Optimized Detector Generation Procedure for Wireless Sensor Networks based Intrusion Detection System

Optimized Detector Generation Procedure for Wireless Sensor Networks based Intrusion Detection System

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-6
Year of Publication : 2022
Authors : Giribabu Sadineni, M. Archana, Rama Chaithanya Tanguturi
DOI : 10.14445/22315381/IJETT-V70I6P208

How to Cite?

Giribabu Sadineni, M. Archana, Rama Chaithanya Tanguturi, "Optimized Detector Generation Procedure for Wireless Sensor Networks based Intrusion Detection System," International Journal of Engineering Trends and Technology, vol. 70, no. 6, pp. 63-72, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I6P208

Abstract
Wireless Sensor Networks (WSNs) performance has been degraded by the intrusion and eliminating the capability to implement its functions. Through several aspects of WSNs, real-time protection is the main crucial component according to the increasing amount of cyber threats. Moreover, the latest devices have reduced security features and are vulnerable to cyber-attacks. It is very crucial to construct the system to detect real-time intrusion detection. In this paper, an optimized detector generation procedure (ODGP) is proposed and classified using the weighted SVM optimizer. The proposed technique is constructed to improve the accuracy of intrusion detection, improved detection rate, reduce false alarm rate, and also minimize the execution time than the existing techniques using the CICIDS2017 dataset. The performance evaluation results proved that the proposed ODGP technique enhances the performance that other related techniques.

Keywords
Wireless Sensor Networks (WSNs), Intrusion Detection System, Detector generation procedure, CICIDS2017 dataset, Weighted SVM.

Reference
[1] Abdollahzadeh S, Navimipour NJ, Deployment Strategies in the Wireless Sensor Network: A Comprehensive Review, Comput Commun. 91 (2016) 1–16.
[2] Abualigah LM, Khader AT, Unsupervised Text Feature Selection Technique Based on Hybrid Particle Swarm Optimization Algorithm with Genetic Operators for the Text Clustering, J Supercomput. 73(11) (2017) 4773–4795.
[3] Abualigah L, Diabat A, A Novel Hybrid Antlion Optimization Algorithm for Multi-Objective Task Scheduling Problems in Cloud Computing Environments, Cluster Comput. (2020). https ://doi.org/10.1007/s1058 6-020-03075 -5
[4] Yu Q, Jibin L, Jiang L, An Improved ARIMA-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks, Int J Distrib Sens Netw. 12(1) (2016) 9653230.
[5] Rashid B, Rehmani MH, Applications of Wireless Sensor Networks for Urban Areas: A Survey, J Netw Comput Appl. 60 (2016) 192–219.
[6] Pritchard SW, Hancke GP, Abu-Mahfouz AM, Security in Software-Defined Wireless Sensor Networks: Threats, Challenges and Potential Solutions, In: 2017 IEEE 15th International Conference on Industrial Informatics (INDIN), IEEE. (2017) 168–173.
[7] Maza S, Touahria M, Feature Selection for Intrusion Detection Using New Multi-Objective Estimation of Distribution Algorithms, Appl Intell. 49(12) (2019) 4237–4257.
[8] Khasawneh AM, Abualigah L, Al Shinwan M, Void Aware Routing Protocols in Underwater Wireless Sensor Networks: Variants and Challenges. J. Phys Conf Ser. 1550(3) (2020) 032145.
[9] Çavuşoğlu Ü, A New Hybrid Approach for Intrusion Detection Using Machine Learning Methods, Appl Intell. 49(7) (2019) 2735–2761.
[10] Benmessahel I, Xie K, Chellal M, A New Evolutionary Neural Networks Based on Intrusion Detection Systems Using Multiverse Optimization, Appl Intell. 48(8) (2018) 2315–2327.
[11] Aljawarneh S, Aldwairi M, Yassein MB, Anomaly-Based Intrusion Detection System through Feature Selection Analysis and Building Hybrid Efficient Model. J Comput Sci. 25 (2018) 152–160.
[12] Al-Tashi Q, Rais HM, Abdulkadir SJ, Mirjalili S, Alhussian H, A Review of Grey Wolf Optimizer-Based Feature Selection Methods for Classification, In: Evolutionary Machine Learning Techniques, Springer, Singapore. (2020) 273–286.
[13] Abualigah LM, Khader AT, Hanandeh E, Hybrid Clustering Analysis Using Improved Krill Herd Algorithm, Appl Intell. 48(11) (2018) 4047–4071.
[14] Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Ali I, Guizani M, A Survey of Machine and Deep Learning Methods for Internet of Things (Iot) Security, IEEE Commun Surv Tutor. 22 (2020) 1646.
[15] Gao M, Song Y, Xin Y, Intrusion Detection Based on Fusing Deep Neural Networks and Transfer Learning, in Digital TV and Wireless Multimedia Communication: 16th International Forum, IFTC 2019, Shanghai, China, Revised Selected Papers, Springer Nature, Berlin. 1181 (2020) 212.
[16] Rashid A, Siddique MJ, Ahmed SM, Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System, In: 3rd International Conference on Advancements in Computational Sciences ICACS: IEEE. (2020) 1–9.
[17] Gamal M, Abbas H, Sadek R, Hybrid Approach for Improving Intrusion Detection Based on Deep Learning and Machine Learning Techniques, Joint European-US Workshop on Applications of Invariance in Computer Vision. Springer. (2020) 225– 236.
[18] Araujo-Filho PFd, Kaddoum G, Campelo DR, Santos AG, Maceˆdo D, Zanchettin C, Intrusion Detection for Cyberphysical Systems Using Generative Adversarial Networks in Fog Environment, IEEE Int Things J. (2020) 1–1. Doi: https://doi.org/10.1109/JIOT.2020.3024800.
[19] Li X, Chen W, Zhang Q, Wu L, Building Auto-Encoder Intrusion Detection System Based on Random Forest Feature Selection, Comput Sec. (2020) 101851.
[20] Amir Basati, Mohammad Mehdi Faghih, APAE: An Iot Intrusion Detection System Using Asymmetric Parallel Auto-Encoder, Neural Computing and Applications. (2021). https://doi.org/10.1007/s00521-021-06011-9.
[21] Shone N, Ngoc TN, Phai VD, Shi Q, A Deep Learning Approach to Network Intrusion Detection, IEEE Trans Emerg Topics Comput Intell. 2(1) (2018) 41–50. https://doi.org/10.1109/TETCI.2017.2772792
[22] Yao H, Fu D, Zhang P, Li M, Liu Y, MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System, IEEE Int Things J. 6(2) (2019) 1949–1959. https://doi.org/10.1109/JIOT.2018.2873125.
[23] (2017). Intrusion Detection Evaluation Dataset (CIC-IDS2017). [Online] Available: https://www.unb.ca/cic/datasets/ids-2017.html.