INTRUSION DETECTION SYSTEM USING WSN NOVEL DT, RF, AND MLP ALGORITHMS

Authors

  • Dr Syed Umar, Goli Madhuri, Dikshendra Daulat Sarpate, Gopala Soujanya, B.Rani Author

DOI:

https://doi.org/10.65009/3gndhq65

Keywords:

Wireless Sensor Network, Intrusion Detection, Machine Learning, Deep Learning, Energy Efficiency.,,

Abstract

The security of computer networks has emerged as a critical issue in the current digital 
era, as information is readily shared, and connection is pervasive. Organisations, governments, and 
people are all at danger from the enhancing frequency as well as complexity of cyber assaults. The 
need for reliable cybersecurity solutions has never been more pressing as criminal actors attempt 
to infiltrate sensitive data and exploit vulnerabilities on a constant basis. Network security leaders 
and a key line of defence against cyberattacks are intrusion detection systems (IDS). These 
advanced tools are designed to continuously scan for any indications of suspect or unauthorised 
behaviour while keeping a close eye on system operations and network traffic in real time. IDS are 
important for stopping unauthorized access attempts, service outages, and data breaches by quickly 
identifying and reacting to possible threats. The field of intrusion detection systems is observed in 
this study along with its underlying theories, methodology, and real-world uses. We'll examine how 
IDS may assistorganizations in safeguarding their digital assets and maintaining network integrity 
by promptly detecting and addressing various cyberattacks. The introduction will provide a general 
overview of the growing cybersecurity problems that organisations and people throughout the globe 
are facing. 
We investigate the components, sensor location, and data collecting of both Network-based 
Intrusion DetectionSystems (NIDS) and Host-based IntrusionDetection Systems (HIDS). NIDS 
stands for Network-based IntrusionDetection System. HIDS is for Host-based Intrusion Detection 
System. In addition, we went further into the complexities of signature-based, AnomalyBased, and 
BehaviorBased detection approaches, as well as the incorporation of machine learning approaches 
for improved intrusion detection capabilities. The difficulties associated with implementing an IDS 
were investigated; these difficulties included evasion methods used by attackers, concerns about 
privacy, challenges with scalability, and resource limits.

,

References

Adnan, A, Muhammed, A, Abd Ghani, AAA, Abdullah, A & Hakim, F2021, ‘An intrusion detection

system for the internet of things based on machine learning: review and challenges. Symmetry’, vol.

, no. 6, pp. 1-13.

Kasongo, SM & Sun, Y 2021, ‘A Deep Gated Recurrent Unit based model for wireless intrusion

detection system. ICT Express, vol. 7, no. 1, pp. 81-87.

Kayode Saheed, Y, Idris Abiodun, A, Misra, S, Kristiansen Holone, M & Colomo-Palacios, R

, ‘A machine learning-based intrusion detection for detecting internet of things network

attacks. Journal of Alexandria Engineering vol. 6, no. 12, pp. 9395-9409.

D. Agrawal, C. Agrawal and H. Yadav. "A Machine Learning Based Intrusion Detection

Framework Using KDDCUP 99 Dataset", vol. 4. no. 6, pp. 11.

Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.

"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."

Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.

Lyngdoh, J, Hussain, MI, Majaw, S & Kalita, HK 2019, ‘An Intrusion detection method using

artificial immune system approach’, Communications in Computer and Information Science

International conference on advanced informatics for computing research, pp. 379-387.

Saheed, YK 2022, ‘Performance improvement of intrusion detection system for detecting attacks

on Internet of things and edge of things. In: Misra S, TKA, Piuri V, Garg L, editors, Artificial

intelligence for cloud and edge computing’. Internet of things (technology, communications and

computing). Cham: Springer; pp. 321-39.

Zhong, W, Yu, N & Ai, C 2020, ‘Applying big data based deep learning system to intrusion

detection’ , Journal of Big Data Min Anal, vol. 3, no. 3, pp. 181-195.

Nagalalli, G & Ravi, G 2022, ‘A Novel Megabat Optimized Intelligent Intrusion Detection System

In Wireless Sensor Networks’, Journal of Intelligent Automation and Soft Computing, Tech

Science Press, vol. 35, no. 1, pp. 475-490.

Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,

"Multi-Objective Genetic Algorithms for Secure Routing and Data Privacy in IoT Networks",

International Journal of Communication Networks and Information Security (IJCNIS), (2020),

(3), 632–643.

D. E. Baraneetharan, “Role of machine learning algorithms intrusion detection in WSNs: A

survey,” Journal of Information Technology and Digital World, vol. 2, no. 3, pp. 161–173, 2020.

F. A. Khan, A. Gumaci, A. Derhab and A. Hussain, "TSDL: A Two- Stage Deep Learning Model

for Efficient Network Intrusion Detection", IEEE Access, vol. 7. pp. 30373-30385, 2019.

S. Jiang, J. Zhao and X. Xu, “SLGBM: An intrusion detection mechanism for wireless sensor

networks in smart environments,” IEEE Access, vol. 8, pp. 169548–169558, 2020.

Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial

intelligence‐based techniques. Expert Systems, 39(9), e13066.

Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A

Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",

International Journal on Recent and Innovation Trends in Computing and Communication, ISSN:

-8169 Volume: 11 Issue: 3.

Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.

(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in

IoT Systems. International Journal of Communication Networks and Information Security

(IJCNIS), 13(3), 582–595.

Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm

Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection",

International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s), 941.

Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization

Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2, September,

Habeeb, M. S. (2024). Predictive analytics and cybersecurity. Intelligent Techniques for Predictive

Data Analytics, 151-169.

hakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path

planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning

and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).

M. Mukhedkar, D. Rohatgi, V.A. Vuyyuru, K.V.S.S. Ramakrishna, Y.A. Baker El-Ebiary, V.A.

Asir Daniel, "Feline wolf net: A hybrid lion-grey wolf optimization deep learning model for

ovarian cancer detection", Int. J. Adv. Comput. Sci. Appl., 14 (9) (2023)

Downloads.

Published

2025-11-03

How to Cite

INTRUSION DETECTION SYSTEM USING WSN NOVEL DT, RF, AND MLP ALGORITHMS. (2025). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 3(4), 76-83. https://doi.org/10.65009/3gndhq65