Figures & data
Figure 2. Wireless sensor networks model with clustering Nodes for data aggregation to the sink node.
![Figure 2. Wireless sensor networks model with clustering Nodes for data aggregation to the sink node.](/cms/asset/d1dfd395-945e-4bdb-9f64-5d9da793eebf/ccos_a_2246703_f0002_oc.jpg)
Figure 7. Hierarchical hybrid intrusion detection technique in wireless sensor networks using three phases of attack detection.
![Figure 7. Hierarchical hybrid intrusion detection technique in wireless sensor networks using three phases of attack detection.](/cms/asset/4ce80cfb-0b44-42fd-ac54-b645b6f3141b/ccos_a_2246703_f0007_oc.jpg)
Table 1. Summary of different hybrid techniques from previous works.
Figure 11. Jamming (a) and Sinkhole (b) attacks at the physical and network layers. (a) Jamming attacks and (b) Sink hole attacks
![Figure 11. Jamming (a) and Sinkhole (b) attacks at the physical and network layers. (a) Jamming attacks and (b) Sink hole attacks](/cms/asset/a6773a30-d438-406c-994b-89016bb2f954/ccos_a_2246703_f0011_oc.jpg)
Table 2. Frequency distribution of various attack classes in the NSL-KDD with training and testing samples for testing performance (Li et al., Citation2018).
Table 3. Provides a detailed technical description of the four types of attacks in the dataset.
Table 4. Frequency distribution of attacks in the dataset.
Table 5. The dataset's statistical distribution, based on a subset of its attributes.
Table 6. Structure of the dataset with classifications of assaults.
Figure 12. Framework for advanced hybrid intrusion detection system (AHIDS) Block diagram using attack detection and classification Model.
![Figure 12. Framework for advanced hybrid intrusion detection system (AHIDS) Block diagram using attack detection and classification Model.](/cms/asset/faa5721d-9efd-47d1-8bd1-e2030d125244/ccos_a_2246703_f0012_oc.jpg)
Figure 14. Data pre-processing, training and testing for model evaluation framework using benchmark datasets.
![Figure 14. Data pre-processing, training and testing for model evaluation framework using benchmark datasets.](/cms/asset/91d3d034-d838-45a3-ad08-84b54ee47ab4/ccos_a_2246703_f0014_oc.jpg)
Table 7. WSN configuration of simulation setting.
Figure 17. wireless sensor network deployment and routing discovery for analysing energy consumption and time elapsed. (a) Dynamic network deployment. (b) Routing discovery and feature extraction. (C) Energy consumed for nodes with time and (d) Time elapsed for each node.
![Figure 17. wireless sensor network deployment and routing discovery for analysing energy consumption and time elapsed. (a) Dynamic network deployment. (b) Routing discovery and feature extraction. (C) Energy consumed for nodes with time and (d) Time elapsed for each node.](/cms/asset/17794ec5-12ef-4afb-a8f8-11ad684bbdff/ccos_a_2246703_f0017_oc.jpg)
Figure 18. The proposed system's performance evaluation using hybrid GA-ANN takes 100 samples and varying the number of epochs. (a) Histogram with 300 instances. (b) Histogram with 300 instances. (c) Best performance ate epoch of 7 and (d) Best performance at the epoch of 100.
![Figure 18. The proposed system's performance evaluation using hybrid GA-ANN takes 100 samples and varying the number of epochs. (a) Histogram with 300 instances. (b) Histogram with 300 instances. (c) Best performance ate epoch of 7 and (d) Best performance at the epoch of 100.](/cms/asset/57d994d6-d9dd-4592-b41b-704a52da09fe/ccos_a_2246703_f0018_oc.jpg)
Table 8. Evaluation of hybrid machine learning models on standard datasets.
Table 9. Comparison of various hybrid ML models using NSL-KDD dataset for attack detection and classification.
Figure 19. Performance comparison of various machine learning models using NSL-KDD. (a) RF-based comparative analysis and (b) DT-based comparative analysis
![Figure 19. Performance comparison of various machine learning models using NSL-KDD. (a) RF-based comparative analysis and (b) DT-based comparative analysis](/cms/asset/efb5e4b5-26cc-44f1-8130-45997ffc70ee/ccos_a_2246703_f0019_oc.jpg)
Figure 20. Performance comparison of the proposed scheme-based hybrid machine learning techniques using benchmark datasets. (a) Comparison based on UNSW_NB15 and (b) Comparison-based CICIDS2017
![Figure 20. Performance comparison of the proposed scheme-based hybrid machine learning techniques using benchmark datasets. (a) Comparison based on UNSW_NB15 and (b) Comparison-based CICIDS2017](/cms/asset/6a4cf838-3053-4456-9c70-f53ddb21943a/ccos_a_2246703_f0020_oc.jpg)
Figure 21. Performance comparison of the proposed technique with other previous works. (a) Comparative analysis of the proposed scheme and (b) Comparative analysis based on recall
![Figure 21. Performance comparison of the proposed technique with other previous works. (a) Comparative analysis of the proposed scheme and (b) Comparative analysis based on recall](/cms/asset/4b47ce98-9bd7-4868-91b3-91e565ec2697/ccos_a_2246703_f0021_oc.jpg)
Figure 22. Examining the proposed system's performance of similar works using standard benchmarks. (a) Comparison of the proposed system with recent works and (b) AUC-based performance comparison using the UNSW-NB15 benchmark dataset.
![Figure 22. Examining the proposed system's performance of similar works using standard benchmarks. (a) Comparison of the proposed system with recent works and (b) AUC-based performance comparison using the UNSW-NB15 benchmark dataset.](/cms/asset/766582f2-824b-4623-a2af-691d7cacf661/ccos_a_2246703_f0022_oc.jpg)
Table 10. Performance evaluation of the proposed system using the NSL-KDD benchmark dataset.