Design of Intrusion Detection and Prevention Model Using COOT Optimization and Hybrid LSTM-KNN Classifier for MANET

IF 1.1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-12-27 DOI:10.4108/eetsis.v10i3.2574
Madhu G.
{"title":"Design of Intrusion Detection and Prevention Model Using COOT Optimization and Hybrid LSTM-KNN Classifier for MANET","authors":"Madhu G.","doi":"10.4108/eetsis.v10i3.2574","DOIUrl":null,"url":null,"abstract":"INTRODUCTION: MANET is an emerging technology that has gained traction in a variety of applications due to its ability to analyze large amounts of data in a short period of time. Thus, these systems are facing a variety of security vulnerabilities and malware assaults. Therefore, it is essential to design an effective, proactive and accurate Intrusion Detection System (IDS) to mitigate these attacks present in the network. Most previous IDS faced challenges such as low detection accuracy, decreased efficiency in sensing novel forms of attacks, and a high false alarm rate. OBJECTIVES: To mitigate these concerns, the proposed model designed an efficient intrusion detection and prevention model using COOT optimization and a hybrid LSTM-KNN classifier for MANET to improve network security. METHODS: The proposed intrusion detection and prevention approach consist of four phases such as classifying normal node from attack node, predicting different types of attacks, finding the frequency of attack, and intrusion prevention mechanism. The initial phases are done through COOT optimization to find the optimal trust value for identifying attack nodes from normal nodes. In the second stage, a hybrid LSTM-KNN model is introduced for the detection of different kinds of attacks in the network. The third stage performs to classify the occurrence of attacks. RESULTS: The final stage is intended to limit the number of attack nodes present in the system. The proposed method's effectiveness is validated by some metrics, which achieved 96 per cent accuracy, 98 per cent specificity, and 35 seconds of execution time. CONCLUSION: This experimental analysis reveals that the proposed security approach effectively mitigates the malicious attack in MANET.","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.1000,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EAI Endorsed Transactions on Scalable Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eetsis.v10i3.2574","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

INTRODUCTION: MANET is an emerging technology that has gained traction in a variety of applications due to its ability to analyze large amounts of data in a short period of time. Thus, these systems are facing a variety of security vulnerabilities and malware assaults. Therefore, it is essential to design an effective, proactive and accurate Intrusion Detection System (IDS) to mitigate these attacks present in the network. Most previous IDS faced challenges such as low detection accuracy, decreased efficiency in sensing novel forms of attacks, and a high false alarm rate. OBJECTIVES: To mitigate these concerns, the proposed model designed an efficient intrusion detection and prevention model using COOT optimization and a hybrid LSTM-KNN classifier for MANET to improve network security. METHODS: The proposed intrusion detection and prevention approach consist of four phases such as classifying normal node from attack node, predicting different types of attacks, finding the frequency of attack, and intrusion prevention mechanism. The initial phases are done through COOT optimization to find the optimal trust value for identifying attack nodes from normal nodes. In the second stage, a hybrid LSTM-KNN model is introduced for the detection of different kinds of attacks in the network. The third stage performs to classify the occurrence of attacks. RESULTS: The final stage is intended to limit the number of attack nodes present in the system. The proposed method's effectiveness is validated by some metrics, which achieved 96 per cent accuracy, 98 per cent specificity, and 35 seconds of execution time. CONCLUSION: This experimental analysis reveals that the proposed security approach effectively mitigates the malicious attack in MANET.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于COOT优化和混合LSTM-KNN分类器的MANET入侵检测与防御模型设计
简介:MANET是一种新兴技术,由于其在短时间内分析大量数据的能力,在各种应用中获得了牵引力。因此,这些系统面临着各种安全漏洞和恶意软件攻击。因此,设计一个有效、主动、准确的入侵检测系统(IDS)来缓解网络中存在的这些攻击是至关重要的。以前的大多数入侵检测系统都面临着检测精度低、检测新型攻击的效率下降以及误报率高等挑战。为了减轻这些担忧,该模型设计了一个有效的入侵检测和防御模型,使用COOT优化和用于MANET的混合LSTM-KNN分类器来提高网络安全性。方法:提出的入侵检测与防御方法包括正常节点与攻击节点的分类、不同攻击类型的预测、攻击频率的发现和入侵防御机制四个阶段。初始阶段通过COOT优化,找到从正常节点中识别攻击节点的最优信任值。第二阶段,引入混合LSTM-KNN模型,用于检测网络中不同类型的攻击。第三阶段对攻击的发生进行分类。结果:最后阶段旨在限制系统中存在的攻击节点的数量。通过一些指标验证了该方法的有效性,该方法的准确率达到96%,特异性达到98%,执行时间为35秒。结论:本实验分析表明,所提出的安全方法有效地减轻了MANET中的恶意攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
EAI Endorsed Transactions on Scalable Information Systems
EAI Endorsed Transactions on Scalable Information Systems COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
2.80
自引率
15.40%
发文量
49
审稿时长
10 weeks
期刊最新文献
Factors influencing the employment intention of private college graduates based on robot control system design Japanese Flipped Classroom Knowledge Acquisition Based on Canvas Web-Based Learning Management System Effectiveness and perception of augmented reality in the teaching of structured programming fundamentals in university students Mechanical Design Method and Joint Simulation Analysis of Industrial Robots Based on Trajectory Planning Algorithm and Kinematics Global research on ubiquitous learning: A network and output approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1