Detecting Black Hole Attack using Support Vector Machine with XGBoosting in Mobile Ad-Hoc Networks
Main Article Content
Abstract
Mobile Ad-Hoc Networks (MANET) is a type of ad-hoc networks which use less infrastructure, that means the nodes in this network forward the massages without the need of infrastructure such as routers, switches etc. One of the most used attacks that can affect MANET performance is the black hole attack. This attack leads to dropping the packets that means these packets will never arrive and it will decrease the delivery ratio for the packets. This attack is a real problem as the sender is not informed that the data has not reached the intended receiver. The main goal of this study is to propose a solution for detecting black hole attacks using Extreme Gradient Boosting (XGBoost) based on a Support Vector Machine (SVM), the system for detection seeks to examine network traffic and spot anomalies by examining node activities. Attacking nodes in black hole situations exhibit specific behavioural traits that set them apart from other nodes, the traffic under a black hole attack is created using an NS-2 simulator to test the effectiveness of this strategy, and the malicious node is then identified based on the classification of the traffic into malicious and non-malicious. The results of the proposed technique outperformed the existing machine learning techniques such as Neural Network (NN), SVM, k-Nearest Neighbors (KNN), Decision Tree (DT), Logistic Regression (LR), Random Forest (RF), AdaBoost-SVM in terms of accuracy score as it achieved 98.67% as well as other classification performance measures (Precision, Recall, and F-measure).
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
All articles published in JIWE are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) License. Readers are allowed to
- Share — copy and redistribute the material in any medium or format under the following conditions:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use;
- NonCommercial — You may not use the material for commercial purposes;
- NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
References
F. Abdel-Fattah, K. A. Farhan, F. H. Al-Tarawneh, and F. AlTamimi, “Security challenges and attacks in Dynamic Mobile Ad Hoc Networks MANETs,” 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 28–33, Apr. 2019. doi: 10.1109/jeeit.2019.8717449.
P. Li, H. Wang, G. Tian, and Z. Fan, “A cooperative intrusion detection system for the internet of things using convolutional neural networks and black hole optimization,” Sensors, vol. 24, no. 15, pp. 4766, Jul. 2024. doi: 10.3390/s24154766.
M. Yazdanypoor, S. Cirillo, and G. Solimando, “Developing a hybrid detection approach to mitigating black hole and gray hole attacks in mobile ad hoc networks,” Applied Sciences, vol. 14, no. 17, pp. 7982, Sep. 2024. doi: 10.3390/app14177982.
W. Ali and S. Z. Ninoria, "An Efficient Algorithm for Black Hole Attacks Detection in VANET," in 2024 7th International Conference on Contemporary Computing and Informatics (IC3I), 2024, vol. 7, pp. 893-898: IEEE. doi: 10.1109/IC3I61595.2024.10828590
D. A. Rashid and M. B. Mohammed, “Black hole attack detection in wireless sensor networks using hybrid optimization algorithm,” UHD Journal of Science and Technology, vol. 8, no. 1, pp. 142–150, May 2024. doi: 10.21928/uhdjst.v8n1y2024.pp142-150.
A. Abdelhamid, M. S. Elsayed, A. D. Jurcut, and M. A. Azer, "A lightweight anomaly detection system for black hole attack," Electronics, vol. 12, no. 6, pp. 1294, 2023. doi: 10.3390/electronics12061294
M. Shukla, N. B. K. Joshi, and U. Singh, “A novel machine learning algorithm for MANET Attack: Black hole and gray hole,” Wireless Personal Communications, vol. 138, no. 1, pp. 41–66, Aug. 2024. doi: 10.1007/s11277-024-11360-4.
S. M. Hassan, M. M. Mohamad, and F. B. Muchtar, “Advanced Intrusion Detection in MANETs: A survey of machine learning and optimization techniques for mitigating Black/Gray Hole Attacks,” IEEE Access, pp. 1, Jan. 2024. doi: 10.1109/access.2024.3457682.
R. Vatambeti, S. V. Mantena, K. V. D. Kiran, S. Chennupalli, and M. V. Gopalachari, “Black hole attack detection using Dolphin Echo-location-based machine learning model in MANET environment,” Computers & Electrical Engineering, vol. 114, pp. 109094, Jan. 2024. doi: 10.1016/j.compeleceng.2024.109094.
S. Gurung, and S. Chauhan, “A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability,” Wireless Networks, vol. 26, no. 3, pp. 1981–2011, Feb. 2019. doi: 10.1007/s11276-019-01966-z.
A. A. Abdallah, M. S. Abdallah, H. Aslan, M.A. Abdallah, Y.-I. Cho, and M. S. Abdallah, “Enhancing mobile ad hoc network Security: An anomaly detection approach using Support Vector Machine for Black-Hole attack detection,” International Journal of Safety and Security Engineering, vol. 14, no. 4, pp. 1015–1028, Aug. 2024. doi: 10.18280/ijsse.140401.
N. Panda, and M. Supriya, “Blackhole attack prediction in wireless sensor networks using support vector machine,” in Lecture notes in electrical engineering, 2023, pp. 321–331. doi: 10.1007/978-981-19-8865-3_30.
T. Nagalakshmi, and R. S. Kumar, "Comparative Analysis of Random Forest and Decision Tree for Gray Hole Attack Detection in Wireless Ad Hoc Networks," in 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE), 2024, pp. 1-6: IEEE. doi: 10.1109/ICSPCRE62303.2024.10675140
S. Khan, M. A. Khan, and N. Alnazzawi, “Artificial Neural Network-Based Mechanism to detect security threats in wireless sensor networks,” Sensors, vol. 24, no. 5, pp. 1641, Mar. 2024. doi: 10.3390/s24051641.
M. Alqahtani, A. Gumaei, H. Mathkour, and M. M. B. Ismail, “A Genetic-Based extreme gradient boosting model for detecting intrusions in wireless sensor networks,” Sensors, vol. 19, no. 20, pp. 4383, Oct. 2019. doi: 10.3390/s19204383.
N. A. Hikal, M. Y. Shams, H. Salem, and M. M. Eid, “Detection of black-hole attacks in MANET using adaboost support vector machine,” Journal of Intelligent & Fuzzy Systems, vol. 41, no. 1, pp. 669–682, Jul. 2021. doi: 10.3233/jifs-202471.
M. Kumar, and R. Mishra, "An overview of MANET: History, challenges and applications," Indian Journal of Computer Science and Engineering (IJCSE), vol. 3, no. 1, pp. 121-125, 2012. ISSN : 0976-5166
A. R. S. A. Ragab, “A new classification for Ad-Hoc network,” International Journal of Interactive Mobile Technologies (iJIM), vol. 14, no. 14, pp. 214, Aug. 2020. doi: 10.3991/ijim.v14i14.14871.
H. Kalkha, H. Satori, and K. Satori, "Performance evaluation of AODV and LEACH routing protocol," Advances in Information Technology: Theory and Application, vol. 1, no. 1, pp. 112-118, 2016. ISSN 2489-1703
D. Wijonarko, S. Arifin, M. Faisal, M. N. Pratama, O. N. Priambodo, and E. S. Nugraha, “Mobile Ad-Hoc Network (MANET) Method: Some trends and open issues,” Recent in Engineering Science and Technology, vol. 3, no. 2, pp. 49–74, Apr. 2025. doi: 10.59511/riestech.v3i2.108.
M. Lee and T. Atkison, “VANET applications: Past, present, and future,” Vehicular Communications, vol. 28, p. 100310, Oct. 2020. doi: 10.1016/j.vehcom.2020.100310.
A. Mukherjee, V. Keshary, K. Pandya, N. Dey, and S. C. Satapathy, “Flying Ad hoc Networks: A Comprehensive Survey,” in Advances in intelligent systems and computing, 2018, pp. 569–580. doi: 10.1007/978-981-10-7563-6_59.
E. Wengle, J. Potter, and H. J. Dong, "Underwater Ad-Hoc Networks: A Review," Authorea Preprints, 2023. doi: 10.36227/techrxiv.17000266.v1
S. Lateef, M. Rizwan, and M. A. Hassan, “Security threats in Flying Ad hoc Network (FANET),” in Studies in computational intelligence, 2022, pp. 73–96. doi: 10.1007/978-3-030-97113-7_5.
M. M. Hamdi, L. Audah, S. A. Rashid, A. H. Mohammed, S. Alani, and A. S. Mustafa, "A review of applications, characteristics and challenges in vehicular ad hoc networks (VANETs)," in 2020 international congress on human-computer interaction, optimization and robotic applications (HORA), 2020, pp. 1-7: IEEE. doi: 10.1109/HORA49412.2020.9152928
N. Sivanesan, and K. S. Archana, "A machine learning approach to detect network layer attacks in mobile ad hoc networks," International Journal of Early Childhood Special Education, vol. 14, no. 3, 2022.
K. Tejaswini, and M.Y. Adilakshmi, "Black hole Attack Detection Using Machine Learning Algorithms in MANET-Performance Comparison,” International Journal of Research and Analytical Reviews, pp. 6047-6051, 2020. doi: 10.1109/ICESC48915.2020.9155770
J. Vinayagam, Ch. Balaswamy, and K. Soundararajan, “Certain Investigation on MANET Security with Routing and Blackhole Attacks Detection,” Procedia Computer Science, vol. 165, pp. 196–208, Jan. 2019. doi: 10.1016/j.procs.2020.01.091.
T. Terai, M. Yoshida, A. G. Ramonet, and T. Noguchi, "Blackhole attack cooperative prevention method in manets," in 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW), 2020, pp. 60-66: IEEE. doi: 10.1109/CANDARW51189.2020.00024
E. Elmahdi, S.-M. Yoo, and K. Sharshembiev, “Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks,” Journal of Information Security and Applications, vol. 51, pp. 102425, Jan. 2020. doi: 10.1016/j.jisa.2019.102425.
E. Lema, G. Esubalew, M. Desalegn, B. Tiwari, and V. Tiwari, "Trust Embedded AODV for securing and Analyzing Blackhole attack in MANET," in 2022 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), 2022, pp. 362-367: IEEE. doi: 10.1109/WIECON-ECE57977.2022.10150765
R. Gotti, A. Polagani, G. S. L. Posina, S. Veerapaneni, and T. Prasanth, "Detection and Analysis of Single Blackhole Node with TCP Connection in MANETs using Machine Learning Algorithms," in 2023 International Conference on Inventive Computation Technologies (ICICT), 2023, pp. 1704-1710: IEEE. doi: 10.1109/ICICT57646.2023.10134058
S. Shafi, S. Mounika, and S. Velliangiri, “Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET,” Procedia Computer Science, vol. 218, pp. 2309–2318, Jan. 2023. doi: 10.1016/j.procs.2023.01.206.
M. S. Sheela et al., "Adaptive Marine Predator Optimization Algorithm (AOMA)-Deep Supervised Learning Classification (DSLC) Based IDS Framework for MANET Security," Intelligent and Converged Networks, vol. 5, no. 1, pp. 1-18, 2024. doi: 10.23919/ICN.2024.0001
P. R. B, B. R. B, and D. B, “The AODV routing protocol with built-in security to counter blackhole attack in MANET,” Materials Today Proceedings, vol. 50, pp. 1152–1158, Aug. 2021. doi: 10.1016/j.matpr.2021.08.039.
A. Abadleh et al., "Mitigating the Effect of Blackhole Attacks in MANAT," Journal of Engineering Science & Technology Review , vol. 15, no. 6, 2022. doi: 10.25103/jestr.156.13