Deep Learning Perspectives to Detecting Intrusions in Wireless Sensor Networks

Authors

  • Ashwini B. Abhale Research Scholor, School of Information Technology & Engineering(SITE),Vellore Institute of Technology, Vellore, India
  • Jayaram Reddy A Assistant Professor, School of Information Technology & Engineering(SITE),Vellore Institute of Technology, Vellore, India

Keywords:

Deep learning, Anomaly detection, CNN, CNN-LSTM, GRU, RNN, LSTM

Abstract

Due to the increasing number of communication protocols being used to send and receive data, security concerns have been raised about the unauthorized access of this data. To address these issues, the development of advanced IDS has been carried out. Deep learning is a type of machine learning that is composed of several neurons. Due to the increasing number of large-scale data sets and the success of deep learning in various fields, researchers have focused on detecting intrusions using deep learning. Due to the increasing number of data transmissions through various communication protocols, there has been a rise in security concerns about the security of these networks. This has prompted researchers to develop advanced IDSs that can detect unauthorized access. Besides having an effective network intrusion detection system(NIDS), continuous improvement is also required to ensure that the security of the network is maintained. Deep learning techniques are commonly used in the detection of network intrusions. It can also perform various tasks, such as analyzing and reporting on data. Due to its success in various fields, researchers have been focusing on developing deep learning techniques for detecting intrusions. This paper aims to review the current state of deep learning-based IDSs and compare with proposed modified algorithms with the previous ones.

Downloads

Download data is not yet available.

References

A. Thakkar and R. Lohiya, A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges, vol. 28, no. 4. Springer Netherlands, 2021.

R. Ganeshan, C. S. Kolli, C. M. Kumar, and T. Daniya, “A Systematic Review on Anomaly Based Intrusion Detection System,” IOP Conf. Ser. Mater. Sci. Eng., vol. 981, no. 2, 2020, doi: 10.1088/1757-899X/981/2/022010.

A. Aldweesh, A. Derhab, and A. Z. Emam, “Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Syst., vol. 189, p. 105124, 2020, doi: 10.1016/j.knosys.2019.105124.

Z. Wu, J. Wang, L. Hu, Z. Zhang, and H. Wu, “A network intrusion detection method based on semantic Re-encoding and deep learning,” J. Netw. Comput. Appl., vol. 164, no. March, 2020, doi: 10.1016/j.jnca.2020.102688.

A. H. Farooqi, F. A. Khan, J. Wang, and S. Lee, “A novel intrusion detection framework for wireless sensor networks,” Pers. Ubiquitous Comput., vol. 17, no. 5, pp. 907–919, 2013, doi: 10.1007/s00779-012-0529-y.

C. Xu, J. Shen, X. Du, and F. Zhang, “An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units,” IEEE Access, vol. 6, pp. 48697–48707, 2018, doi: 10.1109/ACCESS.2018.2867564.

P. Maniriho, E. Niyigaba, Z. Bizimana, V. Twiringiyimana, L. J. Mahoro, and T. Ahmad, “Anomaly-based Intrusion Detection Approach for IoT Networks Using Machine Learning,” CENIM 2020 - Proceeding Int. Conf. Comput. Eng. Network, Intell. Multimed. 2020, no. Cenim 2020, pp. 303–308, 2020, doi: 10.1109/CENIM51130.2020.9297958.

C. Miranda, G. Kaddoum, E. Bou-harb, S. Garg, and K. Kaur, “for Software-Defined Wireless Sensor Networks,” vol. 15, pp. 2602–2615, 2020.

Y. Imrana, Y. Xiang, L. Ali, and Z. Abdul-Rauf, “A bidirectional LSTM deep learning approach for intrusion detection,” Expert Syst. Appl., vol. 185, no. July, p. 115524, 2021, doi: 10.1016/j.eswa.2021.115524.

S. A. Elsaid and N. S. Albatati, “An optimized collaborative intrusion detection system for wireless sensor networks,” Soft Comput., vol. 24, no. 16, pp. 12553–12567, 2020, doi: 10.1007/s00500-020-04695-0.

J. Granjal, J. M. Silva, and N. Lourenço, “Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection,” Sensors (Switzerland), vol. 18, no. 8, 2018, doi: 10.3390/s18082445.

T. Sood, S. Prakash, S. Sharma, A. Singh, and H. Choubey, “Intrusion Detection System in Wireless Sensor Network Using Conditional Generative Adversarial Network,” Wirel. Pers. Commun., vol. 126, no. 1, pp. 911–931, 2022, doi: 10.1007/s11277-022-09776-x.

S. Sharma and J. Nagar, “Intrusion Detection in Mobile Sensor Networks: A Case Study for Different Intrusion Paths,” Wirel. Pers. Commun., vol. 115, no. 3, pp. 2569–2589, 2020, doi: 10.1007/s11277-020-07697-1.

M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system,” Simul. Model. Pract. Theory, vol. 101, no. November 2019, p. 102031, 2020, doi: 10.1016/j.simpat.2019.102031.

G. Efstathopoulos et al., “Operational data based intrusion detection system for smart grid,” IEEE Int. Work. Comput. Aided Model. Des. Commun. Links Networks, CAMAD, vol. 2019-September, 2019, doi: 10.1109/CAMAD.2019.8858503.

V. Gowdhaman and R. Dhanapal, “An intrusion detection system for wireless sensor networks using deep neural network,” Soft Comput., vol. 0123456789, no. Manoharan, 2021, doi: 10.1007/s00500-021-06473-y.

B. A. Ashwini and S. S. Manivannan, “Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network,” Opt. Mem. Neural Networks (Information Opt., vol. 29, no. 3, pp. 244–256, 2020, doi: 10.3103/S1060992X20030029.

S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park, “Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges,” IEEE Access, vol. 8, pp. 3343–3363, 2020, doi: 10.1109/ACCESS.2019.2962829.

M. Masdari and H. Khezri, “A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems,” Appl. Soft Comput. J., vol. 92, p. 106301, 2020, doi: 10.1016/j.asoc.2020.106301.

P. Sun et al., “DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system,” Secur. Commun. Networks, vol. 2020, 2020, doi: 10.1155/2020/8890306.

J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider, and A. Wahab, “A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions,” Electron., vol. 9, no. 7, 2020, doi: 10.3390/electronics9071177.

Alaria, S. K. "A.. Raj, V. Sharma, and V. Kumar.“Simulation and Analysis of Hand Gesture Recognition for Indian Sign Language Using CNN”." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 4 (2022): 10-14.

Rajput, B. S. .; Gangele, A. .; Alaria, S. K. . Numerical Simulation and Assessment of Meta Heuristic Optimization Based Multi Objective Dynamic Job Shop Scheduling System. ijfrcsce 2022, 8, 92-98.

Rajput, B. S. .; Gangele, A. .; Alaria, S. K. .; Raj, A. . Design Simulation and Analysis of Deep Convolutional Neural Network Based Complex Image Classification System. ijfrcsce 2022, 8, 86-91.

Wireless Sensor Network (img src-wikidata)

Downloads

Published

27.01.2023

How to Cite

Abhale, A. B. ., & Reddy A, J. . (2023). Deep Learning Perspectives to Detecting Intrusions in Wireless Sensor Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), 18–26. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2504

Issue

Section

Research Article