By Topic

An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Barani, F. ; Fac. of Electr. & Comput. Eng., Tarbiat Modares Univ., Tehran, Iran ; Abadi, M.

Network topology in mobile ad hoc networks (MANETs) changes rapidly due to the mobility of nodes. Hence, an important challenge for these networks is to develop an approach which can detect anomalies in network traffic with high accuracy despite the dynamic changing of network topology. In this paper, we present a hybrid approach based on the artificial bee colony (ABC) and negative selection (NS) algorithms, called BeeNS, for dynamic anomaly detection in AODV-based MANETs. In the approach, every node first extracts a set of feature vectors of its own normal network traffic. Each feature vector is represented by a hypersphere with fixed radius in the feature space. It then applies the NicheNABC algorithm to generate a set of mature negative detectors for covering of the nonself space. The negative detectors, represented by hyperspheres with variable radii, are used to detect anomalies in network traffic. It eventually updates the mature negative detectors by one of two methods of partial updating or total updating. In order to evaluate the performance of BeeNS, we simulated some routing attacks in AODV-based MANETs using the NS2 simulator. The experimental results demonstrate that BeeNS achieves comparable or better performance than the approaches previously reported in the literature, in terms of detection and false alarm rates.

Published in:

Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on

Date of Conference:

16-18 Nov. 2011