
ENHANCING SECURITY IN MOBILE AD HOC NETWORKS: INTRUSION DETECTION WITH SVM AND ANT COLONY OPTIMIZATION
Raman Kumar , Department of Computer Science Engineering, Gnanamani College of Technology, IndiaAbstract
Mobile Ad Hoc Networks (MANETs) are dynamic and self-configuring wireless networks, making them vulnerable to various security threats, including intrusion attempts. Intrusion detection systems (IDS) play a critical role in safeguarding MANETs against unauthorized access and malicious activities. In this study, we propose an innovative approach to enhance the security of MANETs through intrusion detection, leveraging the power of Support Vector Machines (SVM) with Ant Colony Optimization (ACO). Our approach harnesses the robustness of SVM in pattern recognition and classification, while ACO optimizes the SVM parameters, improving the accuracy and efficiency of intrusion detection. Through extensive experiments and evaluations, we demonstrate the effectiveness of this combined approach in mitigating intrusion threats in MANETs.
Keywords
Mobile Ad Hoc Networks (MANETs), Intrusion Detection, Support Vector Machine (SVM)
References
J. Jabez and B. Muthukumar, “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach”, Procedia Computer Science, Vol. 48, pp. 38- 346, 2015.
Gulshan Kumar, Krishan Kumar and Monika Sachdeva, “The Use of Artificial Intelligence Based Techniques for Intrusion Detection: A Review”, Artificial Intelligence Review, Vol. 34, No. 4, pp. 369-387, 2010.
Zahra Bazrafshan, Hashem Hashemi, Seyed Mehdi Hazrati Fard and Ali Hamzeh, “A Survey on Heuristic Malware Detection Techniques”, Proceedings of 5th International Conference on Information and Knowledge Technology, pp. 113-120, 2013.
N. Ye, S.M. Emran, Q. Chen and S. Vilbert, “Multivariate Statistical Analysis of Audit Trials for Host-Based Intrusion Detection”, IEEE Transactions on Computers, Vol. 51, No. 7, pp. 810-820, 2002.
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia Fernandez and E. Vazquez, “Anomaly based Network Intrusion Detection: Techniques, Systems and Challenges”, Computer and Security, Vol. 28, pp. 18-28, 2009.
C. Kruegel, D. Mutz, W. Robertson and F. Valeur, “Bayesian Event Classification for Intrusion Detection”, Proceedings of International Conference on Annual Computer Security Applications, pp. 14-23, 2003.
D.Y. Yeung and Y. Ding, “Host-Based Intrusion Detection using Dynamic and Static Behavioral Models”, Pattern Recognition, Vol. 36, No. 1, pp. 229-243, 2003.
A.M. Cansian, E. Moreira, A. Carvalho and J.M. Bonifacio, “Network Intrusion Detection using Neural Networks”, Proceedings of International Conference on Computational Intelligence and Multimedia Applications, pp. 276-280, 1997.
T.R. Srinivasan, R. Shanmugalakshmi and B. Madhusudhanan, “Dynamic Remote Host Classification in Grid Computing using Clonalg”, Proceedings of International Conference and Workshop on Emerging Trends in Technology, pp. 198-201, 2010.