropping attack nodes the sureness of the data packet delivery to the destination is absent, therefore, the importance of an intrusion detection system arises to prevent those kinds of nodes from harming the network and make sure that data packet arrives at the destination node. As the importance of the MANET increases, it became a point of interest to the researchers to secure it, so many schemes like Watchdog and Pathrater; Ex-Watchdog; TWOACK; AACK and A3ACK were introduced to achieve this goal. The reference to all techniques is the watchdog technique but it has six weaknesses which are it fails to detect malicious misbehaviors with the presence of the following: (i) partial dropping; (ii) collusion; (iii) false misbehavior report; (iv) limited transmission power; (v) receiver collisions, and (vi) ambiguous collisions. The ACK based techniques were proven to detect malicious misbehaviors with the presence of collaborative attacks, receiver collisions, and limited transmission power .This paper introduces a study of the ability of the ACK based techniques to overcome a major disability in watchdog technique (using omnet++ simulator) which is used to detect malicious misbehaviors with the presence of partial dropping 50%. The importance of choosing partial dropping comes from simulating a real attack scenario, also it is more difficult for the intrusion detection system to detect attackers with partial dropping so, in some way using a partial dropping attack is an evaluation of the strength of the intrusion detection system technique. From this research, it is proven that the ACK based techniques can actually overcome this disability but only with low speed as with low speed the performance is acceptable but with high speed and the presence of collaborative attacks the ACK based techniques have low performance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.