A Deep Learning Methods For Intrusion Detection Systems Based Machine Learning in MANET
A Deep Learning Methods For Intrusion Detection Systems Based Machine Learning in MANET
net/publication/338027948
CITATIONS READS
33 3,248
3 authors:
SEE PROFILE
All content following this page was uploaded by Khalid El Yassini on 25 May 2020.
ABSTRACT 1. INTRODUCTION
Deep learning is a subset of machine learning where algorithms are MANET stands for Mobile ad-hoc Network also called as wireless
created and function similar to those in machine learning, but there ad-hoc network or ad-hoc wireless network that usually has a
are numerous layers of these algorithms each providing a different routable networking environment on top of a Link Layer ad hoc
interpretation to the data it feeds on. Mobile Ad-Hoc Network network. They consist of set of mobile nodes connected wirelessly
(MANET) is picking up huge popularity due to their potential of in a self-configured, self-healing network without having a fixed
providing low-cost solutions to real-world communication infrastructure. MANET nodes are free to move randomly as the
problems. MANETs are more susceptible to the security attacks network topology changes frequently. Each node behaves as a
because of the properties such as node mobility, lack of centralized router as they forward traffic to other specified node in the
network.[1].
management and limited bandwidth. To tackle these security
Limited-range wireless communication and elevated node mobility
issues, traditional cryptography schemes can-not completely
mean that nodes need to collaborate with each other in order to
safeguard MANETs in terms of novel threats and vulnerabilities, provide vital networking, with the underlying network changing
thus by applying deep learning methods in IDS are capable of dynamically to guarantee that demands are continuously met. The
adapting the dynamic environments of MANETs and enables the dynamic nature of the protocols that allow the operation of
system to make decisions on intrusion while continuing to learn MANET implies that they are easily suited for deployment in
about their mobile environment. IDS represent the second line of extreme or volatile circumstances [2]. MANETs have become a
defense against malevolent behavior to MANETs since they very popular research topic and have been suggested for use in
monitor network activities in order to detect any malicious attempt many fields such as rescue activities, tactical activities,
performed by Intruders. Recently, more and more researchers environmental monitoring, meetings, etc. [3][4].
applied deep neural networks (DNNs) to solve intrusion detection For the above reasons, it is very important to deploy an intrusion
problems. Convolutional Neural Network (CNN) and Recurrent detection system. as a second line of defense in MANET. Intrusion
Neural Network (RNN), the two main types of DNN architectures, detection systems (IDS) are a mechanism for monitoring and
are widely explored to enhance the performance of intrusion investigating events occurring in a computer system. An IDS
detection system. In this paper, we present the most well-known incorporates methods for modeling and discovering abnormal
deep learning models CNN, Inception-CNN, Bi-LSTM and GRU behaviors and complex techniques. They try to determine whether
and we made a systematic comparison of CNN and RNN on the or not the network is going through any malicious activity. This is
deep learning-based intrusion detection systems, aiming to give typically accomplished by gathering data automatically from a
basic guidance for DNN selection in MANET variety of systems and network sources and then analyzing the
information for potential security issues [5].
Keywords Traditional techniques of intrusion detection and prevention, such
MANET, Attack, Deep learning, intrusion detection system IDS, as firewalls, access control mechanisms, and encryption, have
several limitations in fully protecting networks and systems from
CNN, inception CNN, Bi-LSTM, GRU
increasingly sophisticated attacks such as service denial. Moreover,
most systems based on such techniques are suffering from high
Permission to make digital or hard copies of all or part of this work for false positive and false negative detection rates and absence of
personal or classroom use is granted without fee provided that copies are not constant adaptation to altering malicious behavior. Deep learning
made or distributed for profit or commercial advantage and that copies bear therefore helps to easily perform data summary and visualization
this notice and the full citation on the first page. Copyrights for components
readily, with the objective of making it easy for safety experts to
of this work owned by others than ACM must be honored. Abstracting with
credit is permitted. To copy otherwise, or republish, to post on servers or to recognize system weaknesses and faults, Several Deep Learning
redistribute to lists, requires prior specific permission and/or a fee. Request (DL) methods have been introduced to the issue of intrusion
permissions from [email protected]. detection to enhance detection rates and adaptability [6].
SCA2019, October 2–4, 2019, CASABLANCA, Morocco The remainder of this paper is organized as follows. First, Section
© 2019 Association for Computing Machinery.
ACM ISBN 978-1-4503-6289-4/19/10…$15.00
is dedicated to discuss Security attacks in MANET. Then, Section
https://doi.org/10.1145/3368756.3369021
3 describes the Intrusion detection system (IDS) Types. Section 4 specifications. It is implemented as a successful option combining
provides a brief survey of Intrusion detection system (IDS) In the strengths of a misuse-based detection techniques to detect
MANET. The notion of deep learning then presented in Section 5. known and unknown attacks lower false positive rate [16][17].
In section 6 we present Comparative study of four deep learning
models-based intrusion detection system in Section 7 Experiment 4. Intrusion detection system (IDS) in
and Results, in section 8 we conclude by conclusion MANET
It is essential for wireless ad-hoc networks to defend against
2. Security attacks in MANET malicious behavior, to secure the routing of MANET, and to cope
MANET attacks can be approximately classified into two main with the limitations of cryptographic systems IDSs [18], which
categories, namely passive attacks and active attacks, depending on have been successfully used in Mobile ad hoc networks to detect
the means of attack. [7][8]. A passive attack gets data exchanged in attacks, can provide an appropriate second line of defense to
the network without interrupting the communication operation, identify malicious traffic and misbehaving nodes in wireless
whereas an active attack involves interruption of information, environments [19].
Modification or manufacturing, thus disrupting the MANET's
normal functionality [9]. The attacks can also be classified into two 4.1 Distributed and Cooperative Intrusion
categories according to the domain of the attacks, namely external Detection System
attacks, and internal attacks. External attacks are performed by In this architecture, each node has an IDS agent that locally detects
nodes that are not part of the network's domain. Internal attacks are intrusions and collaborates with neighboring nodes for global
from compromised nodes that are part of the network in fact. detection whenever there is indeterminate evidence and a broader
Internal attacks are more severe than external attacks [9]. search is required. When the intrusion is captured, either a local
2.1 Denial of Service Attacks (DoS) response (e.g. alerting the local user) or a global response may be
DoS attack is a sort of attack which the hacker makes a computer issued by an IDS agent. Each node is involved in the method and
or memory resource too busy or too full to serve legitimate response of intrusion detection as having an IDS agent running on
networking requests, thus denying users access to a device such as it. An IDS agent is responsible for detecting and collecting local
an apache, Smurf, Neptune, death ping, back, mail bomb, UDP information and data in order to identify any attack if an attack
storm, etc. are all DoS attacks [10]. occurs in the network, as well as taking an independent response
[20].
2.2 Remote to User Attacks (R2L)
A remote user attack is an attack in which a user sends packets over 4.2 Hierarchical Intrusion Detection System
the internet to a machine that he / she has no access to expose the Hierarchical IDS system Expand the distributed and cooperative
vulnerabilities of the devices and utilize the rights that a local user IDS system functions and have been implemented for multi-layer
would have on the computer, such as xlock, client, xnsnoop, phf, network infrastructures where the network is divided into various
send-mail dictionary, etc. [11]. small networks known as clusters [21]. Usually, each cluster head
has more functionality than other cluster members, such as
2.3 User to Root Attacks (U2R) transmitting data packets to other clusters. We can therefore say that
These attacks are exploitations in which the hacker begins with a these cluster heads work in some way as central point’s similar to
normal user account on the system and tries to abuse system wired network control devices such as routers, switches or gateways.
vulnerabilities to obtain super user privileges such as perl, xterm.. The multi-layering concept applies to intrusion detection systems
[12]. where there is a proposal for hierarchical IDS. Each IDS agent runs
2.4 Probing on a specific member node and is responsible for its node, i.e.
Probing is an attack in which the hacker scans a machine or monitoring and deciding on intrusions detected locally. A cluster
networking device to identify weaknesses or vulnerabilities that can head is responsible for their node locally as well as globally for their
be exploited later in order to compromise the system. Usually this cluster, such as monitoring network traffic and announcing a global
method is used in information mining such as saint, portsweep, response when detecting network intrusion.
mscan, nmap, etc. [13].
5. Deep learning-based intrusion detection
3. Intrusion detection system (IDS) Types system
Intrusion is any set of actions that try to compromise a resource's With the growing in-depth integration of the Web and social life, the
integrity, confidentiality, or availability and an intrusion detection Internet is changing how people learn and work, but it is also
system (IDS) is a scheme to detect such intrusions. three types of exposing us to ever more serious threats to security. How to
IDS in the detection techniques category [14], are as follows: recognize different network attacks, particularly unseen attacks, is a
Three methods of intrusion detection are used in the literature. The key issue that needs to be addressed urgently [22].
first method is detection of anomaly-based intrusion, which profiles Machine learning and deep learning are two subsets of artificial
the symptoms of the system's ordinary behaviors such as command intelligence which have garnered a lot of attention over the past two
frequency usage, program CPU usage and the like. It detects years, Deep learning outperforms the traditional machine learning
anomalies intrusions. The second method misuse-based intrusion as the scale of data increases (see Figure 1). In recent years, deep
detection compares known attack signatures with current system learning algorithms have become increasingly popular and have
activities. Because it is effective and has a low false positive rate, been applied for a diverse set of tasks, studies have shown that deep
business IDSs usually prefer it [15]. This approach's drawback is learning completely surpasses traditional methods.
that it is unable to identify new attacks. The system is only as deep neural network (DNN), is explored to develop a flexible and
powerful as its signature database, this needs frequent updating for effective IDS to detect and classify unforeseen and unpredictable
new attacks. Both anomaly-based methods and misuse-based attacks. The continuous change in network (MANET) behavior and
methods have their own strengths and weaknesses. Therefore, both rapid evolution of attacks makes it necessary to evaluate various
techniques are generally employed for effective intrusion detection. datasets which are generated over the years through static and
The last method is specification-based intrusion detection. In this dynamic approaches. This type of study facilitates to identify the
approach, a set of constraints on a program or a protocol are best algorithm which can effectively work in detecting future
specified and intrusions are detected as runtime violations of these attacks. [23].
2
6.1 Basic convolutional Neural Network
(CNN)
The basic CNN consists of 3 parts: Convolution layer, Pooling
layer, Fully connected layer. If it is simple to describe:
The convolutional layer is responsible for extracting local features
in the image; the pooling layer is used to significantly reduce the
parameter magnitude (dimension reduction); the fully connected
layer is similar to the traditional neural network portion and is used
to output the desired result.[29].
4
7.3 Evaluation metrics Table 6. DR of KDDTest+
For evaluation purposes, Precision (P), Recall (R), F-measure (F) Normal Dos Probe R2L U2R
and Accuracy (ACC) metrics are used. These metrics are
calculated by using four different measures, true positive (TP), CNN 90.895% 83.8765% 70.742% 20.765% 20.992%
true negative (TN), false positive (FP) and false negative (FN),:
Inc-
Accuracy: the percentage of the records number classified 88.468% 69.5483% 61.357% 18.579% 22.348%
CNN
correctly over total the records in Equation
Bi-
87.975% 71.576% 63.574% 29.110% 24.022%
LSTM
False Positive Rate (FPR): the percentage of the normal records GRU 50.508% 23.991% 8.714% 4.246% 0.044%
number wrongly flagged as anomaly is divided by the total number
of normal records in Equation [32](6).
Table 8. DR of KDDTest- 21
FPR = (5)
Normal Dos Probe R2L U2R
7.4 Results Analysis
CNN 97.7876% 80.298% 70.9776% 24.781% 8.9552%
Table 3. Accuracy for each model
Inc-
95.5762% 77.182% 67.2456% 16.323% 0.0819%
CNN Inc-CNN Bi-LSTM GRU CNN
KDDTest+ 85,99% 89,03% 84,33% 78,98% Bi-
82.4518% 67.584% 61.8651% 20.567% 0.0634%
LSTM
KDDTest–
21 77.98% 73.36% 75.20% 69.30% 76.4873% 70.780% 57.6602% 15.712% 0.0833%
GRU
95
Value In (In %)
90 80
Value in %
85
80 60
75
70 40
65
60 20
ACCURACY PRECISION RECALL NORMAL DOS PROBE R2L U2R
CNN Inception CNN
Bi-LSTM GRU CNN Inception CNN
Bi-LSTM GRU
Accuracy, Precision, Recall of CNN, Bi-LSTM, Inception DR of CNN, Bi-LSTM, Inception CNN, GRU used for
CNN, GRU used for Intrusion Detection. Intrusion Detection.
100 100
95
90 80
VALUE IN (IN %)
85
VALUE IN (IN %)
80 60
75
70 40
65
60 20
ACCURACY PRECISION RECALL NORMAL DOS PROBE R2L U2R
6
attack data. The proper explanation is that RNNs (both LSTM and 6. Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi,
GRU) tried a lot on the whole sequence comprehension, CNNs Muzammil Hussain, Suleman khan, Muhammad Khurram Khan,
could extract the key information more quickly. It can be concluded Kim-Kwang Raymond Choo,On Cloud Security Attacks: “A
that if one only wants to classify the network traffic as normal or Taxonomy and Intrusion Detection and Prevention as a Service,”
attack, CNN or Inception CNN models will be a better choice. Journal of Network and Computer Applications Volume
The results of 5 multi-class classification are (see Figure 8). and 9. 74, October 2016, Pages 98-120
We found that all 4 models had good performance on the normal
7. Raja Waseem Anwar, Majid Bakhtiari, AnazidaZainal, Abdul
data and DoS data and Probe. But for R2L data and Ur2 data, basic
Hanan Abdullah and Kashif Naseer Qureshi, “ Enhanced Trust
CNN and inception architecture CNN failed on the Recall in KDD
Aware Routing against Wormhole Attacks in Wireless Sensor
Test+. What’s more, the Bi-LSTM model performed worse than the
other 3 models on precision rate in KDD Test+. Networks,” International Conference on Smart Sensors and
Meanwhile, table 6 shows the DR of KDDTest+; table 7 shows the Application, IEEE.
FPR of KDDTest+; table 8 shows the DR of KDDTest–21; table 9 8. Saurabh Ughade, R.K. Kapoor, Ankur Pandey, “An overview on
shows the FPR of KDDTest–21. In addition, compare DR and FPR Wormhole Attack in Wireless Sensor Network: Challenges,
of KDDTest+ and KDDTest–21, we can find that results of R2L Impacts, and Detection Approach," International Journal of
and U2R are relatively quite small for all methods, which might Recent Development in Engineering and Technology, ISSN 2347
because of the insufficiency of their records in the dataset. – 6435 (Online) Volume 2, Issue4.2014
However, the models still can detect some of them. 9. VarshaGharu, Mahesh Pawar, Jitendra Agarwal , “A Literature
Survey on Security Issues of WSN and Different Types of Attacks
8. Conclusion in Network,” Indian Journal of Computer Science and
Recently, Deep learning for intrusion detection has received much Engineering (IJCSE),2017
deliberation. In any IDS, audit data samples are analyzed to set 10. Neellima Singla, Mr.Ramanjeet Singh, “Wormhole Attack
detection rules in highly mobile node network to protect against Prevention and Detection in MANETs Using HRL Method ”
number of novel attacks. The primary advantage of using DL- ,International Journal of Advance Research, Ideas and
based detection systems is that it is highly accurate and able to Innovations in Technology,2017
detect or categorize attacks without any environmental influence. 11. Sushama Singh ; Atish Mishra ; Upendra Singh, “Detecting and
Different DL-based IDS approaches have their own benefits and avoiding of collaborative black hole attack on MANET using
disadvantages. Therefore, considering the MANET scenarios, it is trusted AODV routing algorithm,” Symposium on Colossal Data
important to choose a precise method for implementing IDS. The
Analysis and Networking (CDAN), 18-19 March 2016
comparative study illustrated here, presents the details of the deep
12. Tauseef Jamal ,Shariq Aziz Butt, “Malicious node analysis in
learning-based intrusion detection methods which may be proved
MANETS”, International Journal of Information Technology, 20
important for selecting the appropriate methods on bases of the
April 2018
situation in MANETs.
13. Houda Moudni ; Mohamed Er-rouidi ; Hicham
Mouncif ; Benachir El Hadadi, “Performance analysis of AODV
routing protocol in MANET under the influence of routing
References attacks, “ International Conference on Electrical and Information
Technologies (ICEIT), 4-7 May 2016
1. Ehsan Amiria, Hassan Keshavarz, Hossein Heidari, Esmaeil 14. Desai, V., & Shekokar,.N, “Performance evaluation of OLSR
Mohamadi, Hossein Moradzadeh, “Intrusion Detection Systems protocol in MANET under the influence of routing attack. In
in MANET: A Review, ” ICIMTR International Conference on Wireless Computing and Networking (GCWCN),” IEEE Global
Innovation, Management and Technology Research, Malaysia, 22 Conference on (pp. 138-143). 2014.
– 23 September, 2013 15. Noureldien A. Noureldien, Saeed K. Saeed, M. Ahmed Salih and
2. Safaa Laqtib, Khalid El Yassini, Meriem Houmer, Moulay Driss Alsawi M. Ahmed, “Survey of Mobile Ad hoc Networks Attacks
El Ouadghiri, Moulay Lahcen Hasnaoui,“Impact of mobility and a New Classification Scheme,” British Journal of
models on Optimized Link State Routing Protocol in Mathematics & Computer Science 8(1): 25-38, 2015,
MANET,” Proceedings of the International Conference on 16. Ruchita M, Seema L. Review paper on flooding attack in
Wireless Networks and Mobile Communications MANET, Int. Journal of Engineering Research and Applications.
(WINCOM), 26-29 Oct. 2016. 2014;4(1).
3. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An 17. Rishabh J, Charul D, Meenakshi, “A survey of protocols and
On-demand Secure Routing Protocol Resilient to Byzantine attacks in MANET Routing,” International Journal of Computer
Failures,” Proceedings of the ACM Workshop on Wireless Science and Management Studies. 2012;12(3).
Security, pp. 21-30, 2002. 18. Manjeet Singh, Gaganpreet Kaur.,”A survey of attacks in
4. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , “A Survey on MANET,” International Journal of Advanced Research in
Attacks and Countermeasures in Mobile Ad Hoc Networks,” Computer Science and Software Engineering. 2013;3(6).
,Department of Computer Science and Engineering Florida 19. Alomari E, Manickam S, Gupta BB, Karuppayah S, Alfaris R,
Atlantic University, WIRELESS/MOBILE NETWORK “Botnet-based distributed denial of service (DDoS) attacks on
SECURITY. web servers: classification and art,” International Journal of
5. Ismail Butun , Salvatore D. Morgera , Ravi Sankar , “A Survey Computer Applications. 2012;49:24-32.
of Intrusion Detection Systems in Wireless Sensor 20. R. Bhuvaneswari , R. Ramachandran ,” Denial of service attack
Networks,” IEEE Communications Surveys & mitigation addressing all the security attributes in OLSR
Tutorials ,Volume: 16 , Issue: 1 , 17 May 2013
MANET,” International Journal of Wireless and Mobile Journal of Advanced Research in Arti_cial Intelligence, Vol. 4,
Computing ,2018 No.3, pp. 9-18, 2015
21. Ruchi Makani, B.V.R. Reddy, “Taxonomy of Machine Leaning 28. Gauthama Raman M R, Nivethitha Somu, Kannan Kirthivasan,
Based Anomaly Detection and its suitability”, International Shankar Sriram V S ,”A Hypergraph and Arithmetic Residue-
Conference on Computational Intelligence and Data Science based Probabilistic Neural Network for Classi_cation in Intrusion
(ICCIDS 2018). Detection Systems,” Neural Networks, Vol- ume 92, August
22. Robert Mitchell and Ing-Ray Chen., “A Survey of Intrusion 2017, pp. 89-97, ELSEVIER.
Detection in Wireless Network Applications”, Elsevier, vol. 42, 29. Aastha Puri and Nidhi Sharma, “A Novel Technique for Intrusion
1- 23.2014 Detection System for Network Security Using Hybrid SVM-
23. Ismail Butun, Salvatore D. Morgera, and Ravi Sankar. “A Survey CART,” International Jour- nal of Engineering Development and
of Intrusion Detection Systems in Wireless Sensor Networks”, Research, Volume 5, Issue 2, ISSN: 2321- 9939, pp. 155-
IEEE Communications Surveys & Tutorials Volume: 16, Issue: 161.2017
1,pp266 – 282.2014 30. Wenjuan Li, Weizhi Meng, Lam-For Kwok, and Horace H. S. IP
24. Sumit, S., D. Mitra, and D. Gupta, “Proposed Intrusion Detection , “Enhancing Collaborative Intrusion Detection Networks Against
on ZRP based MANET by effective k-means clustering method Insider Attacks Using Supervised Intrusion Sensitivity-Based
of data mining,” 2014. IEEE. Trust Management Model,”Journal of Network and Computer
25. Mohit Soni ; Manish Ahirwa ; Shikha Agrawal, “A Survey on Applications, Volume 77, 1 January 2017, pp. 135-145,
Intrusion Detection Techniques in MANET,” International ELSEVIER.
Conference on Computational Intelligence and Communication 31. Ch. Nagamani and Suneetha Chittineni , “Network Intrusion
Networks (CICN)12-14 Dec. 2015 Detection Mechanisms Using Outlier Detection, ” Second
26. Neethu B. “Classification of intrusion detection dataset using International Conference on Inven- tive Communication and
machine learning approaches,” International Journal of Computational Technologies (ICICCT), pp. 1468-1473,2018.
Electronics and Computer Science Engineering; 2012. 32. Eduardo Massato Kakihata, Helton Molina Sapia, Ronaldo
27. Nutan Farah Haq, Musharrat Rafni, Abdur Rahman Onik, Faisal Toshiaki Oiakawa, Danillo Roberto Pereira, Joao Paulo Papa,
Muhammad Shah, Md. Avishek Khan Hridoy and Dewan Md. Victor Hugo Costa de Albuquerque and Francisco Assis da Silva
Farid, “Application Of Machine Learning Approaches in , “ Intrusion Detection System Based On Flows Using Machine
Intrusion Detection System: A Survey," (IJARAI) Inter- national Learning Algorithms, ” IEEE Latin America Transactions,
Volume 15, Issue: 10, pp. 1988 - 1993, Oct. 2017.