Stochastic Gradient Descent Intrusions Detection for Wireless Sensor Network Attack Detection System Using Machine Learning

被引:6
|
作者
Saleh, Hadeel M. [1 ]
Marouane, Hend [2 ]
Fakhfakh, Ahmed [3 ]
机构
[1] Univ Anbar, Continuing Educ Ctr, Ramadi 31006, Iraq
[2] Safax Univ, Natl Sch Elect & Telecommun, NTSCOM Lab, ENETCOM, Sfax 3029, Tunisia
[3] Digital & Numer Res Ctr Safax CRNS, Sfax 3029, Tunisia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Intrusion detection; wireless sensor network; machine learning; accuracy; Internet of Things;
D O I
10.1109/ACCESS.2023.3349248
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Communication in cyber-physical systems relies heavily on Wireless Sensor Networks (WSNs), which have numerous uses including ambient monitoring, object recognition, and data transmission. However, they are vulnerable to cyberattacks because they are connected to the IoT. In order to combat the difficulties associated with WSN intrusion detection, this research employs machine learning techniques, notably the Gaussian Nave Bayes (GNB) and Stochastic Gradient Descent (SGD) algorithms. The effectiveness of recommendation systems is improved with the introduction of context awareness. To lessen the burden on the computer, we first do a principal component analysis and singular value decomposition on the raw traffic data. On the WSN-DS dataset, the suggested SG-IDS model achieved a 96% accuracy rate, outperforming state-of-the-art algorithms with higher rates of 98% accuracy, 96% recall, and 97% F1 measurement. In an evaluation of an IoMT dataset, the SG-IDS performed admirably, with an accuracy of 0.87 and a precision of 1.00 in intrusion detection tasks.
引用
收藏
页码:3825 / 3836
页数:12
相关论文
共 50 条
  • [1] A Heirarichal OLSR Wireless Sensor Network Attack Detection using Machine Learning Approach
    Karpagam Academy of Higher Education, Department of Computer Science and Engineering, Coimbatore, India
    [J]. Proc. Int. Conf. Appl. Artif. Intell. Comput., ICAAIC, 1600, (1206-1211):
  • [2] Routing Protocol Attack Detection Using Machine Learning Through Parallel Computing in Wireless Sensor Network
    Kumar, Mithun P. K.
    Hossain, Al Amin
    Al Majmaie, Sufian
    Amsaad, Fathi
    [J]. 2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [3] Machine learning attack detection based-on stochastic classifier methods for of in wireless sensor networks
    Affane, M. Anselme R.
    Satori, Hassan
    [J]. AD HOC NETWORKS, 2024, 163
  • [4] Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks
    Anselme Russel Affane Moundounga
    Hassan Satori
    [J]. Journal of Network and Systems Management, 2024, 32
  • [5] Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks
    Moundounga, Anselme Russel Affane
    Satori, Hassan
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (01)
  • [6] Anomaly detection in wireless sensor network using machine learning algorithm
    Poornima, I. Gethzi Ahila
    Paramasivan, B.
    [J]. COMPUTER COMMUNICATIONS, 2020, 151 : 331 - 337
  • [7] Attack Detection for Wireless Enterprise Network: a Machine Learning Approach
    Qin, Yinuo
    Li, Bo
    Yang, Mao
    Yan, Zhongjiang
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2018,
  • [8] Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models
    Affane, M. Anselme R.
    Satori, Hassan
    Boutazart, Youssef
    Ezzine, Abderahim
    Satori, Khalid
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, 135 (04) : 1965 - 1992
  • [9] Jamming attack detection and countermeasures in wireless sensor network using ant system
    Muraleedharan, Rajani
    Osadciw, Lisa Ann
    [J]. WIRELESS SENSING AND PROCESSING, 2006, 6248
  • [10] Detection of Sinkhole Attack in Wireless Sensor Network
    Raju, Imandi
    Parwekar, Pritee
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 629 - 636