Wireless Networks

, Volume 24, Issue 5, pp 1821–1829 | Cite as

A novel support vector machine based intrusion detection system for mobile ad hoc networks

  • Erfan A. Shams
  • Ahmet Rizaner


The performance of mobile ad hoc networks (MANETs) is significantly affected by the malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a type of intrusion specifically designed to target service integrity and availability of a certain network node. Hence, it is important to use an efficient intrusion detection system (IDS) that detects and removes the malicious nodes in the network to improve the performance by monitoring the network traffic continuously. The main contribution of this paper is the integration of an IDS into MANETs as a reliable and potent solution. A new approach to intrusion detection is developed based on support vector machine algorithm. The proposed IDS can detect the DoS type attacks at a high detection rate with a simple structure and short computing time. It is shown by extensive computer simulation that the proposed IDS improves the reliability of the network significantly by detecting and removing the malicious nodes in the system. The performance of the suggested approach is independent of the network routing protocol. The detection rate of the system is also not effected by node mobility and network size.


Support vector machines Denial of service Intrusion detection Mobile ad hoc networks Machine learning 



The authors are grateful to the editor and the anonymous reviewers for their constructive comments and suggestions, which helped us to improve the manuscript.


  1. 1.
    Denko, M. K. (2005). Detection and prevention of denial of service (DoS) attacks in mobile ad hoc networks using reputation-based incentive scheme. Systemics, Cybernetics and Informatics, 3(4), 1–9.Google Scholar
  2. 2.
    Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks—A survey. Computer Communications, 51, 1–20. doi: 10.1016/j.comcom.2014.06.003.CrossRefGoogle Scholar
  3. 3.
    Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15(4), 2027–2045.CrossRefGoogle Scholar
  4. 4.
    Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.CrossRefGoogle Scholar
  5. 5.
    Amudhavel, J., Brindha, V., Anantharaj, B., Karthikeyan, P., Bhuvaneswari, B., Vasanthi, M., et al. (2016). A survey on intrusion detection system: State of the art review. Indian Journal of Science and Technology, 9(11), 1–9. doi: 10.17485/ijst/2016/v9i11/89264.Google Scholar
  6. 6.
    Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Communications Surveys and Tutorials, 15(4), 2046–2069. doi: 10.1109/SURV.2013.031413.00127.CrossRefGoogle Scholar
  7. 7.
    Schweitzer, N., Stulman, A., Shabtai, A., & Margalit, R. D. (2016). Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Transactions on Mobile Computing, 15(1), 163–172.CrossRefGoogle Scholar
  8. 8.
    Ahmed, M. N., Abdullah, A. H., & Kaiwartya, O. (2016). FSM-F: Finite state machine based framework for denial of service and intrusion detection in MANET. PLoS ONE, 11(6), e0156885. doi: 10.1371/journal.pone.015688.CrossRefGoogle Scholar
  9. 9.
    Poongodi, M., & Bose, S. (2015). A novel intrusion detection system based on trust evaluation to defend against DDoS attack in MANET. Arabian Journal for Science and Engineering, 40(12), 3583–3594. doi: 10.1007/s13369-015-1822-7.CrossRefGoogle Scholar
  10. 10.
    Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). DoS attacks in mobile ad hoc networks: A survey. In 2012 second international conference on advanced computing & communication technologies (pp. 535–541). IEEE. doi: 10.1109/ACCT.2012.48
  11. 11.
    Sundararajan, T. V. P., Ramesh, S. M., Maheswar, R., & Deepak, K. R. (2014). Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET. Wireless Networks, 20(4), 563–578.CrossRefGoogle Scholar
  12. 12.
    Chhabra, M., & Gupta, B. B. (2014). An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Research Journal of Applied Sciences, Engineering and Technology, 7(10), 2033–2039.CrossRefGoogle Scholar
  13. 13.
    Desilva, S., & Boppana, R. V. (2005). Mitigating malicious control packet floods in ad hoc networks. In IEEE wireless communications and networking conference, 2005 (Vol. 4, pp. 2112–2117). IEEE.Google Scholar
  14. 14.
    Mirkovic, J., Fahmy, S., Reiher, P., Thomas, R., Hussain, A., Schwab, S., & Ko, C. (2006). Measuring impact of DoS attacks. In Proceedings of the DETER community workshop on cyber security experimentation.Google Scholar
  15. 15.
    Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRefGoogle Scholar
  16. 16.
    Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556. doi: 10.1002/sec.1484.CrossRefGoogle Scholar
  17. 17.
    Akilarasu, G., & Shalinie, S. M. (2016). Wormhole-free routing and DoS attack defense in wireless mesh networks. Wireless Networks. doi: 10.1007/s11276-016-1240-0.Google Scholar
  18. 18.
    Jin, X., Zhang, Y., Pan, Y., & Zhou, Y. (2006). ZSBT: A novel algorithm for tracing DoS attackers in MANETs. EURASIP Journal on Wireless Communications and Networking, 2006(2), 1–9. doi: 10.1155/WCN/2006/96157.CrossRefGoogle Scholar
  19. 19.
    Mukkamala, S., & Sung, A. H. (2003). Detecting denial of service attacks using support vector machines. In The 12th IEEE international conference on fuzzy systems (Vol. 2, pp. 1231–1236). IEEE.Google Scholar
  20. 20.
    Devi, P., & Kannammal, A. (2016). An integrated intelligent paradigm to detect DDoS attack in mobile ad hoc networks. International Journal of Embedded Systems, 8(1), 69–77.CrossRefGoogle Scholar
  21. 21.
    Marimuthu, M., & Krishnamurthi, I. (2013). Enhanced OLSR for defense against DOS attack in ad hoc networks. Journal of Communications and Networks, 15(1), 31–37. doi: 10.1109/JCN.2013.000007.CrossRefGoogle Scholar
  22. 22.
    Şen, S., & Clark, J. A. (2009). Intrusion detection in mobile ad hoc networks (pp. 427–454). London: Springer.Google Scholar
  23. 23.
    Chen, H., & Lijin, L. (2012). Method and system for UDP flood attack detection. U.S. Patent No. 8,307,430. Washington, DC: U.S. Patent and Trademark Office.Google Scholar
  24. 24.
    Annamalai, A., & Yegnanarayanan, V. (2012). Secured system against DDoS attack in mobile adhoc network. WSEAS Transactions on Communications, 11(9), 331–341.Google Scholar
  25. 25.
    Nishani, L., & Biba, M. (2016). Machine learning for intrusion detection in MANET: A state-of-the-art survey. Journal of Intelligent Information Systems, 46(2), 391–407.CrossRefGoogle Scholar
  26. 26.
    Peng, S., Hu, Q., Chen, Y., & Dang, J. (2014). Improved support vector machine algorithm for heterogeneous data. Pattern Recognition, 48(6), 2072–2083. doi: 10.1016/j.patcog.2014.12.015.CrossRefzbMATHGoogle Scholar
  27. 27.
    The Network Simulator - ns-2.
  28. 28.
    Guns, R., Lioma, C., & Larsen, B. (2012). The tipping point: F-score as a function of the number of retrieved items. Information Processing and Management, 48(6), 1171–1180. doi: 10.1016/j.ipm.2012.02.009.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Department of Mathematics and Computer Science, Faculty of Arts and SciencesEastern Mediterranean UniversityFamagustaTurkey
  2. 2.Department of Information Technology, School of Computing and TechnologyEastern Mediterranean UniversityFamagustaTurkey

Personalised recommendations