Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks

Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks

Mohandas V. Pawar, Anuradha J.
Copyright: © 2022 |Pages: 29
DOI: 10.4018/IJDST.300356
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This paper tempts to implement a new machine-learning algorithm for detecting attacks in WSN. The developed model involves three main phases (a) Data Acquisition, (b) Feature Extraction, and (c) Detection. Next to the data acquisition from different benchmark datasets, the attributes in the form of features are extracted. Further, a new hybrid machine learning algorithm with the integration of Neural Network (NN), and Fuzzy Classifier is used for detection, and it is termed as FNN. As an improvement to the developed hybrid model, the number of hidden neurons in NN, and the membership function of Fuzzy Classifier is optimized by a modified optimization algorithm called Opposition-based Deer Hunting Optimization Algorithm (O-DHOA). Finally, the experiment analysis of our proposed model provides an effective solution to solve the problem of IDS detection and improves the performance of intrusion detection.
Article Preview
Top

1. Introduction

WSNs include a small-sized self-governing wireless sensor device, which is generally placed in aggressive and vulnerable environments to monitor and collect data (Subba, et al., 2018; Deng & Liu, 2007). Despite widespread adaptation, WSNs are given to multiple restrictions associated with processing abilities, thin wireless bandwidths, random sensor node deployment, limited storage spaces, and limited battery power (Wazid & Das, 2016; Akyildiz, et al., 2002). Moreover, sensor nodes are typically less expensive and tamper-prone tools (Otoum, et al., 2019; Borkar, et al., 2019). Thus, the attacks can take control of them during physical modifications and can easily develop fake data during compromised nodes for deceiving WSN and turns out to be unproductive (Wang, et al., 2006; Salmon, et al., 2013; Qu, et al., 2018). The entire elements mentioned above can create intrusion detection and network security as a crucial part of WSNs (Qu, et al., 2018; Otoum, et al., 2018).

Table 1.
Nomenclature
AbbreviationsDescriptions
ABCArtificial Bee Colony
ASCH-IDSAdaptive Supervised and Clustered Hybrid IDS
CHCluster Head
CSOChicken Swarm Optimization
DHOADeer Hunting Optimization Algorithm
DoSDenial of Service
FDRFalse Discovery Rate
FNRFalse Negative Rate
FPRFalse Positive Rate
GWOGrey Wolf Optimization
IDSIntrusion Detection System
KBIDSKnowledge-Based Intrusion Detection Strategy
KDEKernel Density Estimation
KLKullback-Leibler
MCCMatthew’s Correlation Coefficient
MSCAMean Shift Clustering Algorithm
NNNeural Network
NPVNegative Predictive Value
O-DHOAOpposition-based Deer Hunting Optimization Algorithm
PDFProbability Density Function
PDRPacket Delivery Ratio
PSOParticle Swarm Optimization
RBC-IDSRestricted Boltzmann Machine-based Clustered IDS
SVMSupport Vector Machine
WOAWhale Optimization Algorithm
WSNWireless Sensor Networks

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing