{"title":"基于随机森林和多目标布谷鸟搜索分类的克隆攻击检测","authors":"P. Sherubha, P. Amudhavalli, S. Sasirekha","doi":"10.1109/ICCSP.2019.8698077","DOIUrl":null,"url":null,"abstract":"Intrusion Detection Systems (IDSs) have played a significant responsibility in recognizing and preventing security attacks in Wireless Sensor Networks (WSNs). Modelling of IDS should be done in WSN to guarantee dependability and security of WSN services. In this work, an approach is designed to detect various kinds of clone attack in WSN. In specific, an Adaptive random Forest based Multi-objective Cuckoo Search algorithm (RF-MOCS) is designed to identify the source of clone attack using KDD cup dataset. The proposed model provides significant performance in terms of accuracy, sensitivity, specificity, F-measure respectively. The proposed design shows better trade off when compared to existing techniques like ANN, Naive bayes, SVM.","PeriodicalId":194369,"journal":{"name":"2019 International Conference on Communication and Signal Processing (ICCSP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Clone Attack Detection using Random Forest and Multi Objective Cuckoo Search Classification\",\"authors\":\"P. Sherubha, P. Amudhavalli, S. Sasirekha\",\"doi\":\"10.1109/ICCSP.2019.8698077\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion Detection Systems (IDSs) have played a significant responsibility in recognizing and preventing security attacks in Wireless Sensor Networks (WSNs). Modelling of IDS should be done in WSN to guarantee dependability and security of WSN services. In this work, an approach is designed to detect various kinds of clone attack in WSN. In specific, an Adaptive random Forest based Multi-objective Cuckoo Search algorithm (RF-MOCS) is designed to identify the source of clone attack using KDD cup dataset. The proposed model provides significant performance in terms of accuracy, sensitivity, specificity, F-measure respectively. The proposed design shows better trade off when compared to existing techniques like ANN, Naive bayes, SVM.\",\"PeriodicalId\":194369,\"journal\":{\"name\":\"2019 International Conference on Communication and Signal Processing (ICCSP)\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Communication and Signal Processing (ICCSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSP.2019.8698077\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Communication and Signal Processing (ICCSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSP.2019.8698077","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Clone Attack Detection using Random Forest and Multi Objective Cuckoo Search Classification
Intrusion Detection Systems (IDSs) have played a significant responsibility in recognizing and preventing security attacks in Wireless Sensor Networks (WSNs). Modelling of IDS should be done in WSN to guarantee dependability and security of WSN services. In this work, an approach is designed to detect various kinds of clone attack in WSN. In specific, an Adaptive random Forest based Multi-objective Cuckoo Search algorithm (RF-MOCS) is designed to identify the source of clone attack using KDD cup dataset. The proposed model provides significant performance in terms of accuracy, sensitivity, specificity, F-measure respectively. The proposed design shows better trade off when compared to existing techniques like ANN, Naive bayes, SVM.