2021
DOI: 10.1108/ijius-09-2020-0049
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection in mobile ad-hoc network using Hybrid Reactive Search and Bat algorithm

Abstract: PurposeThe mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the mobile ad-hoc network (MANET). In this paper, worm-hole and other destructive malignant attacks are propelled in MANET.Design/methodology/approachA wireless ad-hoc network also called as mobile ad-hoc network (MANET) is a gathering of hubs that utilizes a wireless channel to exchange information and coordinate together to establish informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Their application of autoencoders with the Modbus TCP protocol yielded an impressive F1 score of 98.36%. Similarly, [11][12][13] introduced an unsupervised Attention-based ConvLSTM Autoencoder with a Dynamic Thresholding (ACLAE-DT) framework for handling multivariate time series anomalies. By processing the data and creating feature images, they utilized an attention-based ConvLSTM autoencoder to discern temporal behaviors, achieving AD through dynamic thresholding of reconstruction errors [14][15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Their application of autoencoders with the Modbus TCP protocol yielded an impressive F1 score of 98.36%. Similarly, [11][12][13] introduced an unsupervised Attention-based ConvLSTM Autoencoder with a Dynamic Thresholding (ACLAE-DT) framework for handling multivariate time series anomalies. By processing the data and creating feature images, they utilized an attention-based ConvLSTM autoencoder to discern temporal behaviors, achieving AD through dynamic thresholding of reconstruction errors [14][15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…SVM uses a hyperplane, a subset of supervised machine learning, to determine the best classification for each observation in a given data set. SVM is more effective with big datasets and can handle linear and non-linear problems [25]. SVM is incorporated into WSNs to handle various challenges, including congestion control, fault detection, routing, communication, and localization concerns.…”
Section: B Support Vector Machine (Svm)mentioning
confidence: 99%
“…A total of 20 characteristics are extracted from this model. For the detection of wormhole and other harmful attacks in MANET, a reactive search and the bat algorithm 18 are employed. By using an information exchange coordinator to create a hub, the approach gets rid of the centralised structure.…”
Section: Introductionmentioning
confidence: 99%