Unified Intrusion Detection Framework: Predictive Analysis of Intrusions in Sensor Networks

IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS
Arun Kumar Ramamoorthy, K. Karuppasamy
{"title":"Unified Intrusion Detection Framework: Predictive Analysis of Intrusions in Sensor Networks","authors":"Arun Kumar Ramamoorthy, K. Karuppasamy","doi":"10.1007/s11277-024-11396-6","DOIUrl":null,"url":null,"abstract":"<p>Intrusion Detection Model (IDM) is an essential device for network defence in current trend. Malicious users analyse the vulnerabilities of IDSs to capture unauthorized access. Furthermore, intrusion detection encompasses numerous numerical attributes and models, resulting in elevated detection errors and triggering false alarms. Hence, optimal computational intelligence shall be incorporated in IDM to achieve high detection rate and less number of false alarms. Considering the same, a new hybrid IDM framework is developed as the combination of Fuzzy Genetic Algorithm with Multi-Objective Particle Swarm Optimization that maximizes the detection accuracy, minimizes the false alarms and takes less computational complexity which will be explained first phase. The existing IDSs are constraint to the information trained incur into false positives based on user continuity for normal activity. The objective of this proposal is to extract optimal classification rules automatically from training data that helps to identify types of attacks correctly including the unknown attack types. For achieving this goal, Multi-Objective Particle Swarm Optimization (MOPSO) is used as classifier to enhance the identification of the rare attack classes within the IDM. The effectiveness of this method lies in its capacity to leverage information within an unfamiliar search space, guiding subsequent searches towards valuable subspaces. It provides better separability of various classes’ i.e. normal behaviour and false alarms. In this FGA-MOPSO model, Principal Component Analysis (PCA) serves as the feature selection technique employed to identify pertinent features within the dataset, thereby enhancing the classifier’s performance and Fuzzy Genetic Algorithm (FGA) is used to create new population for training the classifier with the help of three operations namely selection, crossover and mutation that helps to practice more patterns in training phase and to obtain better understanding of the proposed classifier. The simulation will illustrate that the system is competent to speed-up the training and testing process of intrusions detection is important for network applications.Please confirm if the author names are presented accurately and in the correct sequence (given name, middle name/initial, family name). Author 1 Given name: [Arun Kumar] Last name [Ramamoorthy]. Also, kindly confirm the details in the metadata are correct.Checked and Verified for Author 1. In Author 2 name, Given Name was [K.] and last name was[Karuppasamy], But its is just the opposite. Given Name is [Karuppasamy] and Last Name is [K.]. I have edited it.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"60 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11396-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Intrusion Detection Model (IDM) is an essential device for network defence in current trend. Malicious users analyse the vulnerabilities of IDSs to capture unauthorized access. Furthermore, intrusion detection encompasses numerous numerical attributes and models, resulting in elevated detection errors and triggering false alarms. Hence, optimal computational intelligence shall be incorporated in IDM to achieve high detection rate and less number of false alarms. Considering the same, a new hybrid IDM framework is developed as the combination of Fuzzy Genetic Algorithm with Multi-Objective Particle Swarm Optimization that maximizes the detection accuracy, minimizes the false alarms and takes less computational complexity which will be explained first phase. The existing IDSs are constraint to the information trained incur into false positives based on user continuity for normal activity. The objective of this proposal is to extract optimal classification rules automatically from training data that helps to identify types of attacks correctly including the unknown attack types. For achieving this goal, Multi-Objective Particle Swarm Optimization (MOPSO) is used as classifier to enhance the identification of the rare attack classes within the IDM. The effectiveness of this method lies in its capacity to leverage information within an unfamiliar search space, guiding subsequent searches towards valuable subspaces. It provides better separability of various classes’ i.e. normal behaviour and false alarms. In this FGA-MOPSO model, Principal Component Analysis (PCA) serves as the feature selection technique employed to identify pertinent features within the dataset, thereby enhancing the classifier’s performance and Fuzzy Genetic Algorithm (FGA) is used to create new population for training the classifier with the help of three operations namely selection, crossover and mutation that helps to practice more patterns in training phase and to obtain better understanding of the proposed classifier. The simulation will illustrate that the system is competent to speed-up the training and testing process of intrusions detection is important for network applications.Please confirm if the author names are presented accurately and in the correct sequence (given name, middle name/initial, family name). Author 1 Given name: [Arun Kumar] Last name [Ramamoorthy]. Also, kindly confirm the details in the metadata are correct.Checked and Verified for Author 1. In Author 2 name, Given Name was [K.] and last name was[Karuppasamy], But its is just the opposite. Given Name is [Karuppasamy] and Last Name is [K.]. I have edited it.

Abstract Image

统一入侵检测框架:传感器网络入侵预测分析
入侵检测模型(IDM)是当前网络防御的重要设备。恶意用户通过分析 IDS 的漏洞来捕获未经授权的访问。此外,入侵检测包含大量数字属性和模型,导致检测误差增大并引发误报。因此,应在 IDM 中加入最佳计算智能,以实现较高的检测率和较少的误报。考虑到这一点,我们开发了一种新的混合 IDM 框架,将模糊遗传算法与多目标粒子群优化相结合,最大限度地提高了检测精度,减少了误报,并降低了计算复杂度。现有的 IDS 受限于经过培训的信息,会根据用户正常活动的连续性产生误报。本建议的目的是从训练数据中自动提取最佳分类规则,帮助正确识别攻击类型,包括未知攻击类型。为实现这一目标,多目标粒子群优化(MOPSO)被用作分类器,以增强对 IDM 中罕见攻击类别的识别。这种方法的有效性在于它能够利用陌生搜索空间内的信息,将后续搜索引向有价值的子空间。它能更好地分离各种类别,即正常行为和误报。在这个 FGA-MOPSO 模型中,主成分分析(PCA)作为特征选择技术,用于识别数据集中的相关特征,从而提高分类器的性能;模糊遗传算法(FGA)用于创建新的种群,在选择、交叉和突变三种操作的帮助下训练分类器,这有助于在训练阶段练习更多的模式,并更好地理解所建议的分类器。仿真将说明,该系统能够加快入侵检测的训练和测试过程,这对网络应用非常重要。请确认作者姓名是否准确,顺序是否正确(名字、中间名/姓氏、姓氏)。作者 1 姓:[Arun Kumar] 名:[Ramamoorthy]。另外,请确认元数据中的详细信息是否正确。在作者 2 的姓名中,名字是 [K.],姓氏是 [Karuppasamy],但情况恰恰相反。名字是 [Karuppasamy],姓氏是 [K.]。我已对其进行了编辑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Wireless Personal Communications
Wireless Personal Communications 工程技术-电信学
CiteScore
5.80
自引率
9.10%
发文量
663
审稿时长
6.8 months
期刊介绍: The Journal on Mobile Communication and Computing ... Publishes tutorial, survey, and original research papers addressing mobile communications and computing; Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia; Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.; 98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again. Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures. In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment. The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信