You can view the full text of this article for free using the link below.

Title: Design an anomaly-based intrusion detection system using soft computing for mobile ad hoc networks

Authors: Alka Chaudhary; V.N. Tiwari; Anil Kumar

Addresses: Manipal University Jaipur, India Dehmi Kalan, Near GVK Toll Plaza, Jaipur-Ajmer Express Highway, Jaipur, Rajasthan 303007, India ' Manipal University Jaipur, India Dehmi Kalan, Near GVK Toll Plaza, Jaipur-Ajmer Express Highway, Jaipur, Rajasthan 303007, India ' Manipal University Jaipur, India Dehmi Kalan, Near GVK Toll Plaza, Jaipur-Ajmer Express Highway, Jaipur, Rajasthan 303007, India

Abstract: The main objective of an intrusion detection system is to classify the normal and suspicious activities in the network. The complex characteristics of mobile ad hoc networks make intrusion detection more difficult than for conventional networks. Although, soft computing techniques-based intrusion detection systems proved their effectiveness on wired networks in terms of detecting known and unknown attacks but use of soft computing techniques for mobile ad hoc networks still very restricted so that in this paper, a new scheme has been proposed by using neuro-fuzzy classifier in binary form for mobile ad hoc networks to identify the behaviour of current activities, i.e., normal or abnormal. Qualnet simulator and MATLAB toolbox are used to visualise the attack-based scenarios and evaluate the performance of proposed approach. Simulation results show that the proposed soft computing-based approach is able to identify the known and unknown attacks in mobile ad hoc networks with high positive and low false positive rates.

Keywords: mobile ad hoc networks; MANETs; network security; intrusion detection systems; anomaly-based IDS; soft computing; adaptive neuro fuzzy inference system; ANFIS; neural networks; fuzzy logic; visualisation; simulation; network attacks.

DOI: 10.1504/IJSCN.2016.077041

International Journal of Soft Computing and Networking, 2016 Vol.1 No.1, pp.17 - 34

Received: 18 Jun 2014
Accepted: 05 Nov 2014

Published online: 20 Jun 2016 *

Full-text access for editors Full-text access for subscribers Free access Comment on this article