A Hybrid Rider Optimization with Deep Learning Driven Intrusion Detection Farmwork in Wireless Sensor Network
DOI:
https://doi.org/10.56294/sctconf2024762Keywords:
WSN (Wireless Sensor Network), IDS (Intrusion Detection System), DL (Deep Learning), Hybrid Optimization, Deep Convolutional Neural Network, Bidirectional Lon Short Term MemoryAbstract
Introduction: an array of hazards currently exists in cyberspace, prompting extensive research to tackle these concerns. Intrusion Detection Systems (IDS) are a mechanism used to provide security in Wireless Sensor Networks (WSN). The IDS continue to encounter significant challenges in accurately identifying unknown attacks. Conventional Intrusion Detection Systems (IDS) commonly rely on Deep Learning (DL) algorithms, which utilise binary classifiers to classify attacks. The data dimension attribute is affected inside large-scale high-dimensional data sets.
Methods: this research introduces a hybrid GFSO (HGFSO) model combined with Deep Learning Driven Intrusion Detection (HGFSO-DLIDS) to tackle this problem. The HGFSO approach is developed by merging the parameter selection methods of the Felis Margarita Swarm Optimisation (FMSO), the Grampus optimisation algorithm (GOA), and the Deep Convolutional Neural Network (DCNN) with BiLSTM (Bidirectional Long Short-Term Memory) algorithm.
Results: the model training utilised real-time traffic statistics, including the KDDCup 99 and WSN-DS datasets. After being trained and validated using the datasets, the model’s performance is assessed by multi-class classification, achieving accuracy rates of 99,89 % and 99,64 % respectively.
Conclusion: as a result, this occurrence leads to a decrease in the overall effectiveness of detecting assaults. Deep learning may enhance the creation of an intrusion detection system by eliminating complex features in the raw data, resulting in a more precise classification method.
References
1. Marriwala N, and Rathee P. An approach to increase the wireless sensor network lifetime. In World congress on information and communication technologies, pp. 495-499. https://doi.org/10.1109/WICT.2012.6409128. DOI: https://doi.org/10.1109/WICT.2012.6409128
2. Gungor VC, Lu B, and Hancke GP. Opportunities and challenges of wireless sensor networks in smart grid. IEEE transactions on industrial electronics, 57(10), pp. 3557-3564. https://doi.org/10.1109/TIE.2009.2039455. DOI: https://doi.org/10.1109/TIE.2009.2039455
3. Rassam MA, Maarof MA, and Zainal A. A survey of intrusion detection schemes in wireless sensor networks. American Journal of Applied Sciences, 9(10), pp. 1636-1652. DOI: https://doi.org/10.3844/ajassp.2012.1636.1652
4. Butun I, Morgera SD, and Sankar R. A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), pp. 266-282. https://doi.org/10.1109/SURV.2013.050113.00191. DOI: https://doi.org/10.1109/SURV.2013.050113.00191
5. Modares H, Salleh R, and Moravejosharieh A. Overview of security issues in wireless sensor networks. In third international conference on computational intelligence, modelling & simulation, pp. 308-311. https://doi.org/10.1109/CIMSim.2011.62. DOI: https://doi.org/10.1109/CIMSim.2011.62
6. Sen, J. Security in wireless sensor networks. Wireless sensor networks: current status and future trends, 407, pp. 1-51. DOI: https://doi.org/10.1201/b13092-15
7. Farooq N, Zahoor I, Mandal S, and Gulzar T. Systematic analysis of DoS attacks in wireless sensor networks with wormhole injection. International Journal of Information and Computation Technology, 4(2), pp. 173-182.
8. Ghosal A, and Halder S. Intrusion detection in wireless sensor networks: Issues, challenges and approaches. Wireless Networks and Security: Issues, Challenges and Research Trends, pp. 329-367. https://doi.org/10.1007/978-3-642-36169-2_10. DOI: https://doi.org/10.1007/978-3-642-36169-2_10
9. Apruzzese G, Colajanni M, Ferretti L, Guido A, and Marchetti M. On the effectiveness of machine and deep learning for cyber security. In 2018 10th international conference on cyber Conflict (CyCon), pp. 371-390. https://doi.org/10.23919/CYCON.2018.8405026. DOI: https://doi.org/10.23919/CYCON.2018.8405026
10. Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, and Wang C. Machine learning and deep learning methods for cybersecurity. Ieee access, 6, pp. 35365-35381. https://doi.org/10.1109/ACCESS.2018.2836950. DOI: https://doi.org/10.1109/ACCESS.2018.2836950
11. Milosevic N, Dehghantanha A, and Choo KKR. Machine learning aided Android malware classification. Computers & Electrical Engineering, 61, pp. 266-274. https://doi.org/10.1016/j.compeleceng.2017.02.013. DOI: https://doi.org/10.1016/j.compeleceng.2017.02.013
12. Aslan ÖA, and Samet R. A comprehensive review on malware detection approaches. IEEE access, 8, pp. 6249-6271. https://doi.org/10.1109/ACCESS.2019.2963724. DOI: https://doi.org/10.1109/ACCESS.2019.2963724
13. Ye Y, Li T, Adjeroh D, and Iyengar SS. A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR), 50(3), pp. 1-40. https://doi.org/10.1145/3073559. DOI: https://doi.org/10.1145/3073559
14. Kim S, Park KJ, and Lu C. A survey on network security for cyber–physical systems: From threats to resilient design. IEEE Communications Surveys & Tutorials, 24(3), pp. 1534-1573. https://doi.org/10.1109/COMST.2022.3187531. DOI: https://doi.org/10.1109/COMST.2022.3187531
15. Jiang J, Han G, Wang H, and Guizani M. A survey on location privacy protection in wireless sensor networks. Journal of Network and Computer Applications, 125, pp. 93-114. https://doi.org/10.1016/j.jnca.2018.10.008. DOI: https://doi.org/10.1016/j.jnca.2018.10.008
16. Kumar DP, Amgoth T, and Annavarapu CSR. Machine learning algorithms for wireless sensor networks: A survey. Information Fusion, 49, pp. 1-25. https://doi.org/10.1016/j.inffus.2018.09.013. DOI: https://doi.org/10.1016/j.inffus.2018.09.013
17. Dwivedi RK, Rai AK, and Kumar R. A study on machine learning based anomaly detection approaches in wireless sensor network. In 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 194-199. https://doi.org/10.1109/Confluence47617.2020.9058311. DOI: https://doi.org/10.1109/Confluence47617.2020.9058311
18. Salmi S, and Oughdir L. Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network. Journal of Big Data, 10(1), pp. 1-25. https://doi.org/10.1186/s40537-023-00692-w. DOI: https://doi.org/10.1186/s40537-023-00692-w
19. Sharma HS, Sarkar A, and Singh MM. An efficient deep learning-based solution for network intrusion detection in wireless sensor network. International Journal of System Assurance Engineering and Management, 14(6), pp. 2423-2446. https://doi.org/10.1007/s13198-023-02090-0. DOI: https://doi.org/10.1007/s13198-023-02090-0
20. Gowdhaman V, and Dhanapal R. An intrusion detection system for wireless sensor networks using deep neural network. Soft Computing, 26(23), pp. 13059-13067. https://doi.org/10.1007/s00500-021-06473-y. DOI: https://doi.org/10.1007/s00500-021-06473-y
21. Abhale AB, and Manivannan SS. Supervised machine learning classification algorithmic approach for finding anomaly type of intrusion detection in wireless sensor network. Optical Memory and Neural Networks, 29(3), pp. 244-256. https://doi.org/10.3103/S1060992X20030029. DOI: https://doi.org/10.3103/S1060992X20030029
22. Sood T, Prakash S, Sharma S, Singh A, and Choubey H. Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wireless Personal Communications, 126(1), pp. 911-931. https://doi.org/10.1007/s11277-022-09776-x. DOI: https://doi.org/10.1007/s11277-022-09776-x
23. Biswas P, Samanta T, and Sanyal J. Intrusion detection using graph neural network and Lyapunov optimization in wireless sensor network. Multimedia Tools and Applications, 82(9), pp. 14123-14134. https://doi.org/10.1007/s11042-022-13992-9. DOI: https://doi.org/10.1007/s11042-022-13992-9
24. Otoum S, Kantarci B, and Mouftah HT. On the feasibility of deep learning in sensor network intrusion detection. IEEE networking letters, 1(2), pp. 68-71. https://doi.org/10.1109/LNET.2019.2901792. DOI: https://doi.org/10.1109/LNET.2019.2901792
25. Zhao R, Yin J, Xue Z, Gui G, Adebisi B, Ohtsuki T, Gacanin H, and Sari H. An efficient intrusion detection method based on dynamic autoencoder. IEEE Wireless Communications Letters, 10(8), pp. 1707-1711. https://doi.org/10.1109/LWC.2021.3077946. DOI: https://doi.org/10.1109/LWC.2021.3077946
26. Halbouni A, Gunawan TS, Habaebi MH, Halbouni M, Kartiwi M, and Ahmad R. CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access, 10, pp. 99837-99849. https://doi.org/10.1109/ACCESS.2022.3206425. DOI: https://doi.org/10.1109/ACCESS.2022.3206425
27. Yao C, Yang Y, Yin K, and Yang J. Traffic anomaly detection in wireless sensor networks based on principal component analysis and deep convolution neural network. IEEE Access, 10, pp. 103136-103149. https://doi.org/10.1109/ACCESS.2022.3210189. DOI: https://doi.org/10.1109/ACCESS.2022.3210189
28. Dener M, Al S, and Orman A. Stlgbm-dds: An efficient data balanced dos detection system for wireless sensor networks on big data environment. IEEE Access, 10, pp. 92931-92945. https://doi.org/10.1109/ACCESS.2022.3202807. DOI: https://doi.org/10.1109/ACCESS.2022.3202807
29. Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, and Venkatraman S. Deep learning approach for intelligent intrusion detection system. Ieee Access, 7, pp. 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334. DOI: https://doi.org/10.1109/ACCESS.2019.2895334
30. Jin J. Intrusion detection algorithm and simulation of wireless sensor network under Internet environment. Journal of Sensors, pp. 1-10. https://doi.org/10.1155/2021/9089370. DOI: https://doi.org/10.1155/2021/9089370
31. Kaveh A, and Farhoudi N. A new optimization method: Dolphin echolocation. Advances in Engineering Software, 59, pp. 53-70. https://doi.org/10.1016/j.advengsoft.2013.03.004. DOI: https://doi.org/10.1016/j.advengsoft.2013.03.004
32. Seyyedabbasi A, and Kiani F. Sand Cat swarm optimization: A nature-inspired algorithm to solve global optimization problems. Engineering with Computers, 39(4), pp. 2627-2651. https://doi.org/10.1007/s00366-022-01604-x. DOI: https://doi.org/10.1007/s00366-022-01604-x
Published
Issue
Section
License
Copyright (c) 2024 K Sedhuramalingam, N Saravana Kumar (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.