Analysis of Behavioral Characteristics of Multiple Blackhole Attacks with TCP and UDP Connections in Mobile ADHOC Networks based on Machine Learning Algorithms
Main Article Content
Abstract
In Mobile Adhoc Networks (MANET’s), a suit of nodes which are under mobility work together to transmit data packets in a multiple-hop manner without relying on any fixed or centralized infrastructure. A significant obstacle in managing these networks is identifying malicious nodes, or "black holes". To detect black holes, we proposed a method involves broadcasting a Cseq to the neighboring nodes and awaiting the node's response is utilized. This Network is simulated with 25 number of nodes connected with TCP connection and observed the different behavioural characteristics of nodes. Then the connections are changed to UDP and observed the characteristics. Then characteristics are analyzed with different machine learning algorithms. The network is simulated in NS2 environment.
Article Details
References
S. Musale, S. Dhende "SAODV: Black hole and gray hole attack detection protocol in MANETs," 2017 International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2017, pp. 2391-2394, doi: 10.1109/WiSPNET.2017.8300188.
N. Sharma , "Detection as well as removal of black hole and gray hole attack in MANET," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 2016, pp. 3736-3739 , doi: 10.1109/ICEEOT.2016.7755409
N. Arya, "Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm," 2015 International Conference on Computer, Communication and Control (IC4), Indore, India, 2015, pp. 1-5, doi: 10.1109/IC4.2015.7375649.
V. K. Saurabh, "Cluster-based technique for detection and prevention of black-hole attack in MANETs," 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 2017, pp. 489-494, doi: 10.1109/ICECA.2017.8212712.
V. Trivedi "Depictive Analysis of MANETs under Black Hole Attack," 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), Mysore, India, 2017, pp. 1116-1120, doi: 10.1109/CTCEEC.2017.8455010.
J. Thakker, J. Desai and L. Ragha, "Avoidance of co-operative black hole attack in AODV in MANET," 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 1049-1053, doi: 10.1109/WiSPNET.2016.7566297.
V. G. Mohite and L. Ragha, "Security agents for detecting and avoiding cooperative blackhole attacks in MANET," 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Davangere, India, 2015, pp. 306-311, doi: 10.1109/ICATCCT.2015.7456900.
S. Shrestha, "Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol," 2020 8th International Electrical Engineering Congress (iEECON), Chiang Mai, Thailand, 2020, pp. 1-4, doi: 10.1109/iEECON48109.2020.229555.
Vimal Kumar “An adaptive approach for detection of blackhole attack in mobile ad hoc network,” Procedia Computer Science, vol. 48, 2015, pp. 472–479.
Shalini, A. K. ., Saxena, S. ., & Kumar, B. S. . (2023). Designing A Model for Fake News Detection in Social Media Using Machine Learning Techniques. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), 218 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2620
Mohammad Al-Shurman, Seong-Moo Yoo, and Seungjin Park, “Black hole attack in mobile ad hoc networks,” in ACMSE’04, April 2–3, 2004, pp. 96–97
Walsh, Gianluca & group, The & Harrow, Jennifer & Psomopoulos, Fotis & Tosatto, Silvio. (2020). DOME: Recommendations for supervised machine learning validation in biology.
Ghosh, Chandril. (2022). Machine Learning. 10.1007/978-3-031-14634-3_4.
D. V S and V. S, "Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs," 2018 International Conference on Networking, Embedded and Wireless Systems (ICNEWS), Bangalore, India, 2018, pp. 1-5, doi: 10.1109/ICNEWS.2018.8903972.
Bala,A.,Bansal,M.,Singh,J.(2009)“Performance Analysis of MANET under BlackholeAttack” In Proceedings of IEEE International Conference on Networks and Communications, NETCOM '09.,pp.141 – 145
Suryawanshi, Ranjeet and Tamhankar,Sunil (2012) “Performance Analysis And Minimization Of Black Hole Attack In MANET”International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue4,pp.1430- 1437
Ming-Yang Su, Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems,Computer Communications, Volume 34, Issue 1, 2011,Pages 107-117,ISSN 0140-3664.
Oscar F. Gonzalez, Godwin Ansa, Michael Howarth and George Pavlou, Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks, Journal of Internet Engineering, vol. 2(1), pp. 181–192, (2008).
G., Maria. (2022). An Approach to Machine Learning. 10.47716/MTS.B.978-93-92090-08-0.
S. Chaturya, Y. Adilakshmi, MBDS: Message Authentication Code (MAC) Based Black Hole Detection System in Manets, International Journal of Innovative Technology and Research, ISSN: 2320-5547, pp. 7980-7987, Feb-Mar 2018, indexed by Google Scholar.
Adilakshmi Yannam, G.V.S.N.R.V.Prasad , "Trust Aware Intrusion Detection System to Defend Attacks in Manets." International Journal of Innovative Technology and Exploring Engineering, 8(7), 1298-1306. ISSN: 2278-3075. BEIESP. (2019) Retrieval Number: F3815048619/19..
Yannam, Adilakshmi & Prasad, Dr. (2019). "Cooperative Intrusion Detection System to Enhance the Security in MANET." Journal of Advanced Research in Dynamical and Control Systems. 11. 100-109.
Muhammad Khan, Machine Learning for Predictive Maintenance in Manufacturing: A Case Study , Machine Learning Applications Conference Proceedings, Vol 1 2021.
Joseph Miller, Peter Thomas, Maria Hernandez, Juan González, Carlos Rodríguez. Machine Learning for Decision Support in Uncertain Environments. Kuwait Journal of Machine Learning, 2(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/205
Ms. Madhuri Zambre. (2012). Performance Analysis of Positive Lift LUO Converter . International Journal of New Practices in Management and Engineering, 1(01), 09 - 14. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/3
Hussain, I., Vinay, P., Deepthi, P. V. L., Mohan, R., & Adilakshmi, M. Y. (2020). "Black hole Attack Detection Using Machine Learning Algorithms in MANET – Performance Comparison." International Research Journal of Engineering and Technology, e-ISSN: 2395-0056, June 2020 , 7(6), pp. 6047-6051.