Title :
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Author_Institution :
Higher Educ. Complex of Bam, Bam, Iran
Abstract :
Mobile ad hoc network (MANET) is a self-created and self organized network of wireless mobile nodes. Due to special characteristics of these networks, security issue is a difficult task to achieve. Hence, applying current intrusion detection techniques developed for fixed networks is not sufficient for MANETs. In this paper, we proposed an approach based on genetic algorithm (GA) and artificial immune system (AIS), called GAAIS, for dynamic intrusion detection in AODV-based MANETs. GAAIS is able to adapting itself to network topology changes using two updating methods: partial and total. Each normal feature vector extracted from network traffic is represented by a hypersphere with fix radius. A set of spherical detector is generated using NicheMGA algorithm for covering the nonself space. Spherical detectors are used for detecting anomaly in network traffic. The performance of GAAIS is evaluated for detecting several types of routing attacks simulated using the NS2 simulator, such as Flooding, Blackhole, Neighbor, Rushing, and Wormhole. Experimental results show that GAAIS is more efficient in comparison with similar approaches.
Keywords :
artificial immune systems; feature extraction; genetic algorithms; mobile ad hoc networks; security of data; telecommunication network routing; telecommunication network topology; telecommunication security; telecommunication traffic; AIS; AODV-based MANET; GA; NS2 simulator; NicheMGA algorithm; artificial immune system; blackhole simulator; dynamic intrusion detection technique; flooding simulator; genetic algorithm; mobile ad hoc network; neighbor simulator; network topology; network traffic; normal feature vector extraction; routing attack simulation; rushing simulator; security; spherical detector; wireless mobile node; wormhole simulator; Biological cells; Detectors; Feature extraction; Heuristic algorithms; Intrusion detection; Routing protocols; Vectors; Ad hoc network; Artificial immune system; Genetic algorithm; Intrusion detection; Routing attack;
Conference_Titel :
Intelligent Systems (ICIS), 2014 Iranian Conference on
Conference_Location :
Bam
Print_ISBN :
978-1-4799-3350-1
DOI :
10.1109/IranianCIS.2014.6802607