Adaptive Voting Mechanism with Artificial Butterfly Algorithm based Feature Selection for IDS in MANET

Parameshachari B.D., Achyutha Prasad N, Dhanraj, M. T. N.
{"title":"Adaptive Voting Mechanism with Artificial Butterfly Algorithm based Feature Selection for IDS in MANET","authors":"Parameshachari B.D., Achyutha Prasad N, Dhanraj, M. T. N.","doi":"10.1109/ICICACS57338.2023.10099861","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks (MANETs) have gained more interest from consumers and academics than ever before thanks to the proliferation of wireless networks and the expansion of the benefits and uses of communication networks in general. MANETs are useful in a wide variety of settings since they don't rely on a centralised server or other hardware to relay messages or process data packets. It's one of the primary justifications for implementing MANET in many different domains. However, there are also numerous difficulties that have arisen as a result of these networks' rising popularity, with network security being one of the most crucial. There have been challenges with data transmission and reception due to MANETs' weak regulatory and security frameworks; network infiltration has been identified as one of the most pressing concerns. In MANETs, wireless nodes serve as relays and routers, connecting the source and sink nodes. Accordingly, it is now possible for rogue nodes to penetrate networks and destroy data packets. In order to cope with this issue, modern intrusion detection systems (IDSs) are utilised for remote monitoring of the functioning and actions of nodes present in wireless sensor networks. As well as being able to identify hostile nodes in the network, IDSs can often predict how such nodes will act in the future. In this research work, NSL-KDD dataset is used as an input data. SMOTE and Z-score method are used during pre-processing to remove the irrelevant features and normalize the data. The optimal features are carried out by Artificial Butterfly algorithm and then, finally, ensemble classifiers s. Multilayer Perceptron (MLP), Boosted Regression Trees (BRT) and finally, the adaptive voting mechanism is used to select the best classifier. The results proves that the proposed ensemble model achieved 97.16% of accuracy, where the existing models achieved nearly 95% to 96% of accuracy.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICACS57338.2023.10099861","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Mobile ad hoc networks (MANETs) have gained more interest from consumers and academics than ever before thanks to the proliferation of wireless networks and the expansion of the benefits and uses of communication networks in general. MANETs are useful in a wide variety of settings since they don't rely on a centralised server or other hardware to relay messages or process data packets. It's one of the primary justifications for implementing MANET in many different domains. However, there are also numerous difficulties that have arisen as a result of these networks' rising popularity, with network security being one of the most crucial. There have been challenges with data transmission and reception due to MANETs' weak regulatory and security frameworks; network infiltration has been identified as one of the most pressing concerns. In MANETs, wireless nodes serve as relays and routers, connecting the source and sink nodes. Accordingly, it is now possible for rogue nodes to penetrate networks and destroy data packets. In order to cope with this issue, modern intrusion detection systems (IDSs) are utilised for remote monitoring of the functioning and actions of nodes present in wireless sensor networks. As well as being able to identify hostile nodes in the network, IDSs can often predict how such nodes will act in the future. In this research work, NSL-KDD dataset is used as an input data. SMOTE and Z-score method are used during pre-processing to remove the irrelevant features and normalize the data. The optimal features are carried out by Artificial Butterfly algorithm and then, finally, ensemble classifiers s. Multilayer Perceptron (MLP), Boosted Regression Trees (BRT) and finally, the adaptive voting mechanism is used to select the best classifier. The results proves that the proposed ensemble model achieved 97.16% of accuracy, where the existing models achieved nearly 95% to 96% of accuracy.
基于人工蝴蝶算法特征选择的自适应投票机制
移动自组织网络(manet)比以往任何时候都获得了消费者和学者更多的兴趣,这要归功于无线网络的扩散以及通信网络的利益和用途的扩大。manet在各种设置中都很有用,因为它们不依赖于集中式服务器或其他硬件来中继消息或处理数据包。这是在许多不同领域实现MANET的主要理由之一。然而,由于这些网络的日益普及,也出现了许多困难,其中网络安全是最关键的问题之一。由于manet的监管和安全框架薄弱,数据传输和接收方面存在挑战;网络渗透已被确定为最紧迫的问题之一。在manet中,无线节点充当中继和路由器,连接源节点和接收节点。因此,现在流氓节点有可能渗透网络并破坏数据包。为了解决这个问题,现代入侵检测系统(ids)被用于远程监控无线传感器网络中节点的功能和行为。除了能够识别网络中的敌对节点外,ids通常还可以预测这些节点未来的行为。本研究使用NSL-KDD数据集作为输入数据。预处理时采用SMOTE和Z-score方法去除不相关特征,对数据进行规范化处理。采用人工蝴蝶算法对特征进行优化,最后采用集成分类器、多层感知器(MLP)、增强回归树(BRT),最后采用自适应投票机制选择最佳分类器。结果表明,该集成模型的准确率达到97.16%,而现有模型的准确率接近95% ~ 96%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信