2023
DOI: 10.32604/iasc.2023.028022
|View full text |Cite
|
Sign up to set email alerts
|

WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

Abstract: Mobile ad-hoc networks (MANET) are garnering a lot of attention because of their potential to provide low-cost solutions to real-world communications. MANETs are more vulnerable to security threats. Changes in nodes, bandwidth limits, and centralized control and management are some of the characteristics. IDS (Intrusion Detection System) are the aid for detection, determination, and identification of illegal system activity such as use, copying, modification, and destruction of data. To address the identified … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Edwin Singh and Celestin Vigila [27] used WOA (Whale Optimization Algorithm) and DNN (Deep Neural Network) to optimize the pre-processed data to build a system for detecting and classifying incursions in MANET (Whale Optimized Deep Neural Network Model), with the goal of predicting unanticipated cyber-attacks. As a result, intruder-proof data transfer to other nodes is made possible.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Edwin Singh and Celestin Vigila [27] used WOA (Whale Optimization Algorithm) and DNN (Deep Neural Network) to optimize the pre-processed data to build a system for detecting and classifying incursions in MANET (Whale Optimized Deep Neural Network Model), with the goal of predicting unanticipated cyber-attacks. As a result, intruder-proof data transfer to other nodes is made possible.…”
Section: Related Workmentioning
confidence: 99%
“…Following training, the network is tested on an independent dataset to gauge its ability to detect outliers. Improve the CNN's ability to spot network abnormalities by expanding the size and diversity of the training dataset, tweaking hyperparameters like learning rate and regularization, and using data augmentation techniques to add variety to the training data [26,27].…”
Section: Convolutional Neural Networkmentioning
confidence: 99%
“…Intruder is a kind of attacker who tries to hold the packer or make a delay on forwarding the packet, whereas black hole attacker is a category of the attacker who drops the packers rather than forwarding to the next hope. Many research work was carried out for detection and preventing Intruder and Attackers in the MANET by introducing the novel techniques like deep learning based [2], trust-based [3], intrusion detection [4], crypto-based [5], and destination sequence number (DSN) [6] based methods and fuzzy logic [7], but still the MANET is lags on security.…”
Section: Introductionmentioning
confidence: 99%
“…Fuzzy based PCA-FELM scheme [4] for detecting intruder in MANET, Vijayalakshmi et al [8] proposed the IDS system based on the novel game theory with neighbor trust table approach which classifies the nodes in to defect node or cooperate node approach they achieved packet delivery ratio in 42%. Sultan et al [9] used deep learning based ANN technique to make detection of IDS.…”
Section: Introductionmentioning
confidence: 99%
“…The meta-heuristic optimization algorithm uses an optimization model to iterate the hyperparameter values for a limited number of times in a certain range, and finally gets the optimal solution. Designing a good fitness function is very important for the optimization ability of meta-heuristic optimization algorithm [23].…”
Section: Introductionmentioning
confidence: 99%