SVM-Based System For Detecting
SVM-Based System For Detecting
Blackhole Attacks
Abstract— Mobile Ad hoc Networks (MANETs) are now and others. When it comes to routing challenges, nodes
essential in the modern world. They are crucially required in a require a routing function in order to communicate with one
variety of circumstances where it is necessary to promptly put another efficiently. The fundamental purpose of the routing
together a network without having the luxury of time or function is to make sure that the message from the sender
resources to set up infrastructure or even have human takes the shortest path possible to get to its target location.
involvement. There are numerous uses for ad hoc networks. For a variety of reasons, the traditional infrastructure routing
They can be utilized, among many other things, in education, protocols are ineffective for MANETs. One of them is that
on the battlefield, during rescue operations, etc. These
MANETs lack infrastructure, hence routers are not present to
networks are characterized by high mobility and limited
computing power, storage, and limited energy. They don't
execute the routing task in these networks. Rather, practically
employ infrastructure-related communication tools because every network node performs this role. For MANETs, new,
they lack infrastructure. As an alternative, these networks rely improved routing protocols were created for this reason.
on one another for communication and routing. In MANETs, The two primary types of MANETs routing protocols are
each node locates another node within its communication range proactive (table driven) and reactive (on demand) [4] [5].
and uses it as a hop to pass the message through another node, When using a table-driven protocol, routing data is routinely
and so on. Routers, servers, firewalls, and other specialized
updated anytime a change occurs. In contrast, the on-demand
equipment are present in traditional networks. While in ad hoc
networks, each node serves several purposes. As an example,
routing protocol only collects routing data when it is required
nodes handle the routing task. They are therefore more [6]. Ad hoc On Demand Distance Vector (AODV) is one of
susceptible to attacks than traditional networks. The primary the well-known on-demand routing protocols. Compared to
objective of this research is to provide a method for blackhole other on-demand routing protocols, it performs better [7][8].
attack detection utilizing anomaly detection based on Support However, MANETs are vulnerable to several attacks because
Vector Machine (SVM). This detection system seeks to examine of their limitations. The blackhole attack is one of these. The
network traffic and spot anomalies by observing node activity. Blackhole is a significant attack that has a major impact on
Attacking nodes in blackhole situations exhibit specific network performance. The attacker's node acts as the shortest
behavioral traits that set them apart from other nodes. Our path to the target in this attack. The packets it receives are
SVM-based detection system is capable of efficiently detecting then dropped. As a result, it significantly influences the
these properties. A traffic under blackhole attack is generated network delivery ratio.
using the OMNET++ simulator to test the efficacy of this
method. The malicious node is then identified based on the The key contribution of this paper is as below:
classification of the traffic into malicious and non-malicious.
• Analyzing and classifying the various methods and
The proposed solution's results shown high accuracy in
contrasting the various mitigation strategies for blackhole
identifying blackhole attacks.
Keyword: Adhoc Networks, MANET, Routing Protocols, attacks in MANETs.
Blackhole Attacks. • Creating a dataset for analyzing blackhole attacks
with OMNET++ in order to carefully examine the traffic and
I. INTRODUCTION research nodes behavior under attack.
T Mobile Ad hoc Networks (MANETs) can be created • Developing a detection system to identify malicious
without the aid of administrators or traditional base nodes.
infrastructure; instead, they are pre-configured to operate on
their own. In general, there are two primary types of wireless The rest of this paper is structured as follows:
networks: infrastructure-based and infrastructure-less [1]. In Background information on mobile ad hoc networks,
infrastructure networks, wireless devices are configured by including their uses, traits, and difficulties, is provided in
administrators so they may connect to fixed base equipment Section 2. The related study and initiatives made by other
to be provided with certain services such as routing, storage, researchers on this subject are reviewed in Section 3. The
and security. Nodes in infrastructure-less networks, like technique of our suggested solution is described in section 4.
MANETs, are self-configured and rely on one another rather The paper is concluded in Section 5, which also offers ideas
than fixed base infrastructure. In other words, each node for additional research.
carries out a variety of tasks [2].
II. BACKGROUND
Due to these restrictions, MANETs have several
particular challenges that make them different from Mobile ad hoc networks are distinguished from
traditional infrastructure networks. Two vital factors taken traditional networks in a variety of ways, particularly in
into consideration when building MANETs are the terms of security. This section covers the uses of MANETs,
challenges with security and routing [3]. Regarding security issues, and typical attacks.
challenges with security, MANETs generally lack the 1. MANETs Characteristics
infrastructure that enables conduct perimeter security
functions using devices such as firewalls, routers, IDS, IPS,