利用深度 LSTM 混合优化基于移动代理的自配置入侵检测

IF 7.2 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Prabhjot Kaur, Shalini Batra, Prashant Singh Rana
{"title":"利用深度 LSTM 混合优化基于移动代理的自配置入侵检测","authors":"Prabhjot Kaur,&nbsp;Shalini Batra,&nbsp;Prashant Singh Rana","doi":"10.1016/j.knosys.2024.112316","DOIUrl":null,"url":null,"abstract":"<div><p>Sensor nodes can be deployed in harsh or hostile environments in many applications, making these nodes more prone to failure. The illegal movement monitoring within the sensor networks is a most challenging problem. The mobile malicious nodes are preferred by the attacker to maximize his impact. For a dynamic environment, a promising technology of sensor networks is expected to Intrusion detection. Multi-mobile agents utilize many approaches, after verification that collects data from sensor nodes. However, these approaches are inefficient to verify all the sensor nodes (SNs) of the network, due to its high delay, energy consumption, and mobility. The proposed Dunnock Ibis optimization LSTM model (DIO opt LSTM) solves this problem. Here, the sensor nodes are grouped into clusters; hence, mobile agent performs verification only the cluster heads instead of verifying all the SNs. The proposed DIO optimization combines the unique behavior of Egret Swam and Ibis optimization algorithm which efficiently tunes the LSTM classifier, resulting in the model providing better convergence. The simulation results show the proposed system shows a better result than the existing system by utilizing the database IDS 2018 Intrusion CSVs, the analysis is done based on performance metrics such as End-end-delay (ED), normalized energy (NE), and throughput. At 200 nodes and 1500 rounds, the DIO opt LSTM method has efficiently performed 146 numbers of alive nodes, 0.46 ms of delay, 0.15 J of normalized energy, and 0.89 bps of throughput.</p></div>","PeriodicalId":49939,"journal":{"name":"Knowledge-Based Systems","volume":null,"pages":null},"PeriodicalIF":7.2000,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Self configuring mobile agent-based intrusion detection using hybrid optimized with Deep LSTM\",\"authors\":\"Prabhjot Kaur,&nbsp;Shalini Batra,&nbsp;Prashant Singh Rana\",\"doi\":\"10.1016/j.knosys.2024.112316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Sensor nodes can be deployed in harsh or hostile environments in many applications, making these nodes more prone to failure. The illegal movement monitoring within the sensor networks is a most challenging problem. The mobile malicious nodes are preferred by the attacker to maximize his impact. For a dynamic environment, a promising technology of sensor networks is expected to Intrusion detection. Multi-mobile agents utilize many approaches, after verification that collects data from sensor nodes. However, these approaches are inefficient to verify all the sensor nodes (SNs) of the network, due to its high delay, energy consumption, and mobility. The proposed Dunnock Ibis optimization LSTM model (DIO opt LSTM) solves this problem. Here, the sensor nodes are grouped into clusters; hence, mobile agent performs verification only the cluster heads instead of verifying all the SNs. The proposed DIO optimization combines the unique behavior of Egret Swam and Ibis optimization algorithm which efficiently tunes the LSTM classifier, resulting in the model providing better convergence. The simulation results show the proposed system shows a better result than the existing system by utilizing the database IDS 2018 Intrusion CSVs, the analysis is done based on performance metrics such as End-end-delay (ED), normalized energy (NE), and throughput. At 200 nodes and 1500 rounds, the DIO opt LSTM method has efficiently performed 146 numbers of alive nodes, 0.46 ms of delay, 0.15 J of normalized energy, and 0.89 bps of throughput.</p></div>\",\"PeriodicalId\":49939,\"journal\":{\"name\":\"Knowledge-Based Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":7.2000,\"publicationDate\":\"2024-08-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Knowledge-Based Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S095070512400950X\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Knowledge-Based Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S095070512400950X","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

摘要

在许多应用中,传感器节点都可能部署在恶劣或敌对的环境中,因此这些节点更容易出现故障。传感器网络内的非法移动监控是一个最具挑战性的问题。移动恶意节点是攻击者的首选,以最大限度地扩大其影响。对于动态环境,传感器网络的一项有前途的技术就是入侵检测。多移动代理在从传感器节点收集数据进行验证后,利用了许多方法。然而,由于高延迟、高能耗和高移动性,这些方法在验证网络的所有传感器节点(SN)时效率低下。所提出的 Dunnock Ibis 优化 LSTM 模型(DIO opt LSTM)解决了这一问题。在这里,传感器节点被分组成簇;因此,移动代理只对簇头进行验证,而不是验证所有的传感器节点。提议的 DIO 优化结合了 Egret Swam 和 Ibis 优化算法的独特行为,可有效调整 LSTM 分类器,从而使模型具有更好的收敛性。仿真结果表明,通过利用数据库 IDS 2018 Intrusion CSV,拟议系统比现有系统显示出更好的效果,分析基于端延迟(ED)、归一化能量(NE)和吞吐量等性能指标。在 200 个节点和 1500 轮的情况下,DIO opt LSTM 方法有效执行了 146 个存活节点、0.46 毫秒的延迟、0.15 J 的归一化能量和 0.89 bps 的吞吐量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Self configuring mobile agent-based intrusion detection using hybrid optimized with Deep LSTM

Sensor nodes can be deployed in harsh or hostile environments in many applications, making these nodes more prone to failure. The illegal movement monitoring within the sensor networks is a most challenging problem. The mobile malicious nodes are preferred by the attacker to maximize his impact. For a dynamic environment, a promising technology of sensor networks is expected to Intrusion detection. Multi-mobile agents utilize many approaches, after verification that collects data from sensor nodes. However, these approaches are inefficient to verify all the sensor nodes (SNs) of the network, due to its high delay, energy consumption, and mobility. The proposed Dunnock Ibis optimization LSTM model (DIO opt LSTM) solves this problem. Here, the sensor nodes are grouped into clusters; hence, mobile agent performs verification only the cluster heads instead of verifying all the SNs. The proposed DIO optimization combines the unique behavior of Egret Swam and Ibis optimization algorithm which efficiently tunes the LSTM classifier, resulting in the model providing better convergence. The simulation results show the proposed system shows a better result than the existing system by utilizing the database IDS 2018 Intrusion CSVs, the analysis is done based on performance metrics such as End-end-delay (ED), normalized energy (NE), and throughput. At 200 nodes and 1500 rounds, the DIO opt LSTM method has efficiently performed 146 numbers of alive nodes, 0.46 ms of delay, 0.15 J of normalized energy, and 0.89 bps of throughput.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Knowledge-Based Systems
Knowledge-Based Systems 工程技术-计算机:人工智能
CiteScore
14.80
自引率
12.50%
发文量
1245
审稿时长
7.8 months
期刊介绍: Knowledge-Based Systems, an international and interdisciplinary journal in artificial intelligence, publishes original, innovative, and creative research results in the field. It focuses on knowledge-based and other artificial intelligence techniques-based systems. The journal aims to support human prediction and decision-making through data science and computation techniques, provide a balanced coverage of theory and practical study, and encourage the development and implementation of knowledge-based intelligence models, methods, systems, and software tools. Applications in business, government, education, engineering, and healthcare are emphasized.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信