IRJET- An Efficient Supervised Learning Approach to Mitigate DDOS Threat in Manet

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 08 Issue: 07 | July 2021

p-ISSN: 2395-0072

www.irjet.net

AN EFFICIENT SUPERVISED LEARNING APPROACH TO MITIGATE DDOS THREAT IN MANET Rashid Rafiq Shah1, Dr. Monika Sachdeva2 1Dept.

of Computer Science and Engineering, I.K. Gujral Punjab Technical University kapurthala road Jalandhar144603, india. 2Head of the Dept. of Computer Science and Engineering, I.K. Gujral Punjab Technical University kapurthala road Jalandhar-144603, India. ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract computational and processing operations. Most of the researchers found the collision problems The proposed work deals with the sensor network between the packets which will degrade the security in which the mitigation of the attack takes performance and increase the energy consumption place using optimization and machine learning [1]. The work is done on the secure approach to process. The back propagation neural network is reduce the energy consumption and computational used to detect the attack scenario and the costs. Depending on the network structure, optimization used is the moth flame optimization in different routing schemes fall into this category. which the effect of DDOS will be mitigated in terms Sensor network can be non-hierarchical or flat in of the network performance. The neural process the sense that every sensor has the same role and will train the network in an iterative manner so that functionality. Therefore the connections between if there is any malicious activity occurs then it will the nodes are set in short distance to establish the detect and based on that the mitigation is radio communication [2]. A lot of work is done performed. In the proposed approach the DDOS using clustering approach in sensor networks for effect that we have considered is the flooding attack energy optimization and scaling of the network. in which the performance of the network is Many network administrators found the problem of evaluated in terms of overhead consumption, sudden increase in the energy consumption in legitimate traffic comprises of alpha values and no. packet transferring systems. As a result of which of packets per second are evaluated. From the they uses clustering approach to decrease the simulations the proposed approach is well suited to energy consumption. A sensor network can be perform detection and mitigation process up to that hierarchical or cluster-based hierarchical model, extent that the network will get stable with high where the network is divided into clusters network lifetime and low packet losses. So when comprising of number of nodes. Cluster head, which the system knows that the flooding of the packets is master node, within each respective cluster is are increasing the overload on the nodes which acts responsible for routing the information to other as a server to communicate to the application units, cluster head. Another class of routing protocols is then the system will exceeded the sessions of based on the location information of the sensor sending the packets which shows that the DDOS is nodes either estimated on the basis of incoming occurred in the network or system. The proposed signal strengths or obtained by small low-power approach uses the hybrid approach using GPS receivers or even by combination of the two optimization with the supervised learning approach previous methods. Location-based protocols use to train the system in such a manner that the this information to reduce the latency and energy system detect and mitigates the flooding attack to consumption of the sensor network. reduce the overhead consumption of the system. Sensor Networks consists of spatially distributed Key Words: Packets, Attacks, Services, Nodes. autonomous sensor nodes to monitor physical or environmental conditions, such as temperature, 1. INTRODUCTION sound, pressure, etc. at different locations. Security A sensor network is an active research area with is one of the main constraints in wireless sensor numerous workshops and conferences arranged networks which are the big issue in real time each year. A Sensor Networks is a set of hundreds scenarios. QOS optimization is the core issue in or thousands of micro sensor nodes that have sensor networks because nodes are battery capabilities of sensing, establishing wireless operated. Consequently many protocols have been communication between each other and doing © 2021, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 4862


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
IRJET- An Efficient Supervised Learning Approach to Mitigate DDOS Threat in Manet by IRJET Journal - Issuu