A Survey on Various Kinds of Anomalies Detection Techniques in the Mobile Adhoc Network Environment

Authors

  • Niyaz Hussain A M J  Ph.D. Research Scholar / Asst.Professor, Department of Computer Science, Sri Ramakrishana College of Arts & Science (Formerly SNR Sons College) Coimbatore, Tamilnadu, India
  • Dr. G Maria Priscilla  Professor & Head, Department of Computer Science, Sri Ramakrishana College of Arts & Science (Formerly SNR Sons College) Coimbatore, Tamilnadu, India

Keywords:

Anomaly Detection, NIDS, Statistical Methods, Data-Mining Methods, Machine Learning System.

Abstract

In recent days, network security has reached its peak and lots of devices were brought-in to enhance the security of a network. In this work, is executed by Network Intrusion Detection Systems (NIDS). In various research areas and in applications domains, this NIDS is analyzed, because anomaly detection done here is a significant issue. In some application domains, various anomaly detection approaches were established, while rest of the applications are generic. This analysis concentrates on the anomalies detection in the Network Intrusion Detection Systems (NIDS). Presently, researchers concentrate on the instruction detection systems through data mining techniques. Our work concentrates on the examination of different methodologies for anomaly detection for NIDS. The key value of NIDS is to mechanically assume the attacks which are yet to known. Various anomaly detection mechanisms were suggested to identify those deviations that can be classified into statistical methods, data-mining methods and machine learning based methods. In our work, various techniques were distinguished with the specific merits and demerits of one another.

References

  1. Harada, Yoshiyuki, et al. "Log-based Anomaly Detection of CPS Using a Statistical Method." Empirical Software Engineering in Practice (IWESEP), 2017 8th International Workshop on. IEEE, 2017.
  2. Holst, Anders, and Bjorn Bjurling. "A Bayesian parametric statistical anomaly detection method for finding trends and patterns in criminal behavior." Intelligence and Security Informatics Conference (EISIC), 2013 European. IEEE, 2013.
  3. Li, Jiayi, et al. "Hyperspectral anomaly detection by the use of background joint sparse representation." IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 8.6 (2015): 2523-2533.
  4. Wahab, Ainuddin Wahid Abdul, et al. "Passive video forgery detection techniques: a survey." Information assurance and security (IAS), 2014 10th International Conference on. IEEE, 2014.
  5. Wang, Jing, et al. "Network anomaly detection: A survey and comparative analysis of stochastic and deterministic methods." Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on. IEEE, 2013.
  6. Kaloorazi, Maboud F., and Rodrigo C. de Lamare. "Anomaly detection in IP networks based on randomized subspace methods." Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on. IEEE, 2017.
  7. Fuse, Takashi, and Keita Kamiya. "Statistical Anomaly Detection in Human Dynamics Monitoring Using a Hierarchical Dirichlet Process Hidden Markov Model." IEEE Transactions on Intelligent Transportation Systems (2017).
  8. Wang, Yu, Ren-JieJin, and Wei-Jie Han. "An anomaly traffic detection method based on the flow template for the controlled network." Optical Communications and Networks (ICOCN), 2016 15th International Conference on. IEEE, 2016.
  9. Tan, Tunzi, et al. "Two New Term Weighting Methods for Router Sys logs Anomaly Detection." High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/Smart City/DSS), 2016 IEEE 18th International Conference on. IEEE, 2016.
  10. Russo, Barbara, Giancarlo Succi, and WitoldPedrycz. "Mining system logs to learn error predictors: a case study of a telemetry system." Empirical Software Engineering 20.4 (2015): 879-927.
  11. Mahmoud, Rwan, et al. "Internet of things (iot) security: Current status, challenges and prospective measures." Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for. IEEE, 2015.
  12. Mohd, Raffie ZA, et al. "Anomaly-based NIDS: A review of machine learning methods on malware detection." Information and Communication Technology (ICICTM), International Conference on. IEEE, 2016.
  13. Miyazawa, Masanori, Michiaki Hayashi, and Rolf Stadler. "vNMF: Distributed fault detection using clustering approach for network function virtualization." Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on. IEEE, 2015.
  14. Murphree, Jerry. "Machine learning anomaly detection in large systems." IEEE AUTOTESTCON, 2016. IEEE, 2016.
  15. Steyn, Carl, and Alta de Waal. "Semi-supervised machine learning for textual anomaly detection." Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), 2016. IEEE, 2016.
  16. Valdes, Alfonso, Richard Macwan, and Matthew Backes. "Anomaly Detection in Electrical Substation Circuits via Unsupervised Machine Learning." Information Reuse and Integration (IRI), 2016 IEEE 17th International Conference on. IEEE, 2016.
  17. Janakiraman, Vijay Manikandan, and David Nielsen. "Anomaly detection in aviation data using extreme learning machines." Neural Networks (IJCNN), 2016 International Joint Conference on. IEEE, 2016.
  18. Mehmood, Tahir, and Helmi B. MdRais. "Machine learning algorithms in context of intrusion detection." Computer and Information Sciences (ICCOINS), 2016 3rd International Conference on. IEEE, 2016.
  19. Sreekesh, Manasa. "A two-tier network based intrusion detection system architecture using machine learning approach." Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on. IEEE, 2016.
  20. Landress, Angela Denise. "A hybrid approach to reducing the false positive rate in unsupervised machine learning intrusion detection." South east Con, 2016. IEEE, 2016.
  21. Chaudhary, A., Tiwari, V. N., & Kumar, A. (2016). A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in manets. International Journal of Network Security, 18(3), 514-522.
  22. Rmayti, M., Khatoun, R., Begriche, Y., Khoukhi, L., &Gaiti, D. (2017). A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks. Computer Networks, 121, 53-64.
  23. A.R. Jakhale, G.A. Patil, "Anomaly Detection System by Mining Frequent Pattern using Data Mining Algorithm from Network Flow", International Journal of Engineering Research and Technology, Vol. 3, No.1, January 2014, ISSN. 2278-0181.
  24. Gadal, Saad Mohamed Ali Mohamed, and Rania A. Mokhtar. "Anomaly detection approach using hybrid algorithm of data mining technique." Communication, Control, Computing and Electronics Engineering (ICCCCEE), 2017 International Conference on. IEEE, 2017.
  25. Leu, F.Y., Tsai, K.L., Hsiao, Y.T. and Yang, C.T., 2015. An Internal Intrusion Detection and Protection System by using Data Mining and Forensic Techniques.
  26. Richa and Saurabh Mittal. 2014, Data Mining Approach IDS K-Mean using Weka Environment, I JARCSSE, Volume 4.
  27. Alseiari, Fadwa Abdul Aziz, and Zeyar Aung. "Real-time anomaly-based distributed intrusion detection systems for advanced Metering Infrastructure utilizing stream data mining." Smart Grid and Clean Energy Technologies (ICSGCE), 2015 International Conference on. IEEE, 2015.
  28. Cui, Baojiang, Shanshan He, and HaifengJin. "Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining." Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on. IEEE, 2015.
  29. Yassin, Warusia, et al. "Signature-Based Anomaly intrusion detection using integrated data mining classifiers." Biometrics and Security Technologies (ISBAST), 2014 International Symposium on. IEEE, 2014.
  30. Wijayasekara, Dumidu, et al. "Mining building energy management system data using fuzzy anomaly detection and linguistic descriptions." IEEE Transactions on Industrial Informatics 10.3 (2014): 1829-1840.
  31. DrashtiNandasana; Virendra Barot, "A framework for database intrusion detection system", International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), 2016 , pp: 74-78.
  32. Sultana, Amreen, and M. A. Jabbar. "Intelligent network intrusion detection system using data mining techniques." Applied and Theoretical Computing and Communication Technology (iCATccT), 2016 2nd International Conference on. IEEE, 2016.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Niyaz Hussain A M J, Dr. G Maria Priscilla, " A Survey on Various Kinds of Anomalies Detection Techniques in the Mobile Adhoc Network Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1538-1541, March-April-2018.