Vivian Ukamaka Ihekoronye, S. Ajakwe, Dong‐Seong Kim, Jae-Min Lee
{"title":"基于随机森林算法的无人机网络边缘智能入侵检测框架","authors":"Vivian Ukamaka Ihekoronye, S. Ajakwe, Dong‐Seong Kim, Jae-Min Lee","doi":"10.1109/ICTC55196.2022.9952400","DOIUrl":null,"url":null,"abstract":"The synchronization of swarms of drones (also known as unmanned aerial vehicles (UAV)) in a network can be attributed to their high mobility and maneuverability capabilities, making them deployable for time-critical operations such as security surveillance, disaster management, and search and rescue operations. However, the resource constraints of these flying robots are limitations to their functionalities. Likewise, the neglect of the security status of this network significantly promotes attacks by invaders, thus, thwarting the mission of this network. In this study, mobile edge computing (MEC) technology and anomaly-based intrusion detection scheme are leveraged to curb these challenges using an optimized Random Forest (RCSV) model embedded in dedicated UAV-MEC servers. The selection of prominent features and hyperparameters for modeling an optimized attack predictor is enabled by Pearson correlation coefficient (PCC) and randomized search cross-validation techniques. Also, the training and evaluation of the proposed model were achieved using intrusion detection data set (CICIDS2017 data set) comprised of complex network attack types. The simulation results obtained by the model in the detection and classification of the different attacks in the network (accuracy = 99.87%, precision = 99.32%, recall = 98.81 % and F1-score = 99.06%) shows its superiority over other optimized machine learning models and some existing models utilized in previous research.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cyber Edge Intelligent Intrusion Detection Framework For UAV Network Based on Random Forest Algorithm\",\"authors\":\"Vivian Ukamaka Ihekoronye, S. Ajakwe, Dong‐Seong Kim, Jae-Min Lee\",\"doi\":\"10.1109/ICTC55196.2022.9952400\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The synchronization of swarms of drones (also known as unmanned aerial vehicles (UAV)) in a network can be attributed to their high mobility and maneuverability capabilities, making them deployable for time-critical operations such as security surveillance, disaster management, and search and rescue operations. However, the resource constraints of these flying robots are limitations to their functionalities. Likewise, the neglect of the security status of this network significantly promotes attacks by invaders, thus, thwarting the mission of this network. In this study, mobile edge computing (MEC) technology and anomaly-based intrusion detection scheme are leveraged to curb these challenges using an optimized Random Forest (RCSV) model embedded in dedicated UAV-MEC servers. The selection of prominent features and hyperparameters for modeling an optimized attack predictor is enabled by Pearson correlation coefficient (PCC) and randomized search cross-validation techniques. Also, the training and evaluation of the proposed model were achieved using intrusion detection data set (CICIDS2017 data set) comprised of complex network attack types. The simulation results obtained by the model in the detection and classification of the different attacks in the network (accuracy = 99.87%, precision = 99.32%, recall = 98.81 % and F1-score = 99.06%) shows its superiority over other optimized machine learning models and some existing models utilized in previous research.\",\"PeriodicalId\":441404,\"journal\":{\"name\":\"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTC55196.2022.9952400\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC55196.2022.9952400","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber Edge Intelligent Intrusion Detection Framework For UAV Network Based on Random Forest Algorithm
The synchronization of swarms of drones (also known as unmanned aerial vehicles (UAV)) in a network can be attributed to their high mobility and maneuverability capabilities, making them deployable for time-critical operations such as security surveillance, disaster management, and search and rescue operations. However, the resource constraints of these flying robots are limitations to their functionalities. Likewise, the neglect of the security status of this network significantly promotes attacks by invaders, thus, thwarting the mission of this network. In this study, mobile edge computing (MEC) technology and anomaly-based intrusion detection scheme are leveraged to curb these challenges using an optimized Random Forest (RCSV) model embedded in dedicated UAV-MEC servers. The selection of prominent features and hyperparameters for modeling an optimized attack predictor is enabled by Pearson correlation coefficient (PCC) and randomized search cross-validation techniques. Also, the training and evaluation of the proposed model were achieved using intrusion detection data set (CICIDS2017 data set) comprised of complex network attack types. The simulation results obtained by the model in the detection and classification of the different attacks in the network (accuracy = 99.87%, precision = 99.32%, recall = 98.81 % and F1-score = 99.06%) shows its superiority over other optimized machine learning models and some existing models utilized in previous research.