Chained Hash Table-Based Filtering Model for Detection of Flooding and Dos Attack in Manet

Saved in:
Bibliographic Details
Title: Chained Hash Table-Based Filtering Model for Detection of Flooding and Dos Attack in Manet
Authors: P. V., Shyamily, B. K., Anoop
Source: International Journal of Intelligent Systems and Applications in Engineering; Vol. 12 No. 20s (2024); 301-321
Publisher Information: International Journal of Intelligent Systems and Applications in Engineering, 2024.
Publication Year: 2024
Subject Terms: Chinese Remainder Theory based Digital Signature Algorithm (CRT-DSA), Correlation Coefficient based Galactic Swarm Optimization (CC-GSO), Particle Swarm Optimization (PSO), Soft kernel Swish based Recurrent Neural Network (SS-RNN), Boltzmann Gibbs Trapezoidal Entropy based Fuzzy (BGTE-Fuzzy) Algorithm, Denial-of-Service (DoS), Mobile Ad Hoc Network (MANET), Chinese Remainder Theory based Digital Signature Algorithm (CRT-DSA), Boltzmann Gibbs Trapezoidal Entropy based Fuzzy (BGTE-Fuzzy) Algorithm, Correlation Coefficient based Galactic Swarm Optimization (CC-GSO), Soft kernel Swish based Recurrent Neural Network (SS-RNN), Particle Swarm Optimization (PSO), Denial-of-Service (DoS), Mobile Ad Hoc Network (MANET)
Description: Mobile Ad Hoc Network (MANET), which connects mobile devices to all devices in the network where security is an essential task caused by Malicious Nodes (MNs), is a wireless communication technology. One of the crucial attacks that aim to exhaust network resources by flooding it with numerous fake packets as well as messages is the flooding attack. Hence, to detect flooding attacks, many models were developed. However, the models did not detect the sequences of flooding attacks. Therefore, this work proposes a soft kernel Swish-based Recurrent Neural Network (SS-RNN)-based sequential flooding attack detection model in MANET. Primarily, the nodes are initialized. Thereafter, the signature is created for the packet information utilizing the Chinese Remainder Theory-based Digital Signature Algorithm (CRT-DSA). Afterward, the packets are transmitted to nodes for connection establishment. The signed packet is verified, and to eliminate the attacked packets, the legitimate user’s packets are filtered utilizing Boltzmann Gibbs Trapezoidal Entropy based Fuzzy (BGTE-Fuzzy). By utilizing XNOR-HAVAL, the packet information is hashed and added into the chaining grounded on time series to identify flooding attacks, namely HELLO, Internet Control Message Protocol(ICMP), Synchronize an Acknowledgement (SYN-ACK), Acknowledgement (ACK), and Data flooding. After that, using SS-RNN, Denial-of-Service (DoS) attacks are detected. Lastly, for data transmission, the optimal path is created utilizing Correlation Coefficient-based Galactic Swarm Optimization (CC-GSO). To prevent security in MANET, the developed model classifies attacks with an accuracy of 98.41%.
Document Type: Article
File Description: application/pdf
Language: English
ISSN: 2147-6799
Access URL: https://www.ijisae.org/index.php/IJISAE/article/view/5142
Rights: CC BY SA
Accession Number: edsair.issn21476799..2e876013af9bc72c1fd96d19ebeb8c37
Database: OpenAIRE
Description
Abstract:Mobile Ad Hoc Network (MANET), which connects mobile devices to all devices in the network where security is an essential task caused by Malicious Nodes (MNs), is a wireless communication technology. One of the crucial attacks that aim to exhaust network resources by flooding it with numerous fake packets as well as messages is the flooding attack. Hence, to detect flooding attacks, many models were developed. However, the models did not detect the sequences of flooding attacks. Therefore, this work proposes a soft kernel Swish-based Recurrent Neural Network (SS-RNN)-based sequential flooding attack detection model in MANET. Primarily, the nodes are initialized. Thereafter, the signature is created for the packet information utilizing the Chinese Remainder Theory-based Digital Signature Algorithm (CRT-DSA). Afterward, the packets are transmitted to nodes for connection establishment. The signed packet is verified, and to eliminate the attacked packets, the legitimate user’s packets are filtered utilizing Boltzmann Gibbs Trapezoidal Entropy based Fuzzy (BGTE-Fuzzy). By utilizing XNOR-HAVAL, the packet information is hashed and added into the chaining grounded on time series to identify flooding attacks, namely HELLO, Internet Control Message Protocol(ICMP), Synchronize an Acknowledgement (SYN-ACK), Acknowledgement (ACK), and Data flooding. After that, using SS-RNN, Denial-of-Service (DoS) attacks are detected. Lastly, for data transmission, the optimal path is created utilizing Correlation Coefficient-based Galactic Swarm Optimization (CC-GSO). To prevent security in MANET, the developed model classifies attacks with an accuracy of 98.41%.
ISSN:21476799