{"title":"设计无线传感器网络入侵检测系统的新型优化深度学习方法","authors":"K. Sedhuramalingam , N. Saravanakumar","doi":"10.1016/j.eij.2024.100522","DOIUrl":null,"url":null,"abstract":"<div><p>A wireless sensor network contains many nodes to collect and transfer data to a primary location. However, wireless sensor networks have several security issues because of their resource-constrained nodes, deployment tactics, and communication channels. As a result, detecting intrusions is crucial for strengthening the safety of wireless sensor networks. Naturally, any communication network will need the services provided by a network intrusion detection system. Despite their everyday use in intrusion detection systems, the efficacy of machine learning (ML) approaches needs to be improved for handling asymmetrical attacks. This article proposes an intrusion detection system based on an Improved deep neural network (IDNN) to solve this issue and enhance performance. Using the global search strategy of the coyote optimization algorithm (COA-GS) on the KDDCup 99 and WSN-DS datasets, the following hyperparameter selection techniques are used to determine network topologies and the optimal network parameters for DNNs. The most efficient algorithm for detecting future cyberattacks can be chosen by conducting such research. Extensive studies comparing COA-GS-IDNNs and other standard machine learning classifications on a large number of openly accessible malware benchmark datasets are presented. Extensive experimental testing demonstrates that DNNs outperform conventional machine learning classifiers at real-time monitoring network activity and host-level events to detect and prevent intrusions.The experimental outcomes demonstrate that the suggested COA-GS-IDNN model increases the accuracy ratio of 95 %, the precision ratio of 94 %, recall ratio of 96 %, F1-score ratio of 95 %, ROC AUC ratio 98 %, detection time of 1.0068754, and delay of 0.8016 ms compared to other existing models.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0000,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524000859/pdfft?md5=786d303351ef6e91c9885885ffda1542&pid=1-s2.0-S1110866524000859-main.pdf","citationCount":"0","resultStr":"{\"title\":\"A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks\",\"authors\":\"K. Sedhuramalingam , N. Saravanakumar\",\"doi\":\"10.1016/j.eij.2024.100522\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>A wireless sensor network contains many nodes to collect and transfer data to a primary location. However, wireless sensor networks have several security issues because of their resource-constrained nodes, deployment tactics, and communication channels. As a result, detecting intrusions is crucial for strengthening the safety of wireless sensor networks. Naturally, any communication network will need the services provided by a network intrusion detection system. Despite their everyday use in intrusion detection systems, the efficacy of machine learning (ML) approaches needs to be improved for handling asymmetrical attacks. This article proposes an intrusion detection system based on an Improved deep neural network (IDNN) to solve this issue and enhance performance. Using the global search strategy of the coyote optimization algorithm (COA-GS) on the KDDCup 99 and WSN-DS datasets, the following hyperparameter selection techniques are used to determine network topologies and the optimal network parameters for DNNs. The most efficient algorithm for detecting future cyberattacks can be chosen by conducting such research. Extensive studies comparing COA-GS-IDNNs and other standard machine learning classifications on a large number of openly accessible malware benchmark datasets are presented. Extensive experimental testing demonstrates that DNNs outperform conventional machine learning classifiers at real-time monitoring network activity and host-level events to detect and prevent intrusions.The experimental outcomes demonstrate that the suggested COA-GS-IDNN model increases the accuracy ratio of 95 %, the precision ratio of 94 %, recall ratio of 96 %, F1-score ratio of 95 %, ROC AUC ratio 98 %, detection time of 1.0068754, and delay of 0.8016 ms compared to other existing models.</p></div>\",\"PeriodicalId\":56010,\"journal\":{\"name\":\"Egyptian Informatics Journal\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":5.0000,\"publicationDate\":\"2024-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S1110866524000859/pdfft?md5=786d303351ef6e91c9885885ffda1542&pid=1-s2.0-S1110866524000859-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Egyptian Informatics Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1110866524000859\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866524000859","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks
A wireless sensor network contains many nodes to collect and transfer data to a primary location. However, wireless sensor networks have several security issues because of their resource-constrained nodes, deployment tactics, and communication channels. As a result, detecting intrusions is crucial for strengthening the safety of wireless sensor networks. Naturally, any communication network will need the services provided by a network intrusion detection system. Despite their everyday use in intrusion detection systems, the efficacy of machine learning (ML) approaches needs to be improved for handling asymmetrical attacks. This article proposes an intrusion detection system based on an Improved deep neural network (IDNN) to solve this issue and enhance performance. Using the global search strategy of the coyote optimization algorithm (COA-GS) on the KDDCup 99 and WSN-DS datasets, the following hyperparameter selection techniques are used to determine network topologies and the optimal network parameters for DNNs. The most efficient algorithm for detecting future cyberattacks can be chosen by conducting such research. Extensive studies comparing COA-GS-IDNNs and other standard machine learning classifications on a large number of openly accessible malware benchmark datasets are presented. Extensive experimental testing demonstrates that DNNs outperform conventional machine learning classifiers at real-time monitoring network activity and host-level events to detect and prevent intrusions.The experimental outcomes demonstrate that the suggested COA-GS-IDNN model increases the accuracy ratio of 95 %, the precision ratio of 94 %, recall ratio of 96 %, F1-score ratio of 95 %, ROC AUC ratio 98 %, detection time of 1.0068754, and delay of 0.8016 ms compared to other existing models.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.