A Hybrid Cluster Based Intelligent IDS with Deep Belief Network to Improve the Security over Wireless Sensor Network

Authors

  • Priyanka R. Assistant Professor, Department of Information Science & Engineering, Cambridge Institute of Technology, Bangalore, Affiliated to VTU, Belgaum, India
  • Teena K. B. Assistant Professor, Department of Information Science & Engineering, East Point College of Engineering and Technology, Bangalore, India
  • Rashmi T. V. Assistant Professor, Department of Computer Science & Engineering, East Point College of Engineering and Technology, Bangalore India
  • Reshma J. Associate Professor, Department of Information Science & Engineering, Dayananda Sagar College of Engineering, Bangalore, India
  • Tejashwini Nagaraj Associate Professor, Department of Computer Science & Engineering, Sai Vidya Institute of Technology, Bangalore, India
  • Tejaswini N. Assistant Professor, Department of CS&E, JSS Science and Technology University, Mysore India

Keywords:

Wireless Sensor Network, Hybrid Cluster Intelligent IDS, Deep Belief Network, Deep Learning, In-Vehicle security, Performance measures

Abstract

Numerous inexpensive, compact devices compose a Wireless Sensor Network (WSN). They're usually readily available to some types of attacks due to their location, which is not well protected. A large number of researchers are focusing on WSN security at the moment. This kind of network is characterized by vulnerable characteristics, such as the ability to organize oneself without a stable infrastructure and open-air transmission. To train variables for the probability-based feature vectors, a Deep Neural Network (DNN) framework that is derived from international vehicle network packets shall be applied. The detector is capable of detecting any malicious attack on the vehicle since DNN gives each category a chance to distinguish between attacks and regular packets. Intrusion Detection Systems (IDS), can help to identify and stop security attacks on vehicles. The study proposes a mechanism for enhancing the security of WSNs based on Hybrid Clusters and Intelligent Intrusion Detection Systems with Deep Belief Networks (HCIIDS-DBN). It can provide a protection system for intrusions and an analysis of vehicle attacks in real time. They are designed based on their respective attack probability and ability, to the sensor node, sink, or cluster head. The proposed HCIIDS-DBN is composed of modules designed to detect anomalies and dereliction. The objective is to increase detection rates and decrease false positive incidences by detecting anomalies and abuse. Finally, the detected data are integrated and the various types of vehicle communication attacks are reported using the Decision Support System (DSS). The results of the experiment show that the proposed method may respond to the attack in real-time with a much detection of higher ratio in the Controller Area Network (CAN) bus.

Downloads

Download data is not yet available.

References

Bediya, A. K., & Kumar, R. (2023). A novel intrusion detection system for internet of things network security. In Research Anthology on Convergence of Blockchain, Internet of Things, and Security (pp. 330-348). IGI Global.

He, K., Kim, D. D., & Asghar, M. R. (2023). Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Communications Surveys & Tutorials.

Abdulganiyu, O. H., Ait Tchakoucht, T., & Saheed, Y. K. (2023). A systematic literature review for network intrusion detection system (IDS). International Journal of Information Security, 1-38.

Yi, L., Yin, M., & Darbandi, M. (2023). A deep and systematic review of the intrusion detection systems in the fog environment. Transactions on Emerging Telecommunications Technologies, 34(1), e4632.

Sivanantham, S., Mohanraj, V., Suresh, Y., & Senthilkumar, J. (2023). Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network. Computer Systems Science & Engineering, 44(2).

Talukder, M. A., Hasan, K. F., Islam, M. M., Uddin, M. A., Akhter, A., Yousuf, M. A., ... & Moni, M. A. (2023). A dependable hybrid machine learning model for network intrusion detection. Journal of Information Security and Applications, 72, 103405.

Sharma, B., Sharma, L., Lal, C., & Roy, S. (2023). Anomaly based network intrusion detection for IoT attacks using deep learning technique. Computers and Electrical Engineering, 107, 108626.

Mohy-eddine, M., Guezzaz, A., Benkirane, S., & Azrour, M. (2023). An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimedia Tools and Applications, 1-19.

Hnamte, V., & Hussain, J. (2023). DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system. Telematics and Informatics Reports, 10, 100053.

Okey, O. D., Melgarejo, D. C., Saadi, M., Rosa, R. L., Kleinschmidt, J. H., & Rodríguez, D. Z. (2023). Transfer learning approach to IDS on cloud IoT devices using optimized CNN. IEEE Access, 11, 1023-1038.

Ennaji, S., El Akkad, N., & Haddouch, K. (2023). i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security. International Journal of Information Security and Privacy (IJISP), 17(1), 1-17.

Lilhore, U. K., Manoharan, P., Simaiya, S., Alroobaea, R., Alsafyani, M., Baqasah, A. M., ... & Raahemifar, K. (2023). HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning. Sensors, 23(18), 7856.

Cui, J., Sun, H., Zhong, H., Zhang, J., Wei, L., Bolodurina, I., & He, D. (2023). Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach. IEEE Transactions on Parallel and Distributed Systems.

Du, J., Yang, K., Hu, Y., & Jiang, L. (2023). Nids-cnnlstm: Network intrusion detection classification model based on deep learning. IEEE Access, 11, 24808-24821.

Shaorong, W., & Guiling, L. (2023). Research on campus network security protection system framework based on cloud data and intrusion detection algorithm. Soft Computing, 1-10.

Sousa, B., Magaia, N., & Silva, S. (2023). An Intelligent Intrusion Detection System for 5G-Enabled Internet of Vehicles. Electronics, 12(8), 1757.

Huang, Y., & Ma, M. (2023). Ill-ids: An incremental lifetime learning ids for vanets. Computers & Security, 124, 102992.

Sood, K., Nosouhi, M. R., Nguyen, D. D. N., Jiang, F., Chowdhury, M., & Doss, R. (2023). Intrusion detection scheme with dimensionality reduction in next generation networks. IEEE Transactions on Information Forensics and Security, 18, 965-979.

de Carvalho Bertoli, G., Junior, L. A. P., Saotome, O., & dos Santos, A. L. (2023). Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach. Computers & Security, 127, 103106.

Putri, A. A., Agustina, C., Fauzan, H., Saputra, M. R. E., Erdiansyah, M., & Wardani, P. S. (2023). Network security implementation with snort-based intrusion detection system using windows 10. JComce-Journal of Computer Science, 1(1).

Logeswari, G., Bose, S., & Anitha, T. (2023). An intrusion detection system for sdn using machine learning. Intelligent Automation & Soft Computing, 35(1), 867-880.

Kadry, H., Farouk, A., Zanaty, E. A., & Reyad, O. (2023). Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security. Alexandria Engineering Journal, 71, 491-500.

Ghanbarzadeh, R., Hosseinalipour, A., & Ghaffari, A. (2023). A novel network intrusion detection method based on metaheuristic optimisation algorithms. Journal of ambient intelligence and humanized computing, 14(6), 7575-7592.

Wang, R. X., Wang, Y., & Dai, L. (2023, March). Intrusion detection in network security. In Second Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum (AIBDF 2022) (Vol. 12593, pp. 366-371). SPIE.

Downloads

Published

23.02.2024

How to Cite

R., P. ., K. B., T. ., T. V., R. ., J., R. ., Nagaraj, T. ., & N., T. . (2024). A Hybrid Cluster Based Intelligent IDS with Deep Belief Network to Improve the Security over Wireless Sensor Network. International Journal of Intelligent Systems and Applications in Engineering, 12(17s), 225–238. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4868

Issue

Section

Research Article