Optimistic Ensemble Federated Learning Based on Spread Spectral Support Vector Feature Selection with Multi Perceptron Neural Network for Anomaly Detection in Cloud Environment

Authors

  • S. Edwin Raja Assistant Professor, Department of Computer Science and Engineering, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Avadi , Chennai -600062, Tamil Nadu,India.
  • R. V. V. S. V. Prasad Professor. Department of Information Technology , Swarnandhra College of Engineering & Technology, Narsapur-534280, India.
  • Gunaselvi Manohar Professor, Department of Electronics and Instrumentation Engineering, Easwari Engineering College (Autonomous), Chennai,India.
  • V. Krishna Meera Assistant Professor, Department of Electronics and communication engineering ,Ramco Institute of Technology, Rajapalayam, Tamil Nadu 626117,India.
  • G. Sathya Assistant Professor, Department of Electronics and Communication Engineering P.S.R.R College of Engineering, Sivakasi-626140, Tamil Nadu, India.
  • S. Gnanasambanthan Assistant Professor, Department of Electronics and Communication Engineering, P. S. R Engineering College, Sevalpatti, Sivakasi-626140,Tamil Nadu,India.

Keywords:

Ensemble federated learning, Support vector, feature selection and classification, neural network, anomaly detection

Abstract

Wireless Sensor Network (WSN) plays an important role in identifying, monitoring, and securing scalable networks along the Internet of communication all over the world in a cloud environment. Integrating the cloud manages transmission and data control securely to make an effort using energy efficient techniques by various machine learning techniques. The anomalies take part due to malfunction of WSN nodes, leads an inappropriate activity to unsecure the communication. Identifying the anomalies is a big problem based on the feature dimension and behavioural analysis in the communication medium. Most of the prevailing techniques failed to analyze the anomaly properties and behavior response features, leading to increasing feature dimension to produce low-level detection accuracy, precision, and recall rate f1 score, with more false rates and time complexity. To resolve this problem, to propose an Optimistic Ensemble Federated Learning (OEFL) Based on Spread Spectral Support Vector Feature Selection (Ss-SSVFS) with Multi Perceptron Neural Network (MPNN) for anomaly detection in a cloud Environment. Initially, the preprocessing is carried out by min-max normalization techniques to make the affine transformation to reduce the unleased values in the dataset. The Spread spectral support vector feature selection (Ss-SCVFA) is applied to select the features by screening the Support Vector Machine (SVM) class spread with Decision Tree Neural Unit (DTNN) to form feature patterns. The patterns are ranked by ordered class depending on the outlier forming anomaly weight factor to choose the feature limits to reduce the dimension. The feature patterns are trained with a Perceptron Neural Network (MPNN) to identify the behavioral properties into class by reference. The proposed system achieves high performance in identifying the anomalies effectively with a high precision rate, recall rate, and f1-score with a low false rate, and redundant time complexity. Compared to the prevailing techniques, the identification accuracy is at a high level by attaining the accuracy level.

Downloads

Download data is not yet available.

References

H. Cheng, X. Liu, H. Wang, Y. Fang, M. Wang and X. Zhao, "SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment," in IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 1413-1427, 1 April-June 2022, doi: 10.1109/TCC.2020.2990946.

Y. Wang, X. Du, Z. Lu, Q. Duan and J. Wu, "Improved LSTM-Based Time-Series Anomaly Detection in Rail Transit Operation Environments," in IEEE Transactions on Industrial Informatics, vol. 18, no. 12, pp. 9027-9036, Dec. 2022, doi: 10.1109/TII.2022. 3164087.

R. Lovas, E. Rigó, D. Unyi and B. Gyires-Tóth, "Experiences With Deep Learning Enhanced Steering Mechanisms for Debugging of Fundamental Cloud Services," in IEEE Access, vol. 11, pp. 26403-26418, 2023, doi: 10.1109/ACCESS.2023.3243201.

M. V. O. De Assis, M. P. Novaes, C. B. Zerbini, L. F. Carvalho, T. Abrãao and M. L. Proença, "Fast Defense System Against Attacks in Software Defined Networks," in IEEE Access, vol. 6, pp. 69620-69639, 2018, doi: 10.1109/ACCESS.2018.2878576.

A.Chougule, V. Kohli, V. Chamola and F. R. Yu, "Multibranch Reconstruction Error (MbRE) Intrusion Detection Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc Networks," in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 11, pp. 13068-13077, Nov. 2023, doi: 10.1109/TITS.2022.3201548.

H. Iqbal, D. Campo, P. Marin-Plaza, L. Marcenaro, D. M. Gómez and C. Regazzoni, "Modeling Perception in Autonomous Vehicles via 3D Convolutional Representations on LiDAR," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 14608-14619, Sept. 2022, doi: 10.1109/TITS.2021.3130974.

M. Li, T. Chen and H. Du, "Human Behavior Recognition Using Range-Velocity-Time Points," in IEEE Access, vol. 8, pp. 37914-37925, 2020, doi: 10.1109/ACCESS.2020.2975676.

J. Tang, L. Wei, W. Liu, Z. Zhou and J. Gu, "Correlation Anomaly Detection With Multiple Primary Attributes in Collaborative Device–Edge–Cloud Network," in IEEE Internet of Things Journal, vol. 10, no. 6, pp. 4922-4936, 15 March15, 2023, doi: 10.1109/JIOT.2022.3221086.

Y. Wang, X. Du, Z. Lu, Q. Duan and J. Wu, "Improved LSTM-Based Time-Series Anomaly Detection in Rail Transit Operation Environments," in IEEE Transactions on Industrial Informatics, vol. 18, no. 12, pp. 9027-9036, Dec. 2022, doi: 10.1109/TII.2022. 3164087.

M. Razian, M. Fathian, H. Wu, A. Akbari and R. Buyya, "SAIoT: Scalable Anomaly-Aware Services Composition in CloudIoT Environments," in IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3665-3677, 1 March1, 2021, doi: 10.1109/JIOT.2020.3023938.

Z. Zhang, J. Wen, J. Zhang, X. Cai and L. Xie, "A Many Objective-Based Feature Selection Model for Anomaly Detection in Cloud Environment," in IEEE Access, vol. 8, pp. 60218-60231, 2020, doi: 10.1109/ACCESS.2020.2981373.

J. Liu, H. Zhang and G. Xu, "An Anomaly Detector Deployment Awareness Detection Framework Based on Multi-Dimensional Resources Balancing in Cloud Platform," in IEEE Access, vol. 6, pp. 44927-44933, 2018, doi: 10.1109/ACCESS.2018.2865114.

H. Cheng, X. Liu, H. Wang, Y. Fang, M. Wang and X. Zhao, "SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment," in IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 1413-1427, 1 April-June 2022, doi: 10.1109/TCC.2020.2990946.

H. Zhang, J. Liu and T. Wu, "Adaptive and Incremental-Clustering Anomaly Detection Algorithm for VMs Under Cloud Platform Runtime Environment," in IEEE Access, vol. 6, pp. 76984-76992, 2018, doi: 10.1109/ACCESS.2018.2884508.

H. Zhang, J. Liu and T. Wu, "Adaptive and Incremental-Clustering Anomaly Detection Algorithm for VMs Under Cloud Platform Runtime Environment," in IEEE Access, vol. 6, pp. 76984-76992, 2018, doi: 10.1109/ACCESS.2018.2884508.

S. Kardani-Moghaddam, R. Buyya and K. Ramamohanarao, "ADRL: A Hybrid Anomaly-Aware Deep Reinforcement Learning-Based Resource Scaling in Clouds," in IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 3, pp. 514-526, 1 March 2021, doi: 10.1109/TPDS.2020.3025914.

A.Yahyaoui, T. Abdellatif, S. Yangui and R. Attia, "READ-IoT: Reliable Event and Anomaly Detection Framework for the Internet of Things," in IEEE Access, vol. 9, pp. 24168-24186, 2021, doi: 10.1109/ACCESS.2021.3056149.

D. Sun, M. Fu, L. Zhu, G. Li and Q. Lu, "Non-Intrusive Anomaly Detection With Streaming Performance Metrics and Logs for DevOps in Public Clouds: A Case Study in AWS," in IEEE Transactions on Emerging Topics in Computing, vol. 4, no. 2, pp. 278-289, April-June 2016, doi: 10.1109/TETC.2016.2520883.

P. Osypanka and P. Nawrocki, "Resource Usage Cost Optimization in Cloud Computing Using Machine Learning," in IEEE Transactions on Cloud Computing, vol. 10, no. 3, pp. 2079-2089, 1 July-Sept. 2022, doi: 10.1109/TCC.2020.3015769.

P. Mishra, V. Varadharajan, E. S. Pilli and U. Tupakula, "VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment," in IEEE Transactions on Cloud Computing, vol. 8, no. 3, pp. 957-971, 1 July-Sept. 2020, doi: 10.1109/TCC.2018.2829202.

M. Matar, T. Xia, K. Huguenard, D. Huston and S. Wshah, "Multi-Head Attention based Bi-LSTM for Anomaly Detection in Multivariate Time-Series of WSN," 2023 IEEE 5th International Conference on Artificial Intelligence Circuits and Systems (AICAS), Hangzhou, China, 2023, pp. 1-5, doi: 10.1109/AICAS57966.2023. 10168670.

Y. Bo and W. Xueyuan, "Research on Multiclass CUSUM Algorithm for Anomaly Detection of WSN," 2010 International Conference on Intelligent Computation Technology and Automation, Changsha, China, 2010, pp. 40-44, doi: 10.1109/ICICTA.2010.522.

G. Li, Y. Liu and Y. Wang, "Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN," 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, 2014, pp. 961-966, doi: 10.1109/TrustCom.2014.127.

R. K. Dwivedi, A. K. Rai and R. Kumar, "A Study on Machine Learning Based Anomaly Detection Approaches in Wireless Sensor Network," 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 2020, pp. 194-199, doi: 10.1109/Confluence47617.2020.9058311.

M. A. Amrizal, L. Guillen and T. Suganuma, "Toward an Optimal Anomaly Detection Pattern in Wireless Sensor Networks," 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA, 2019, pp. 912-913, doi: 10.1109/COMPSAC.2019.00137.

A. Balakrishnan and P. C. Rino, "A Novel Anomaly Detection Algorithm for WSN," 2015 Fifth International Conference on Advances in Computing and Communications (ICACC), Kochi, India, 2015, pp. 118-121, doi: 10.1109/ICACC.2015.29.

M. Salvato, S. De Vito, S. Guerra, A. Buonanno, G. Fattoruso and G. Di Francia, "An adaptive immune based anomaly detection algorithm for smart WSN deployments," 2015 XVIII AISEM Annual Conference, Trento, Italy, 2015, pp. 1-5, doi: 10.1109/AISEM.2015.7066840.

T. Sun, W. Chen, Y. Liu and H. Sun, "A probability-based approximate algorithm for anomaly detection in WSN," 2012 World Congress on Information and Communication Technologies, Trivandrum, India, 2012, pp. 1109-1114, doi: 10.1109/WICT.2012.6409241.

W. Raad, A. Hussein, M. Mohandes, B. Liu and A. Al-Shaikhi, "Crowd Anomaly Detection Systems Using RFID and WSN Review," 2021 4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT), Alkhobar, Saudi Arabia, 2021, pp. 1-5, doi: 10.1109/ISAECT53699.2021.9668517.

Y. -L. Tsou, H. -M. Chu, C. Li and S. -W. Yang, "Robust Distributed Anomaly Detection Using Optimal Weighted One-Class Random Forests," 2018 IEEE International Conference on Data Mining (ICDM), Singapore, 2018, pp. 1272-1277, doi: 10.1109/ICDM.2018.00171.A

A. Chirayil, R. Maharjan and C. Wu, "Survey on Anomaly Detection in Wireless Sensor Networks (WSNs)," 2019 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Toyama, Japan, 2019, pp. 150-157, doi: 10.1109/SNPD.2019.8935827.

Z. Xiao, C. Liu and C. Chen, "An Anomaly Detection Scheme Based on Machine Learning for WSN," 2009 First International Conference on Information Science and Engineering, Nanjing, China, 2009, pp. 3959-3962, doi: 10.1109/ICISE.2009.235.

A. Abid, A. Kachouri, A. Ben Fradj Guiloufi, A. Mahfoudhi, N. Nasri and M. Abid, "Centralized KNN anomaly detector for WSN," 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), Mahdia, Tunisia, 2015, pp. 1-4, doi: 10.1109/SSD.2015.7348091.

T. Otsuka, T. Inamoto, Y. Torii and T. Ito, "A High-Speed Sensor Resources Allocation Method for Distributed WSN," 2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA), Rome, Italy, 2015, pp. 242-246, doi: 10.1109/SOCA.2015.34.

M. Xie, J. Hu and S. Guo, "Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks," in IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 574-583, Feb. 2015, doi: 10.1109/TPDS.2014.2308198.

T. Luo and S. G. Nagarajan, "Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 2018, pp. 1-6, doi: 10.1109/ICC.2018.8422402.

T. -B. Dang, D. -T. Le, T. -D. Nguyen, M. Kim and H. Choo, "Monotone Split and Conquer for Anomaly Detection in IoT Sensory Data," in IEEE Internet of Things Journal, vol. 8, no. 20, pp. 15468-15485, 15 Oct.15, 2021, doi: 10.1109/JIOT.2021.3073705.

X. Miao, Y. Liu, H. Zhao and C. Li, "Distributed Online One-Class Support Vector Machine for Anomaly Detection Over Networks," in IEEE Transactions on Cybernetics, vol. 49, no. 4, pp. 1475-1488, April 2019, doi: 10.1109/TCYB.2018.2804940.

M. Xie, J. Hu, S. Han and H. -H. Chen, "Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks," in IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, pp. 1661-1670, Aug. 2013, doi: 10.1109/TPDS.2012.261.

M. Ahmadi Livani and M. Abadi, "An energy-efficient anomaly detection approach for wireless sensor networks," 2010 5th International Symposium on Telecommunications, Tehran, Iran, 2010, pp. 243-248, doi: 10.1109/ISTEL.2010.5734031.

Downloads

Published

13.12.2023

How to Cite

Raja, S. E. ., Prasad, R. V. V. S. V. ., Manohar, G. ., Meera, V. K. ., Sathya, G. ., & Gnanasambanthan, S. . (2023). Optimistic Ensemble Federated Learning Based on Spread Spectral Support Vector Feature Selection with Multi Perceptron Neural Network for Anomaly Detection in Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 201–210. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4110

Issue

Section

Research Article