一种基于改进混沌Elman神经网络的入侵检测系统,用于保护移动自组织网络免受DDoS攻击

IF 1.2 Q2 MATHEMATICS, APPLIED
Tuka Kareem Jebuer
{"title":"一种基于改进混沌Elman神经网络的入侵检测系统,用于保护移动自组织网络免受DDoS攻击","authors":"Tuka Kareem Jebuer","doi":"10.1080/09720529.2022.2075063","DOIUrl":null,"url":null,"abstract":"Abstract A mobile ad hoc network (MANETs) is a collection of moving nodes that combine into a network with no predefined infrastructure. There are many types of attacks that could target MANETS, one among them is Distributed Denial of service attacks (DDoS). DDoS is defined as attacking routing functions and taking down the entire operation of the mobile ad hoc network. The two primary victims of DDoS attacks are the functions of routing and battery capacity. The DDoS attack can cause routing table overflow which in turn can potentially cause the infected node floods. The routing overflow is followed by creating a fake route packet to consume the available resources of the participating active nodes. This cause disrupts the normal functioning of legitimate routes. In recent years, different approaches are implemented to improve the security level of MANET. In this work, the Cuckoo Search Algorithm-based Modified Elman’s Neural Network (CSA - MENN) approaches have been proposed to overcome DDoS attacks. The CSA - MENN approaches consists of three-part which are Cuckoo search algorithm clustering area to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then the Modified Elman Neural Network (MENN) is employed to prevent a malicious node from sending data to the destination by determining node that consumed more resources. Packets could be lost or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The data set, CICIDS 2017, used in this article divides the data into 7 groups: 5 for training, 1 for validation, and 1 for generalization. In summary, approximately 71.4 percent of data is used for training and 28.6 percent for validation and generalization.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack\",\"authors\":\"Tuka Kareem Jebuer\",\"doi\":\"10.1080/09720529.2022.2075063\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract A mobile ad hoc network (MANETs) is a collection of moving nodes that combine into a network with no predefined infrastructure. There are many types of attacks that could target MANETS, one among them is Distributed Denial of service attacks (DDoS). DDoS is defined as attacking routing functions and taking down the entire operation of the mobile ad hoc network. The two primary victims of DDoS attacks are the functions of routing and battery capacity. The DDoS attack can cause routing table overflow which in turn can potentially cause the infected node floods. The routing overflow is followed by creating a fake route packet to consume the available resources of the participating active nodes. This cause disrupts the normal functioning of legitimate routes. In recent years, different approaches are implemented to improve the security level of MANET. In this work, the Cuckoo Search Algorithm-based Modified Elman’s Neural Network (CSA - MENN) approaches have been proposed to overcome DDoS attacks. The CSA - MENN approaches consists of three-part which are Cuckoo search algorithm clustering area to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then the Modified Elman Neural Network (MENN) is employed to prevent a malicious node from sending data to the destination by determining node that consumed more resources. Packets could be lost or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The data set, CICIDS 2017, used in this article divides the data into 7 groups: 5 for training, 1 for validation, and 1 for generalization. In summary, approximately 71.4 percent of data is used for training and 28.6 percent for validation and generalization.\",\"PeriodicalId\":46563,\"journal\":{\"name\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2022-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/09720529.2022.2075063\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/09720529.2022.2075063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
引用次数: 1

摘要

摘要移动自组织网络(MANET)是一组移动节点,它们组合成一个没有预定义基础设施的网络。有许多类型的攻击可能以MANETS为目标,其中之一就是分布式拒绝服务攻击(DDoS)。DDoS被定义为攻击路由功能并摧毁移动自组织网络的整个操作。DDoS攻击的两个主要受害者是路由功能和电池容量。DDoS攻击可能导致路由表溢出,进而可能导致受感染节点泛滥。路由溢出之后是创建一个伪路由数据包,以消耗参与活动节点的可用资源。这一原因扰乱了合法路线的正常运作。近年来,为了提高MANET的安全级别,人们采用了不同的方法。在这项工作中,提出了基于Cuckoo搜索算法的改进Elman神经网络(CSA-MENN)方法来克服DDoS攻击。CSA-MENN方法由三部分组成:杜鹃搜索算法聚类区域以增强从源到目的地的路径,利用混沌理论模块检测异常节点,然后利用改进的Elman神经网络(MENN)通过确定消耗更多资源的节点来防止恶意节点向目的地发送数据。数据包可能会丢失,或者受害者可能会重置攻击者与自身之间的路径。CICIDS数据集已用于测试和评估基于准确性、数据包丢失和抖动标准的所提出方法的性能。本文中使用的数据集CICIDS 2017将数据分为7组:5组用于训练,1组用于验证,1组进行泛化。总之,大约71.4%的数据用于训练,28.6%用于验证和概括。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack
Abstract A mobile ad hoc network (MANETs) is a collection of moving nodes that combine into a network with no predefined infrastructure. There are many types of attacks that could target MANETS, one among them is Distributed Denial of service attacks (DDoS). DDoS is defined as attacking routing functions and taking down the entire operation of the mobile ad hoc network. The two primary victims of DDoS attacks are the functions of routing and battery capacity. The DDoS attack can cause routing table overflow which in turn can potentially cause the infected node floods. The routing overflow is followed by creating a fake route packet to consume the available resources of the participating active nodes. This cause disrupts the normal functioning of legitimate routes. In recent years, different approaches are implemented to improve the security level of MANET. In this work, the Cuckoo Search Algorithm-based Modified Elman’s Neural Network (CSA - MENN) approaches have been proposed to overcome DDoS attacks. The CSA - MENN approaches consists of three-part which are Cuckoo search algorithm clustering area to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then the Modified Elman Neural Network (MENN) is employed to prevent a malicious node from sending data to the destination by determining node that consumed more resources. Packets could be lost or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The data set, CICIDS 2017, used in this article divides the data into 7 groups: 5 for training, 1 for validation, and 1 for generalization. In summary, approximately 71.4 percent of data is used for training and 28.6 percent for validation and generalization.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
3.10
自引率
21.40%
发文量
126
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信