Improved Network Security in MANET using Dingo Optimizer with Attention Convolutional Neural Network-based Intrusion Detection and Classification Model

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 7
Year of Publication : 2025
Authors : M.N.S. Gangadhar, T. Suresh, D. Sujatha
pdf
How to Cite?

M.N.S. Gangadhar, T. Suresh, D. Sujatha, "Improved Network Security in MANET using Dingo Optimizer with Attention Convolutional Neural Network-based Intrusion Detection and Classification Model," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 7, pp. 208-219, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I7P116

Abstract:

The fast popularization and growth of Mobile Ad-Hoc Networks (MANET) raise numerous security concerns. An Intrusion Detection System (IDS) is an effective defense tool to identify malicious data in intricate network landscapes and ensure computer system security. Conversely, conventional IDS, based on classical ML models, lacks accuracy and reliability. Rather than using classical Machine Learning (ML) as in preceding research, Deep Learning (DL) can perform better in extracting features from large datasets and massive cyber traffic in the current context. In general, MANET has inferior physical security for mobile devices due to effects like a deficiency of centralized management, node mobility, and restricted bandwidth. To challenge these safety concerns, classical cryptography systems do not protect MANETs from new attacks and vulnerabilities, so employing DL models in IDS efficiently alters the potent environments of MANETs. It permits the method to decide on intrusion while continuing to study their mobile landscape. This study proposes an Improved Network Security using the Dingo Optimizer Algorithm-based Intrusion Detection and Classification (INSDOA-IDC) model in MANET. The main aim of the INSDOA-IDC technique is the effective detection and classification of intrusions in MANET. Initially, the INSDOA-IDC technique applies the Z-score normalization method for pre-processing the input data. Attention with a convolutional Neural Network-Bidirectional Long Short-Term Memory (A-CNN-BiLSTM) method is used for intrusion recognition and classification. Finally, the Dingo Optimizer Algorithm (DOA) is implemented to ensure the optimum selection of the hyperparameters connected to the A-CNN-BiLSTM model. Extensive simulations of the INSDOA-IDC method are accomplished under the NSLKDD and UNSW-NB15 datasets. The comparison study of the INSDOA-IDC model portrayed superior accuracy values of 99.53% and 99.55% under dual datasets over existing models.

Keywords:

MANET, Intrusion Detection System, Dingo optimizer, Long Short-Term Memory, Convolutional Neural Network.

References:

[1] Saurabh Singh et al., “A Cryptographic Approach to Prevent Network Incursion for Enhancement of QoS in Sustainable Smart City Using MANET,” Sustainable Cities and Society, vol. 79, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Surjeet Dalal et al., “An Adaptive Traffic Routing Approach Toward Load Balancing and Congestion Control in Cloud–MANET Ad Hoc Networks,” Soft Computing, vol. 26, pp. 5377-5388, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Shivani Uyyala, and Dinesh Naik, “Anomaly Based Intrusion Detection of Packet Dropping Attacks in Mobile Ad-Hoc Networks,” 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, Kanyakumari, India, pp. 1137-1140, 2014.
[CrossRef] [Publisher Link]
[4] Po-Jen Chuang, and Si-Han Li, “Network Intrusion Detection Using Hybrid Machine Learning,” 2019 International Conference on Fuzzy Theory and Its Applications (iFUZZY), New Taipei, Taiwan, pp. 1-5, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Mahendra Prasad, Sachin Tripathi, and Keshav Dahal, “A Probability Estimation-Based Feature Reduction and Bayesian Rough Set Approach for Intrusion Detection in Mobile Ad-Hoc Network,” Applied Intelligence, vol. 53, pp. 7169-7185, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] C. Edwin Singh, and S. Maria Celestin Vigila, “Fuzzy Based Intrusion Detection System in MANET,” Measurement: Sensors, vol. 26, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Malek Al-Zewairi, Sufyan Almajali, and Arafat Awajan, “Experimental Evaluation of a Multi-Layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System,” 2017 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan, pp. 167-172, 2017.
[CrossRef] [Publisher Link]
[8] Nour Moustafa, Gideon Creech, and Jill Slay, “Anomaly Detection System Using Beta Mixture Models and Outlier Detection,” Progress in Computing, Analytics and Networking, pp. 125-135, 2018.
[CrossRef] [Publisher Link]
[9] Hossam Mahmoud Ahmad Fahmy, Wireless Sensor Networks Essentials, Wireless Sensor Networks, Springer, Cham, pp. 3-39, 2020.
[CrossRef] [Publisher Link]
[10] S. Shinly Swarna Sugi, and S. Raja Ratna, “Investigation of Machine Learning Techniques in Intrusion Detection System for IoT Network,” 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Thoothukudi, India, pp. 1164-1167, 2020.
[CrossRef] [Publisher Link]
[11] C. Edwin Singh, and S. Maria Celestin Vigila, “WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services,” Intelligent Automation & Soft Computing, vol. 35, no. 2, pp. 1737-1751, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] R. Reka et al., “Multi Head Self-Attention Gated Graph Convolutional Network Based Multi‑Attack Intrusion Detection in MANET,” Computers & Security, vol. 136, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] R. Sathiya, and N. Yuvaraj, “Swarm Optimized Differential Evolution and Probabilistic Extreme Learning Based Intrusion Detection in MANET,” Computers & Security, vol. 144, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Nandana Rajan et al., “Two-Pronged Intrusion Detection System for MANET,” 2024 International Conference on Emerging Technologies in Computer Science for Interdisciplinary Applications (ICETCS), Bengaluru, India, pp. 1-6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] M. Sahaya Sheela et al., “Adaptive Marine Predator Optimization Algorithm (AOMA)-Deep Supervised Learning Classification (DSLC) Based IDS Framework for MANET Security,” Intelligent and Converged Networks, vol. 5, no. 1, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] M. Sasikumar, and K. Rohini, “Expedient Intrusion Detection System in MANET Using Robust Dragonfly-Optimized Enhanced Naive Bayes (RDO-ENB),” International Journal of Computer Networks and Applications, vol. 11, no. 1, pp. 46-60, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[17] V.R. Sugumaran, and A. Rajaram, “Lightweight Blockchain-Assisted Intrusion Detection System in Energy Efficient MANETs,” Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 45, no. 3, pp. 4261-4276, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Karunakaran Saminathan et al., “Multicast On-Route Cluster Propagation to Detect Network Intrusion Detection Systems on MANET Using Deep Operator Neural Networks,” Expert Systems with Applications, vol. 271, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Tanvir H Sardar et al., “Enhancing Security in MANETs with Deep Learning-Based Intrusion Detection,” Procedia Computer Science, vol. 259, pp. 120-129, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[20] S. Faizal Mukthar Hussain, and S.M.H. Sithi Shameem Fathima, “Federated Learning-Assisted Coati Deep Learning-Based Model for Intrusion Detection in MANET,” International Journal of Computational Intelligence Systems, vol. 17, no. 1, pp. 1-15, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Ahmed Ayad Abdalhameed, and Ammar Ismael Kadhim, “Molecular Swarm Optimization Analysis of Data Transmission and Recurrent Neural Networks (RNNs) for Attack Prevention in Mobile Ad Hoc Networks (MANETs),” KSII Transactions on Internet and Information Systems (TIIS), vol. 19, no. 3, pp. 973-986, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Mahdi Salah Mahdi AL-Inizi et al., “Improvement Networks Intrusion Detection System Using Artificial Neural Networks (ANN),” Innovative Computing and Communications, pp. 571-587, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] ES Phalguna Krishna et al., “Enhancing Intrusion Detection in MANETs with Blockchain-Based Trust Management and Enhanced GRU Model,” Peer-to-Peer Networking and Applications, vol. 18, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Dinesh Kumar Reddy Basani, Sri Harsha Grandhi, and Qamar Abbas, “A Centralized Infrastructure-Aware Reliable Data Transaction Model in IoT-Enabled MANET and Cloud Using GWO and Attention Mechanism with LSTM,” International Journal of Advanced Research in Information Technology and Management Science, vol. 1, no. 1, pp. 110-134, 2024.
[Google Scholar] [Publisher Link]
[25] Chunhui Li et al., “DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm,” Computers, Materials and Continua, vol. 82, no. 1, pp. 645-674, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Nanyi Fei et al., “Z-Score Normalization, Hubness, and Few-Shot Learning,” 2021 IEEE/CVF International Conference on Computer Vision, Montreal, QC, Canada, pp. 142-151, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Xueqin Zhang, Zhongqiang Luo, and Wenshi Xiao, “CNN-BiLSTM-DNN-Based Modulation Recognition Algorithm at Low SNR,” Applied Sciences, vol. 14, no. 13, pp. 1-14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[28] K. Kishore Kumar, and G. Sreenivasulu, “An Efficient Routing Algorithm for Implementing Internet-of-Things-Based Wireless Sensor Networks Using Dingo Optimizer,” Engineering Proceedings, vol. 59, no. 1, pp. 1-8, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] M Hassan Zaib, NSL-KDD, Kaggle. [Online]. Available: https://www.kaggle.com/datasets/hassan06/nslkdd
[30] Wells David, UNSW_NB15, Kaggle. [Online]. Available: https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb15/data
[31] C. Edwin Singh, and S. Maria Celestin Vigila, “Fuzzy Based Intrusion Detection System in MANET,” Measurement: Sensors, vol. 26, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Ketan Kotecha et al., “Enhanced Network Intrusion Detection System,” Sensors, vol. 21, no. 23, pp. 1-15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]