Detection and Interception of Black Hole Attack with Justification using Anomaly based Intrusion Detection System in MANETs
Syeda Hajra Mahin1, Fahmina Taranum2, Lubna Naaz Fatima3, Khaleel Ur Rahman Khan4

1Syeda Hajra Mahin, Department of Computer Science and Engineering, M.J.C.E.T, Hyderabad (Telangana), India.
2Fahmina Taranum, Department of Computer Science and Engineering, M.J.C.E.T, Hyderabad (Telangana), India.
3Lubna Naaz Fatima, Department of Computer Science and Engineering, M.J.C.E.T, Hyderabad (Telangana), India.
4Khaleel Ur Rahman Khan, Department of Computer Science and Engineering, Ace Engineering College, Hyderabad (Telangana), India.
Manuscript received on 15 October 2019 | Revised Manuscript received on 24 October 2019 | Manuscript Published on 02 November 2019 | PP: 2392-2398 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B12740982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1274.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile adhoc network, a derivative of the adhoc network is sensitive to heterogeneous forms of attacks in particular passive and active attacks. Black hole attack is one such continually prevailing threat in mobile adhoc networks (MANETs), where specific nodes operate spitefully in the course of data transmission. Throughout this work, we intend to present an effectual approach to detect and intercept this attack taking into account Dynamic MANET on-demand (DYMO) routing protocol. This work presupposes working in three modulesplanting, detection and ultimately the interception against the black hole attack. An IDS is initiated on the notion of machine leaning using MATLAB software. A relative scrutiny of IDS grounded on classifiers like K-Nearest Neighbor, Support Vector Machine, Decision tree and neural network is also conducted to make it certain that the best feasible classifier is settled on for administering the IDS. The analysis of the put forward work is subsequently accomplished taking miscellaneous metrics covering packet drop rate, average transmission delay, Packet Delivery Ratio along with throughput.
Keywords: Black Hole Attack, DYMO, Intrusion Detection System, MANETs
Scope of the Article: System Integration