An Intrusion Detection System for MANET based on Cuckoo Search Algorithm and Decision Tree
N. Kaur1 , K. Sharma2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 1714-1719, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.17141719
Online published on May 31, 2019
Copyright © N. Kaur, K. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: N. Kaur, K. Sharma, “An Intrusion Detection System for MANET based on Cuckoo Search Algorithm and Decision Tree,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1714-1719, 2019.
MLA Style Citation: N. Kaur, K. Sharma "An Intrusion Detection System for MANET based on Cuckoo Search Algorithm and Decision Tree." International Journal of Computer Sciences and Engineering 7.5 (2019): 1714-1719.
APA Style Citation: N. Kaur, K. Sharma, (2019). An Intrusion Detection System for MANET based on Cuckoo Search Algorithm and Decision Tree. International Journal of Computer Sciences and Engineering, 7(5), 1714-1719.
BibTex Style Citation:
@article{Kaur_2019,
author = {N. Kaur, K. Sharma},
title = {An Intrusion Detection System for MANET based on Cuckoo Search Algorithm and Decision Tree},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1714-1719},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4477},
doi = {https://doi.org/10.26438/ijcse/v7i5.17141719}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.17141719}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4477
TI - An Intrusion Detection System for MANET based on Cuckoo Search Algorithm and Decision Tree
T2 - International Journal of Computer Sciences and Engineering
AU - N. Kaur, K. Sharma
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1714-1719
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
339 | 209 downloads | 158 downloads |
Abstract
With increasing use of wireless networks there is increase in the number of intruder in networks. This could be explained by taking the example of the Mobile ad-hoc Network, as it is a network with no fixed infrastructure, security is the main issue in this network. During the transmission of data from source to destination, any node in network can act as an intruder .The intruder will not allow the successful transmission of the data. So, Intrusion detection system using cuckoo search and decision tree has been designed to detect the intruder node and exclude it from the network. The outcome has been depicted using MATLAB simulator using 45 to 60 nodes. For these nodes there are number rounds for which nodes are plotted. From each round the affected nodes are calculated on the basis of energy consumed by the nodes. The node which consumes maximum energy is the intruder in the network. Optimization of various QOS parameters is performed using Cuckoo search algorithm. The detected intruder is presented using decision tree.
Key-Words / Index Term
MANET,Cuckoo search algorithm, Intrusion Detection system,Decision Tree
References
[1] R. Kumari , P. Nand, “Performance Analysis for MANETs using certain realistic mobility models: NS-2” , International Journal of Scientific Research in Computer Science and Engineering , Vol. 6, No. 1,pp. 70-77, 2018.
[2] R. Kumari , P. Nand, “Performance Analysis of Existing Routing Protocols” , International Journal of Scientific Research in Computer Science and Engineering , Vol. 5, No. 5,pp. 47-50, 2017.
[3] P. Rutravigneshwaran, “A Study of Intrusion Detection System using Efficient Data Mining Techniques”, Int. J. Sc. Res. in Network Security and Communication, Vol. 5, No. 6, pp.5-8, 2017.
[4] C.Zefan, Y.Xiaodong, “Cuckoo Search Algorithm with Deep Search”, In the Proceedings of 2017 3rd IEEE International Conference on Computer and Communications (ICCC 2017),Chengdu, China,pp.2241-2246,2017
[5] M.A.Jabbar, S.Samreen, “Intelligent network intrusion detection using alternating decision trees”, In the Proceedings of 2016 International Conference on Circuits, Controls, Communications and Computing (I4C), Bangalore, India, pp.1-6,2016.
[6] A.Hinds, M.Ngulube, S.Zhu, “A Review of Routing Protocols for Mobile Ad-Hoc Networks (MANET)”, International Journal of Information and Education Technology, Vol. 3, No. 1,pp.1-5, 2013.
[7] Z.Yuan, C.Wang, “An improved network traffic classification algorithm based in Hadoop Decision tree”, In the Proceedings of 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS), Chongqing, China, pp.53-56,2016.
[8] A.Biradar, R.C.Thool, “Effectiveness of Genetic Algorithm In Reactive Protocols For MANET”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 2, Issue 7,pp.1757-1761, 2013.
[9] C.Khetmal1, S.Kelkar, N.Bhosale, “MANET: Black Hole Node Detection in AODV”, International Journal of Computational Engineering Research, Vol. 03, Issue 6, pp.79-85,2013.
[10] F.L.Fessant, A.Papadimitriou, A.C.Viana, C.Sengul, E.Palomar, “A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis”, Computer Communications ,Vol.35, Issue 2, pp. 234–248,2012.