• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2021, Volume: 14, Issue: 20, Pages: 1622-1634

Original Article

MOpt Shield: An Intrusion Detection System based on Meld Optimization Algorithm to mitigate Amalgam Attacks

Received Date:08 April 2021, Accepted Date:07 May 2021, Published Date:04 June 2021


Background/Objectives: To mitigate network from amalgam attacks, this study is focussed on designing an efficient approach that can prevent the networks from intruders and secure the communication. Methods: A crossbreed approach, named ‘MOpt Shield,’ is proposed in this study. This proposed protocol utilizes the efficacy of the existing Cuckoo Search and Firefly Optimization Algorithm on basic AODV protocol along with the promising factors of the Intrusion Detection System. The proposed protocol is simulated using an NS-2 simulator with two different simulation scenarios, and PDR, Throughput, PLR, and Delay parameters are considered performance measures for the same. Findings: The proposed protocol finds the best selected nodes for communication and prepare separate list for the doubted nodes which further analyzed for attacker or non-attacker nodes. This will help to identify the best path with high energy and other capabilities for the efficient transmission of data. The performance of this proposed protocol is analyzed under 5 attacker nodes in which 2 are blackhole and 3 are DoS attacker nodes. For simulation, the scenario includes minimum 5 connections and maximum 25 connections between the 50 nodes with CBR traffic and 20m/s speed. The evaluated results show the astounding performance of the proposed protocol over the other existed protocols in terms of PDR, Throughput and Delay, and hence it reveals its capabilities. Novelty/Applications: The proposed protocol effectively handles the amalgam attacks and its novelty lie in its features of hybrid optimization and intrusion detection approach to find the route of transmission and the trusty nodes.


MOpt Shield, Crossbreed, Cuckoo Search, Firefly Algorithm, Amalgam Attacks, Blackhole, DDoS, NS­2 simulator


  1. Villanueva JA, Lacatan LL, Vinluan AA. Information Technology Security Infrastructure Malware Detector SystemInternational Journal of Advanced Trends in Computer Science and Engineering2020;9(2):15831587. Available from: http://www.warse.org/IJATCSE/static/pdf/file/ijatcse103922020.pdf
  2. Quy VK. Review on Security-aware Routing Protocols for Mobile Ad hoc NetworkInternational Journal of Advanced Trends in Computer Science and Engineering2020;9(3):36553661. Available from: 10.30534/ijatcse/2020/175932020
  3. Funde BS, Chourasia. A Hybrid Intrusion Detection System to Detect Hybrid attacks in MANETInternational Journal of Advanced Research in Computer and Communication Engineering2019;8(10):1220. Available from: 10.17148/IJARCCE.2019.81002
  4. Jasdeep K, Harmeet S. DDoS Attack Detection and Prevention in MANETsInternational Journal of Advanced Science and Technology2020;29(3):24022407. Available from: http://sersc.org/journals/index.php/IJAST/article/view/4341
  5. Gautam A, Mahajanb R, Zafarc S. Repercussions of DDoS Attack on MANET based Healthcare Sector Routing Protocols Performance and ANOVA AssessmentInternational Journal of Advanced Science and Technology2020;29(05):1215712177. Available from: http://sersc.org/journals/index.php/IJAST/article/view/25655
  6. Keerthika V, Malarvizhi N. Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt AODV in MANETWireless Personal Communications2019;106(2):621632. Available from: https://dx.doi.org/10.1007/s11277-019-06182-8
  7. Gowrishankar J, Kumar PS, Narmadha T, Natarajan Y. Yuvaraj Natarajan A Trust-Based Protocol for Manets In IotEnvironment. International Journal of Advanced Science and Technology2020;29(7):27702775.
  8. Pathan MS, He J, Zardari ZA, MQM. Muhammad Qasim Memon . An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETsFuture Internet2018;10(2):116. Available from: 10.3390/fi10020016
  9. Naveena A, Reddy KRL. Malicious node prevention and mitigation in MANETs using a hybrid security modelInformation Security Journal: A Global Perspective2018;27(2):92101. Available from: https://dx.doi.org/10.1080/19393555.2017.1415399
  10. Hossain S, Hussain MS, Ema RR, Dutta S, Sarkar S, Islam T. Detecting Blackhole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)2019;p. 17. Available from: 10.1109/icccnt45670.2019.8944395
  11. Yasin A, Zant MA. Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited TechniqueWireless Communications and Mobile Computing2018;2018:110. Available from: https://dx.doi.org/10.1155/2018/9812135
  12. Mukhedkar MM, Kolekar U. E-TDGO: An encrypted trust-based dolphin glowworm optimization for secure routing in mobile ad hoc networkInternational Journal of Communication Systems2020;33(7). Available from: https://dx.doi.org/10.1002/dac.4252
  13. Tripathy BK, Jena SK, Bera P, Das S. An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc NetworksWireless Personal Communications2020;114:13391370. Available from: https://dx.doi.org/10.1007/s11277-020-07423-x
  14. Sinwar D, Sharma N, Maakar SK, Kumar S. Analysis and comparison of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on shortest path in MANETJournal of Information and Optimization Sciences2020;41(2):621632. Available from: https://dx.doi.org/10.1080/02522667.2020.1733193
  15. Jayaraj R, Suresh T, Jayaraman KB. Hybridization of Metaheuristics Optimization Algorithm Based Packet Adjustment Rate Model for Congestion Control in MANETInternational Journal of Advanced Science and Technology2020;29(05):1266312672.
  16. Kondaiah R, Sathyanarayana B. Trust Factor and Fuzzy Firefly Integrated Particle Swarm Optimization Based Intrusion Detection and Prevention System for Secure Routing of MANETInternational Journal of Computer Networks & Communications2020;10(1):1333. Available from: 10.5121/ijcnc.2018.10102
  17. Devi GGY, Rao V. Security Improved Chicken Swarm Optimization Based A* Routing Algorithm on MANETsInternational Journal of Recent Technology and Engineering Regular Issue2020;8(5):35393545. Available from: 10.35940/ijrte.e6379.018520
  18. Manoranjini J, Chandrasekar A, Jothi S. Improved QoS and avoidance of black hole attacks in MANET using trust detection frameworkAutomatika2019;60(3):274284. Available from: https://dx.doi.org/10.1080/00051144.2019.1576965
  19. Mohan CR, Ananthula VR. Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimizationInternational Journal of Modeling, Simulation, and Scientific Computing2019;10(03):124. Available from: https://dx.doi.org/10.1142/s1793962319500144
  20. Vishal P, Babu AR. Firefly Algorithm for Intelligent Context-Aware Sensor Deployment Problem in Wireless Sensor NetworkJournal of Circuits, Systems and Computers2019;28(06):138. Available from: https://dx.doi.org/10.1142/s0218126619500944
  21. Talukdar MI, Hassan R, Hossen MS, Ahmad K, Qamar F, Ahmed AS. Performance improvements of Aodv by black hole attack detection Using ids and digital signatureWireless Communications and Mobile Computing2021;p. 113. Available from: 10.1155/2021/6693316
  22. Srivastava A, Gupta SK, Najim M, Sahu N, Aggarwal G, BDM. DSSAM: Digitally signed secure Acknowledgement method for mobile ad hoc networkEURASIP Journal on Wireless Communications and Networking2021;20(1):129. Available from: 10.1186/s13638-021-01894-7
  23. García J, Yepes V, Martí JV. A hybrid k-means cuckoo search algorithm applied to the counterfort retaining walls problemMathematics2020;8(4):555577. Available from: 10.3390/math8040555
  24. Joshi S, Mishra DK. Detection of Rushing Attack and Data Modification Attack in Mobile Ad Hoc NetworksJournal of Critical Reviews2020;7(19):94869498.
  25. Tahboush M, Agoyi M. A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET) IEEE Access2021;9:1187211883.


© 2021 Kaur et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)


Subscribe now for latest articles and news.