INTRUSION DETECTION SYSTEM USING WSN NOVEL DT, RF, AND MLP ALGORITHMS
DOI:
https://doi.org/10.65009/3gndhq65Keywords:
Wireless Sensor Network, Intrusion Detection, Machine Learning, Deep Learning, Energy Efficiency.,,Abstract
The security of computer networks has emerged as a critical issue in the current digital
era, as information is readily shared, and connection is pervasive. Organisations, governments, and
people are all at danger from the enhancing frequency as well as complexity of cyber assaults. The
need for reliable cybersecurity solutions has never been more pressing as criminal actors attempt
to infiltrate sensitive data and exploit vulnerabilities on a constant basis. Network security leaders
and a key line of defence against cyberattacks are intrusion detection systems (IDS). These
advanced tools are designed to continuously scan for any indications of suspect or unauthorised
behaviour while keeping a close eye on system operations and network traffic in real time. IDS are
important for stopping unauthorized access attempts, service outages, and data breaches by quickly
identifying and reacting to possible threats. The field of intrusion detection systems is observed in
this study along with its underlying theories, methodology, and real-world uses. We'll examine how
IDS may assistorganizations in safeguarding their digital assets and maintaining network integrity
by promptly detecting and addressing various cyberattacks. The introduction will provide a general
overview of the growing cybersecurity problems that organisations and people throughout the globe
are facing.
We investigate the components, sensor location, and data collecting of both Network-based
Intrusion DetectionSystems (NIDS) and Host-based IntrusionDetection Systems (HIDS). NIDS
stands for Network-based IntrusionDetection System. HIDS is for Host-based Intrusion Detection
System. In addition, we went further into the complexities of signature-based, AnomalyBased, and
BehaviorBased detection approaches, as well as the incorporation of machine learning approaches
for improved intrusion detection capabilities. The difficulties associated with implementing an IDS
were investigated; these difficulties included evasion methods used by attackers, concerns about
privacy, challenges with scalability, and resource limits.
References
Adnan, A, Muhammed, A, Abd Ghani, AAA, Abdullah, A & Hakim, F2021, ‘An intrusion detection
system for the internet of things based on machine learning: review and challenges. Symmetry’, vol.
, no. 6, pp. 1-13.
Kasongo, SM & Sun, Y 2021, ‘A Deep Gated Recurrent Unit based model for wireless intrusion
detection system. ICT Express, vol. 7, no. 1, pp. 81-87.
Kayode Saheed, Y, Idris Abiodun, A, Misra, S, Kristiansen Holone, M & Colomo-Palacios, R
, ‘A machine learning-based intrusion detection for detecting internet of things network
attacks. Journal of Alexandria Engineering vol. 6, no. 12, pp. 9395-9409.
D. Agrawal, C. Agrawal and H. Yadav. "A Machine Learning Based Intrusion Detection
Framework Using KDDCUP 99 Dataset", vol. 4. no. 6, pp. 11.
Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.
"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."
Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.
Lyngdoh, J, Hussain, MI, Majaw, S & Kalita, HK 2019, ‘An Intrusion detection method using
artificial immune system approach’, Communications in Computer and Information Science
International conference on advanced informatics for computing research, pp. 379-387.
Saheed, YK 2022, ‘Performance improvement of intrusion detection system for detecting attacks
on Internet of things and edge of things. In: Misra S, TKA, Piuri V, Garg L, editors, Artificial
intelligence for cloud and edge computing’. Internet of things (technology, communications and
computing). Cham: Springer; pp. 321-39.
Zhong, W, Yu, N & Ai, C 2020, ‘Applying big data based deep learning system to intrusion
detection’ , Journal of Big Data Min Anal, vol. 3, no. 3, pp. 181-195.
Nagalalli, G & Ravi, G 2022, ‘A Novel Megabat Optimized Intelligent Intrusion Detection System
In Wireless Sensor Networks’, Journal of Intelligent Automation and Soft Computing, Tech
Science Press, vol. 35, no. 1, pp. 475-490.
Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,
"Multi-Objective Genetic Algorithms for Secure Routing and Data Privacy in IoT Networks",
International Journal of Communication Networks and Information Security (IJCNIS), (2020),
(3), 632–643.
D. E. Baraneetharan, “Role of machine learning algorithms intrusion detection in WSNs: A
survey,” Journal of Information Technology and Digital World, vol. 2, no. 3, pp. 161–173, 2020.
F. A. Khan, A. Gumaci, A. Derhab and A. Hussain, "TSDL: A Two- Stage Deep Learning Model
for Efficient Network Intrusion Detection", IEEE Access, vol. 7. pp. 30373-30385, 2019.
S. Jiang, J. Zhao and X. Xu, “SLGBM: An intrusion detection mechanism for wireless sensor
networks in smart environments,” IEEE Access, vol. 8, pp. 169548–169558, 2020.
Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial
intelligence‐based techniques. Expert Systems, 39(9), e13066.
Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A
Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",
International Journal on Recent and Innovation Trends in Computing and Communication, ISSN:
-8169 Volume: 11 Issue: 3.
Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.
(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in
IoT Systems. International Journal of Communication Networks and Information Security
(IJCNIS), 13(3), 582–595.
Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm
Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection",
International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s), 941.
Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization
Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2, September,
Habeeb, M. S. (2024). Predictive analytics and cybersecurity. Intelligent Techniques for Predictive
Data Analytics, 151-169.
hakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path
planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning
and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).
M. Mukhedkar, D. Rohatgi, V.A. Vuyyuru, K.V.S.S. Ramakrishna, Y.A. Baker El-Ebiary, V.A.
Asir Daniel, "Feline wolf net: A hybrid lion-grey wolf optimization deep learning model for
ovarian cancer detection", Int. J. Adv. Comput. Sci. Appl., 14 (9) (2023)

