{"title":"利用深度 LSTM 混合优化基于移动代理的自配置入侵检测","authors":"Prabhjot Kaur, Shalini Batra, Prashant Singh Rana","doi":"10.1016/j.knosys.2024.112316","DOIUrl":null,"url":null,"abstract":"<div><p>Sensor nodes can be deployed in harsh or hostile environments in many applications, making these nodes more prone to failure. The illegal movement monitoring within the sensor networks is a most challenging problem. The mobile malicious nodes are preferred by the attacker to maximize his impact. For a dynamic environment, a promising technology of sensor networks is expected to Intrusion detection. Multi-mobile agents utilize many approaches, after verification that collects data from sensor nodes. However, these approaches are inefficient to verify all the sensor nodes (SNs) of the network, due to its high delay, energy consumption, and mobility. The proposed Dunnock Ibis optimization LSTM model (DIO opt LSTM) solves this problem. Here, the sensor nodes are grouped into clusters; hence, mobile agent performs verification only the cluster heads instead of verifying all the SNs. The proposed DIO optimization combines the unique behavior of Egret Swam and Ibis optimization algorithm which efficiently tunes the LSTM classifier, resulting in the model providing better convergence. The simulation results show the proposed system shows a better result than the existing system by utilizing the database IDS 2018 Intrusion CSVs, the analysis is done based on performance metrics such as End-end-delay (ED), normalized energy (NE), and throughput. At 200 nodes and 1500 rounds, the DIO opt LSTM method has efficiently performed 146 numbers of alive nodes, 0.46 ms of delay, 0.15 J of normalized energy, and 0.89 bps of throughput.</p></div>","PeriodicalId":49939,"journal":{"name":"Knowledge-Based Systems","volume":null,"pages":null},"PeriodicalIF":7.2000,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Self configuring mobile agent-based intrusion detection using hybrid optimized with Deep LSTM\",\"authors\":\"Prabhjot Kaur, Shalini Batra, Prashant Singh Rana\",\"doi\":\"10.1016/j.knosys.2024.112316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Sensor nodes can be deployed in harsh or hostile environments in many applications, making these nodes more prone to failure. The illegal movement monitoring within the sensor networks is a most challenging problem. The mobile malicious nodes are preferred by the attacker to maximize his impact. For a dynamic environment, a promising technology of sensor networks is expected to Intrusion detection. Multi-mobile agents utilize many approaches, after verification that collects data from sensor nodes. However, these approaches are inefficient to verify all the sensor nodes (SNs) of the network, due to its high delay, energy consumption, and mobility. The proposed Dunnock Ibis optimization LSTM model (DIO opt LSTM) solves this problem. Here, the sensor nodes are grouped into clusters; hence, mobile agent performs verification only the cluster heads instead of verifying all the SNs. The proposed DIO optimization combines the unique behavior of Egret Swam and Ibis optimization algorithm which efficiently tunes the LSTM classifier, resulting in the model providing better convergence. The simulation results show the proposed system shows a better result than the existing system by utilizing the database IDS 2018 Intrusion CSVs, the analysis is done based on performance metrics such as End-end-delay (ED), normalized energy (NE), and throughput. At 200 nodes and 1500 rounds, the DIO opt LSTM method has efficiently performed 146 numbers of alive nodes, 0.46 ms of delay, 0.15 J of normalized energy, and 0.89 bps of throughput.</p></div>\",\"PeriodicalId\":49939,\"journal\":{\"name\":\"Knowledge-Based Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":7.2000,\"publicationDate\":\"2024-08-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Knowledge-Based Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S095070512400950X\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Knowledge-Based Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S095070512400950X","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Self configuring mobile agent-based intrusion detection using hybrid optimized with Deep LSTM
Sensor nodes can be deployed in harsh or hostile environments in many applications, making these nodes more prone to failure. The illegal movement monitoring within the sensor networks is a most challenging problem. The mobile malicious nodes are preferred by the attacker to maximize his impact. For a dynamic environment, a promising technology of sensor networks is expected to Intrusion detection. Multi-mobile agents utilize many approaches, after verification that collects data from sensor nodes. However, these approaches are inefficient to verify all the sensor nodes (SNs) of the network, due to its high delay, energy consumption, and mobility. The proposed Dunnock Ibis optimization LSTM model (DIO opt LSTM) solves this problem. Here, the sensor nodes are grouped into clusters; hence, mobile agent performs verification only the cluster heads instead of verifying all the SNs. The proposed DIO optimization combines the unique behavior of Egret Swam and Ibis optimization algorithm which efficiently tunes the LSTM classifier, resulting in the model providing better convergence. The simulation results show the proposed system shows a better result than the existing system by utilizing the database IDS 2018 Intrusion CSVs, the analysis is done based on performance metrics such as End-end-delay (ED), normalized energy (NE), and throughput. At 200 nodes and 1500 rounds, the DIO opt LSTM method has efficiently performed 146 numbers of alive nodes, 0.46 ms of delay, 0.15 J of normalized energy, and 0.89 bps of throughput.
期刊介绍:
Knowledge-Based Systems, an international and interdisciplinary journal in artificial intelligence, publishes original, innovative, and creative research results in the field. It focuses on knowledge-based and other artificial intelligence techniques-based systems. The journal aims to support human prediction and decision-making through data science and computation techniques, provide a balanced coverage of theory and practical study, and encourage the development and implementation of knowledge-based intelligence models, methods, systems, and software tools. Applications in business, government, education, engineering, and healthcare are emphasized.