Abstract

Given the growth of wireless networks and the increase of the advantages and applications of communication networks, especially mobile ad hoc networks (MANETs), this type of network has attracted the attention of users and researchers more than before. The benefit of these types of networks in various kinds of networks and environments is that MANET does not require to hardware infrastructure to communicate and send and receive data packets within the network. It is one of the main reasons for using these MANET in various fields. On the other hand, the increased popularity of these networks has led to many challenges, one of the most important of which is network security. In this regard, a lack of regulatory and security infrastructure in MANETs has caused some problems in sending and receiving data, where intrusion in the network has been recognized as one of the most important issues. In MANETs, wireless notes act as a link between the source and destination nodes and play the role of relays and routers in the network. Therefore, malicious node penetration and the destruction of information packages become feasible. Today, intrusion detection systems (IDSs) are used as a solution to deal with the problem through remote monitoring of the performance and behaviors of nodes existing in wireless sensor networks. In addition to detecting malicious nodes in the network, IDSs can predict the behavior of malicious nodes in the future in most cases. Therefore, the present study introduced a network IDS (NIDS) entitled MOPSO‐FLN by using a combination of multiobjective particle swarm optimization algorithm‐ (MOPSO‐) based feature subset selection (FSS) and fast‐learning network (FLN). In this work, we used the KDD Cup99 and dataset to select features, train the network, and test the model. According to the simulation results, this method was able to improve the performance of the IDS in terms of evaluation criteria, compared to other previous methods, by creating a balance between the objectives of the number of representative features and training errors based on the evolutionary power of MOPSO.

Highlights

  • Mobile ad hoc networks (MANETs) are a group of mobile nodes that communicate over wireless links without any backbone

  • Various techniques have been proposed for detecting attacks by Network intrusion detection systems (NIDS), and it is notable that an intrusion detection systems (IDSs)’s success depends on the type of technique used in this regard [7]

  • Reducing the number of features existing in the data set without affecting the classification precision can play an important role in IDS performance optimization [9]

Read more

Summary

Introduction

Mobile ad hoc networks (MANETs) are a group of mobile nodes that communicate over wireless links without any backbone. The presence of permanent security monitoring nodes in the network is almost impossible due to limited resources, and there is a need for remote control of nodes’ behavior in the network and determining security necessities in MANET [4, 5]. Network intrusion detection systems (NIDS) are used to monitor node activity or network traffic activity. The main goal of NIDSs is detecting malicious nodes and predicting possible future attacks on the network [6]. An alert is Wireless Communications and Mobile Computing generated for further action when detecting a malicious node in the network. Reducing the number of features existing in the data set (e.g., the behavior of nodes and network traffic) without affecting the classification precision can play an important role in IDS performance optimization [9]

Objectives
Methods
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.