Parameshachari B.D., Achyutha Prasad N, Dhanraj, M. T. N.
{"title":"Adaptive Voting Mechanism with Artificial Butterfly Algorithm based Feature Selection for IDS in MANET","authors":"Parameshachari B.D., Achyutha Prasad N, Dhanraj, M. T. N.","doi":"10.1109/ICICACS57338.2023.10099861","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks (MANETs) have gained more interest from consumers and academics than ever before thanks to the proliferation of wireless networks and the expansion of the benefits and uses of communication networks in general. MANETs are useful in a wide variety of settings since they don't rely on a centralised server or other hardware to relay messages or process data packets. It's one of the primary justifications for implementing MANET in many different domains. However, there are also numerous difficulties that have arisen as a result of these networks' rising popularity, with network security being one of the most crucial. There have been challenges with data transmission and reception due to MANETs' weak regulatory and security frameworks; network infiltration has been identified as one of the most pressing concerns. In MANETs, wireless nodes serve as relays and routers, connecting the source and sink nodes. Accordingly, it is now possible for rogue nodes to penetrate networks and destroy data packets. In order to cope with this issue, modern intrusion detection systems (IDSs) are utilised for remote monitoring of the functioning and actions of nodes present in wireless sensor networks. As well as being able to identify hostile nodes in the network, IDSs can often predict how such nodes will act in the future. In this research work, NSL-KDD dataset is used as an input data. SMOTE and Z-score method are used during pre-processing to remove the irrelevant features and normalize the data. The optimal features are carried out by Artificial Butterfly algorithm and then, finally, ensemble classifiers s. Multilayer Perceptron (MLP), Boosted Regression Trees (BRT) and finally, the adaptive voting mechanism is used to select the best classifier. The results proves that the proposed ensemble model achieved 97.16% of accuracy, where the existing models achieved nearly 95% to 96% of accuracy.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICACS57338.2023.10099861","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Mobile ad hoc networks (MANETs) have gained more interest from consumers and academics than ever before thanks to the proliferation of wireless networks and the expansion of the benefits and uses of communication networks in general. MANETs are useful in a wide variety of settings since they don't rely on a centralised server or other hardware to relay messages or process data packets. It's one of the primary justifications for implementing MANET in many different domains. However, there are also numerous difficulties that have arisen as a result of these networks' rising popularity, with network security being one of the most crucial. There have been challenges with data transmission and reception due to MANETs' weak regulatory and security frameworks; network infiltration has been identified as one of the most pressing concerns. In MANETs, wireless nodes serve as relays and routers, connecting the source and sink nodes. Accordingly, it is now possible for rogue nodes to penetrate networks and destroy data packets. In order to cope with this issue, modern intrusion detection systems (IDSs) are utilised for remote monitoring of the functioning and actions of nodes present in wireless sensor networks. As well as being able to identify hostile nodes in the network, IDSs can often predict how such nodes will act in the future. In this research work, NSL-KDD dataset is used as an input data. SMOTE and Z-score method are used during pre-processing to remove the irrelevant features and normalize the data. The optimal features are carried out by Artificial Butterfly algorithm and then, finally, ensemble classifiers s. Multilayer Perceptron (MLP), Boosted Regression Trees (BRT) and finally, the adaptive voting mechanism is used to select the best classifier. The results proves that the proposed ensemble model achieved 97.16% of accuracy, where the existing models achieved nearly 95% to 96% of accuracy.