Intrusion Detection Technique in Wireless Sensor Network using Grid Search Random Forest with Boruta Feature Selection Algorithm

被引:48
作者
Subbiah, Sridevi [1 ]
Anbananthen, Kalaiarasi Sonai Muthu [2 ]
Thangaraj, Saranya [1 ]
Kannan, Subarmaniam [2 ]
Chelliah, Deisy [1 ]
机构
[1] Thiagarajar Coll Engn, Madurai, Tamil Nadu, India
[2] Multimedia Univ, Cyberjaya, Selangor, Malaysia
关键词
Boruta feature selection; grid search random forest; intrusion detection system (IDS); machine learning (ML); wireless sensor networks (WSNs); SUPPORT VECTOR MACHINE; DETECTION SYSTEM;
D O I
10.23919/JCN.2022.000002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
in wireless sensor networks (WSNs) aim to prevent or eradicate the network???s ability to perform its anticipated functions. Intrusion detection is a defense used in wireless sensor networks that can detect unknown attacks. Due to the incredible development in computer-related applications and massive Internet usage, it is indispensable to provide host and network security. The development of hacking technology tries to compromise computer security through intrusion. Intrusion detection system (IDS) was employed with the help of machine learning (ML) Algorithms to detect intrusions in the network. Classic ML algorithms like support vector machine (SVM), K nearest neighbour (KNN), and filter-based feature selection often led to poor accuracy and misclassification of intrusions. This article proposes a novel framework for IDS that can be enabled by Boruta feature selection with grid search random forest (BFSGSRF) algorithm to overcome these issues. The performance of BFS-GSRF is compared with ML algorithms like linear discriminant analysis (LDA) and classification and regression tree (CART) etc. The proposed work was implemented and tested on network security laboratory ??? knowledge on discovery dataset (NSL-KDD). The experimental results show that the proposed model BFS-GSRF yields higher accuracy (i.e., 99%) in detecting attacks, and it is superior to LDA, CART, and other existing algorithms.
引用
收藏
页码:264 / 273
页数:10
相关论文
共 32 条
[1]   Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network [J].
Abhale, Ashwini B. ;
Manivannan, S. S. .
OPTICAL MEMORY AND NEURAL NETWORKS, 2020, 29 (03) :244-256
[2]  
Abirami U., 2017, PROC IEEE ICOAC
[3]   Semi-supervised multi-layered clustering model for intrusion detection [J].
Al-Jarrah, Omar Y. ;
Al-Hammdi, Yousof ;
Yoo, Paul D. ;
Muhaidat, Sami ;
Al-Qutayri, Mahmoud .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (04) :277-286
[4]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[5]   Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system [J].
An, Xingshuo ;
Su, Jingtao ;
Lue, Xing ;
Lin, Fuhong .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[6]  
[Anonymous], KDD Cup 1999 Data
[7]   Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection [J].
Belavagi, Manjula C. ;
Muniyal, Balachandra .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :117-123
[8]   Adversarial environment reinforcement learning algorithm for intrusion detection [J].
Caminero, Guillermo ;
Lopez-Martin, Manuel ;
Carro, Belen .
COMPUTER NETWORKS, 2019, 159 :96-109
[9]   Selecting critical features for data classification based on machine learning methods [J].
Chen, Rung-Ching ;
Dewi, Christine ;
Huang, Su-Wen ;
Caraka, Rezzy Eko .
JOURNAL OF BIG DATA, 2020, 7 (01)
[10]   Random forest based intelligent fault diagnosis for PV arrays using array voltage and string currents [J].
Chen, Zhicong ;
Han, Fuchang ;
Wu, Lijun ;
Yu, Jinling ;
Cheng, Shuying ;
Lin, Peijie ;
Chen, Huihuang .
ENERGY CONVERSION AND MANAGEMENT, 2018, 178 :250-264