An Efficient Optimized Neural Network System for Intrusion Detection in Wireless Sensor Networks

PDF (708KB), PP.83-94

Views: 0 Downloads: 0

Author(s)

Shridhar Sanshi 1 Ramesh Vatambeti 2,* Revathi V. 3 Syed Ziaur Rahman 4

1. Department of CSE, National Institute of Technology, Karnataka, India

2. School of Computer Science and Engineering, VIT-AP University, Vijayawada, Andhra Pradesh, India

3. Department of Applied Sciences, New Horizon College of Engineering, Ring Road, Bellandur Post, Bengaluru, India

4. Faculty of Information Technology, Majan University College (Affiliated to University of Bedfordshire, United Kingdom), Muscat, Oman

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2024.06.07

Received: 16 Jun. 2023 / Revised: 19 Oct. 2023 / Accepted: 27 Dec. 2023 / Published: 8 Dec. 2024

Index Terms

Intrusion Detection, African Vulture Optimization, Modular Neural System, Wireless Sensor Network, Detection Rate, Attack Classification

Abstract

In the realm of wireless network security, the role of intrusion detection cannot be overstated in identifying and thwarting malicious activities within communication channels. Despite the existence of various intrusion detection system (IDS) approaches, challenges persist in terms of accurate classification and specification. Consequently, this article introduces a novel and innovative approach, the African Vulture-based Modular Neural System (AVbMNS), to address these issues. This research aims to detect and categorize malicious events in wireless networks effectively. The methodology begins with preprocessing the dataset and extracting relevant features. These extracted features are then subjected to a novel training technique to enhance the detection and classification of network attacks. The integration of African Vulture optimization significantly enhances the detection rate, leading to more precise attack identification. The research's effectiveness is demonstrated through validation using the NSL-KDD dataset, with impressive results. The performance analysis reveals that the developed model achieves a remarkable 99.87% detection rate and 99.92% accuracy when applied to the NSL-KDD dataset. Furthermore, the outcomes of this novel model are compared with existing approaches to gauge the extent of improvement. The comparative assessment affirms that the developed model outperforms its counterparts, underscoring its effectiveness in addressing the challenges of intrusion detection in wireless networks.

Cite This Paper

Shridhar Sanshi, Ramesh Vatambeti, Revathi V., Syed Ziaur Rahman, "An Efficient Optimized Neural Network System for Intrusion Detection in Wireless Sensor Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.6, pp.83-94, 2024. DOI:10.5815/ijcnis.2024.06.07

Reference

[1]Yang, Zaoli, et al. "Measuring topic network centrality for identifying technology and technological development in online communities." Technological Forecasting and Social Change 167 (2021): 120673.
[2]Shaukat, Kamran, et al. "A review on security challenges in internet of things (IoT)." 2021 26th International Conference on Automation and Computing (ICAC). IEEE, 2021.
[3]Rajasoundaran, S., et al. "Secure opportunistic watchdog production in wireless sensor networks: a review." Wireless Personal Communications 120.2 (2021): 1895-1919.
[4]Velasco, Francisco Alcaraz, Jose Manuel Palomares, and Joaquin Olivares. "Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs." Computer Networks 199 (2021): 108470.
[5]Keserwani, Pankaj Kumar, et al. "A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model." Journal of Reliable Intelligent Environments 7.1 (2021): 3-21.
[6]Macherla, H., Kotapati, G., Sunitha, M.T., Chittipireddy, K.R., Attuluri, B., Vatambeti, R., “Deep learning framework-based chaotic hunger games search optimization algorithm for prediction of air quality index”, Ingénierie des Systèmes d’Information, Vol. 28, No. 2, pp. 433-441, 2023.
[7]Jahromi, Amir Namavar, et al. "Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber–Physical Systems." IEEE Internet of Things Journal 8.17 (2021): 13712-13722.
[8]Ravindra, C., Kounte, M.R., Lakshmaiah, G.S. et al., “ETELMAD: Anomaly Detection Using Enhanced Transient Extreme Machine Learning System in Wireless Sensor Networks”, Wireless Pers Commun 130, 21–41 (2023). https://doi.org/10.1007/s11277-023-10271-0
[9]Imrana, Yakubu, et al., "A bidirectional LSTM deep learning approach for intrusion detection", Expert Systems with Applications 185 (2021): 115524.
[10]Melo, Roberto Vasconcelos, et al., "ISM-AC: An immune security model based on alert correlation and software-defined networking", International Journal of Information Security 21.2 (2022): 191-205.
[11]Afzal, Sabeeha, and Anjna Jayant Deen., "Anomaly-Based Intrusion Detection System Through Deep Neural Network", Proceedings of Third International Conference on Communication, Computing and Electronics Systems. Springer, Singapore, 2022.
[12]Sharon, Andrea, et al., "An Intelligent Intrusion Detection System Using Hybrid Deep Learning Approaches in Cloud Environment", International Conference on Computer, Communication, and Signal Processing. Springer, Cham, 2022.
[13]Om Kumar, C.U., Marappan, S., Murugeshan, B. et al., “Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network”, Wireless Pers Commun., 129, 783–812 (2023). https://doi.org/10.1007/s11277-022-10155-9
[14]Afuwape, Afeez Ajani, et al., "Performance evaluation of secured network traffic classification using a machine learning approach", Computer Standards & Interfaces 78 (2021): 103545.
[15]Nafis, Nur Syafiqah Mohd, and Suryanti Awang.. "An enhanced hybrid feature selection technique using term frequency-inverse document frequency and support vector machine-recursive feature elimination for sentiment classification", IEEE Access 9 (2021): 52177-52192.
[16]Halim, Zahid, et al.,"An effective genetic algorithm-based feature selection method for intrusion detection systems", Computers & Security 110 (2021): 102448.
[17]Ghanei, Hadis, Farnoush Manavi, and Ali Hamzeh., "A novel method for malware detection based on hardware events using deep neural networks", Journal of Computer Virology and Hacking Techniques 17.4 (2021): 319-331.
[18]Yin Chuanlong, Zhu Yuefei, JinlongFei G., He Xinzheng “A deep learning approach for intrusion detection using recurrent neural networks”, IEEE Access, 5 (2017), pp. 21954-21961
[19]Limouchi, Elnaz, and Imad Mahgoub., "Reinforcement Learning-assisted Threshold Optimization for Dynamic Honeypot Adaptation to Enhance IoBT Networks Security", 2021 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 2021.
[20]Priyadarsini, Pullagura Indira., "ABC-BSRF: Artificial Bee colony and borderline-SMOTE RF algorithm for intrusion detection system on data imbalanced problem", Proceedings of International Conference on Computational Intelligence and Data Engineering: ICCIDE 2020. Springer Singapore, 2021.
[21]Zhang, Ting, et al. "An Evolutionary-Based Approach for Low-Complexity Intrusion Detection in Wireless Sensor Networks", Wireless Personal Communications (2021): 1-24.
[22]Thilagam, T., and R. Aruna., "Intrusion detection for network-based cloud computing by custom RC-NN and optimization", ICT Express 7.4 (2021): 512-520.
[23]Wang, Ning, et al., "Manda: On adversarial example detection for network intrusion detection system", IEEE Transactions on Dependable and Secure Computing, 2022.
[24]Liu, Gao, et al., "SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation", Information Fusion 70 (2021): 100-114.
[25]Atefinia, Ramin, and Mahmood Ahmadi., "Network intrusion detection using multi-architectural modular deep neural network", The Journal of Supercomputing 77.4 (2021): 3571-3593.
[26]Abdollahzadeh, Benyamin, Farhad Soleimanian Gharehchopogh, and Seyedali Mirjalili, "African vultures optimization algorithm: A new nature-inspired metaheuristic algorithm for global optimization problems", Computers & Industrial Engineering 158 (2021): 107408.
[27]Varela-Santos, Sergio, and Patricia Melin, "A new modular neural network approach with fuzzy response integration for lung disease classification based on multiple objective feature optimization in chest X-ray images", Expert Systems with Applications 168 (2021): 114361.
[28]Safaldin, Mukaram, Mohammed Otair, and Laith Abualigah, "Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks", Journal of ambient intelligence and humanized computing, 12.2 (2021): 1559-1576.
[29]Sinha, Somnath, and Aditi Paul.,"Neuro-fuzzy based intrusion detection system for wireless sensor network", Wireless Personal Communications, 114.1 (2020): 835-851.
[30]Elsaid, Shaimaa Ahmed, and Nouf Saleh Albatati, "An optimized collaborative intrusion detection system for wireless sensor networks", Soft Computing 24.16 (2020): 12553-12567.