26
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Optimized Ensemble Learning Models Based on Clustering and Hybrid Deep Learning for Wireless Intrusion Detection

ORCID Icon, ORCID Icon &

REFERENCES

  • S. Gavel, A. S. Raghuvanshi, and S. Tiwari, “A novel density estimation-based intrusion detection technique with Pearson’s divergence for wireless sensor networks,” ISA Trans., Vol. 111, pp. 180–91, May 2021. DOI: 10.1016/j.isatra.2020.11.016.
  • L. Hong, C. Zhong, A. Alnusair, and S. R. Islam, “FAIXID: A framework for enhancing AI explainability of intrusion detection results using data cleaning techniques,” J. Netw. Syst. Manage., Vol. 29, no. 4, pp. 1, May 2021. DOI: 10.1007/s10922-021-09606-8.
  • C. Tang, P. Liu, T. Shensheng, and X. Yi, “Anomaly intrusion behavior detection based on fuzzy clustering and features selection,” J. Comput. Res. Dev., Vol. 52, no. 3, pp. 718, Mar. 2015. DOI: 10.7544/issn1000-1239.2015.20130601.
  • J. Zhang, M. Zulkernine, and A. Haque, “Random-forests-based network intrusion detection systems,” IEEE Trans. Syst. Man Cybern., Vol. 38, no. 5, pp. 649–59, Sep. 2008. DOI: 10.1109/TSMCC.2008.923876.
  • R. C. De Amorim, and B. Mirkin, “Minkowski metric, feature weighting and anomalous cluster initializing in K-means clustering,” Pattern Recognit., Vol. 45, no. 3, pp. 1061–75, Mar. 2012. DOI: 10.1016/j.patcog.2011.08.012.
  • K. V. Leung, and C. Leckie. “Unsupervised anomaly detection in network intrusion detection using clusters,” in Proc 28th Australasian CS Conf, Jan. 2005, pp. 333–42, [Online]. Available: http://crpit.com/confpapers/CRPITV38Leung.pdf.
  • P. Sun, et al., “DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system,” Sec. Commun. Netw., Vol. 2020, pp. 1–11, Aug. 2020. DOI: 10.1155/2020/8890306.
  • S. Hochreiter, and J. Schmidhuber, “Long short-term memory,” Neural Comput., Vol. 9, no. 8, pp. 1735–80, Nov. 1997. DOI: 10.1162/neco.1997.9.8.1735.
  • C. Xu, J. Shen, X. Du, and F. Zhang, “An intrusion detection system using a deep neural network with gated recurrent units,” IEEE. Access., Vol. 6, pp. 48697–707, Jan. 2018. DOI: 10.1109/ACCESS.2018.2867564.
  • Y. LeCun, et al., “Handwritten digit recognition with a back-propagation network,” Neural Inf. Process. Syst., Vol. 2, pp. 396–404, Jan. 1989. [Online]. Available: http://papers.nips.cc/paper/293-handwritten-digit-recognition-with-a-back-propagation-network.pdf.
  • A. H. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, “CNN-LSTM: Hybrid deep neural network for network intrusion detection system,” IEEE. Access., Vol. 10, pp. 99837–49, Jan. 2022. DOI: 10.1109/ACCESS.2022.3206425.
  • N. Thockchom, M. M. Singh, and U. Nandi, “A novel ensemble learning-based model for network intrusion detection,” Complex Intell. Syst., Vol. 9, pp. 5693–5714, 2023. DOI: 10.1007/s40747-023-01013-7.
  • J. Guan, and D. Liu, “Unsupervised anomaly detection based on principal components analysis,” J. Comput. Res. Dev., Vol. 9, pp. 1474–80, 2004.
  • K. Maheswari, C. Siva, and G. N. Priya, “An optimal cluster based intrusion detection system for defence against attack in web and cloud computing environments,” Wirel. Pers. Commun., Vol. 128, no. 3, pp. 2011–37, Sep. 2022. DOI: 10.1007/s11277-022-10030-7.
  • W. Ting, W. Na, C. Yunpeng, and L. Huan, “The optimization method of wireless network attacks detection based on semi supervised learning,” J. Comput. Res. Dev., Vol. 57, no. 4, pp. 791–802, 2020.
  • M. Nivaashini, and P. Thangaraj, “Computational intelligence techniques for automatic detection of Wi-Fi attacks in wireless IoT networks,” Wirel. Netw., Vol. 27, no. 4, pp. 2761–84, Apr. 2021. DOI: 10.1007/s11276-021-02594-2.
  • K. Kim, M. E. Aminanto, and H. C. Tanuwidjaja. Network Intrusion Detection Using Deep Learning: A Feature Learning Approach. Springer, 2018. pp. 47–68.
  • S. Wang, B. Li, M. Yang, and Z. Yan. “Intrusion detection for WiFi network: A deep learning approach,” in International Wireless Internet Conference Springer, Cham, 2018, pp. 95–104.
  • F. D. Vaca, and Q. Niyaz. “An ensemble learning based wi-fi network intrusion detection system (wnids),” in 2018 IEEE 17th international symposium on network Computing and Applications (NCA) IEEE, 2018, pp. 1–5.
  • U. S. K. P. M. Thanthrige, J. Samarabandu, and X. Wang. “Machine learning techniques for intrusion detection on public dataset,” in IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2016.
  • C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, “Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset,” IEEE Commun. Surv. Tutor., Vol. 18, no. 1, pp. 184–208, Jan. 2016. DOI: 10.1109/COMST.2015.2402161.
  • M. E. Aminanto, and K. Kim. “Detecting impersonation attack in WiFi networks using deep learning approach,” in Post-Proc. Of WISA 2016, Jeju, Korea (To appear in LNCS by Springer), 2016.
  • S. Radha, and S. Rajkumar, “Enhanced intrusion detection algorithm for NTP based routing protocol for wireless Ad Hoc networks,” IETE. J. Res., Vol. 51, no. 5, pp. 353–9, 2005. DOI: 10.1080/03772063.2005.11416415.
  • D. Kshirsagar, and S. Kumar, “Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques,” Cyber-Phys. Syst., Vol. 9, no. 3, pp. 244–59, 2023. DOI: 10.1080/23335777.2021.2023651.
  • G. Rohini, C. Gnana Kousalya, and J. Bino, “Intrusion detection system with an ensemble learning and feature selection framework for IoT networks,” IETE. J. Res., Vol. 69, no. 12, pp. 8859–75, 2023. DOI: 10.1080/03772063.2022.2098187.
  • D. E. Denning, “An intrusion-detection model,” IEEE Trans. Software Eng., Vol. SE-13, no. 2, pp. 222–32, Feb. 1987. DOI: 10.1109/TSE.1987.232894.
  • J. V. Anand Sukumar, I. Pranav, M. Neetish, and J. Narayanan. “Network intrusion detection using improved genetic k-means algorithm,” in 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018. DOI: 10.1109/icacci.2018.8554710.
  • T. Ma, W. Fen, J. Cheng, Y. Yu, and X. Chen, “A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks,” Sensors, Vol. 16, no. 10, pp. 1701, Oct. 2016. DOI: 10.3390/s16101701.
  • D. Nikolov, I. Kordev, and S. Stefanova. “Concept for network intrusion detection system based on recurrent neural network classifier,” in IEEE XXVII International Scientific Conference Electronics-ET, Sep. 2018. DOI: 10.1109/et.2018.8549584.
  • S. Jayaprakash, and K. Kandasamy. “Database intrusion detection system using octraplet and machine learning,” in Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Apr. 2018. DOI: 10.1109/icicct.2018.8473029.
  • Z. Chkirbene, A. Erbad, R. Hamila, A. Mohamed, M. Guizani, and M. Hamdi, “TIDCS: A dynamic intrusion detection and classification system-based feature selection,” IEEE. Access., Vol. 8, pp. 95864–77, Jan. 2020. DOI: 10.1109/ACCESS.2020.2994931.
  • S. M. Erfani, S. Rajasegarar, S. Karunasekera, and C. Leckie, “High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning,” Pattern Recognit., Vol. 58, pp. 121–34, Oct. 2016. DOI: 10.1016/j.patcog.2016.03.028.
  • Y. Dong, R. Wang, and J. He. “Real-time network intrusion detection system based on deep learning,” in IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), Oct. 2019. DOI: 10.1109/icsess47205.2019.9040718.
  • M. Hanselmann, T. Strauss, K. Dormann, and H. Ulmer, “CANET: An unsupervised intrusion detection system for high dimensional CAN bus data,” IEEE. Access., Vol. 8, pp. 58194–205, Jan. 2020. DOI: 10.1109/ACCESS.2020.2982544.
  • R. U. Khan, X. Zhang, M. Alazab, and R. Kumar. “An improved convolutional neural network model for intrusion detection in networks,” in Cybersecurity and Cyberforensics Conference (CCC), May 2019. DOI: 10.1109/ccc.2019.000-6.
  • A. Y. Javaid, Q. Niyaz, W. Sun, and M. S. Alam. “A deep learning approach for network intrusion detection system,” in 9th EAI Int. Conf. BioInspired Inf. Commun. Technol. (BIONETICS), Jan. 2016. DOI: 10.4108/eai.3-12-2015.2262516.
  • R. Vijayanand, and D. Devaraj, “A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network,” IEEE. Access., Vol. 8, pp. 56847–54, Jan. 2020. DOI: 10.1109/ACCESS.2020.2978035.
  • S. M. Kasongo, and Y. Sun, “A deep learning method with wrapper based feature extraction for wireless intrusion detection system,” Comput. Secur., Vol. 92, pp. 101752, May 2020. DOI: 10.1016/j.cose.2020.101752.
  • B. A. Tama, M. Comuzzi, and K.-H. Rhee, “TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system,” IEEE. Access., Vol. 7, pp. 94497–507, Jan. 2019. DOI: 10.1109/ACCESS.2019.2928048.
  • X. Li, W. Chen, Q. Zhang, and L. Wu, “Building auto-encoder intrusion detection system based on random forest feature selection,” Comput. Secur., Vol. 95, pp. 101851, Aug. 2020. DOI: 10.1016/j.cose.2020.101851.
  • T. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, “BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset,” IEEE. Access., Vol. 8, pp. 29575–85, Jan. 2020. DOI: 10.1109/ACCESS.2020.2972627.
  • Y. Shen, K. Zheng, C. Wu, M. Zhang, X. Niu, and Y. Yang, “An ensemble method based on selection using bat algorithm for intrusion detection,” Comput. J., Vol. 61, no. 4, pp. 526–38, Oct. 2017. DOI: 10.1093/comjnl/bxx101.
  • S. Naseer, et al., “Enhanced network anomaly detection based on deep neural networks,” IEEE. Access., Vol. 6, pp. 48231–46, Jan. 2018. DOI: 10.1109/ACCESS.2018.2863036.
  • “Keras Python library: the Python deep learning library [Online],” Available: https://keras.io/.
  • C.-T. Hsu, H.-Y. Hsieh, S. W. Prakosa, M. Azhari, and J.-S. Leu. “Using long-short-term memory based convolutional neural networks for network intrusion detection,” in Lecture Notes in Computer Science, 2019, pp. 86–94. DOI: 10.1007/978-3-030-06158-6_9.
  • Z. Li, A. L. G. Rios, G. Xu, and L. Trajkovic. “Machine learning techniques for classifying network anomalies and intrusions,” in IEEE Int. Symposium on Circuits and Sys., ISCAS, May 2019. DOI: 10.1109/iscas.2019.8702583.
  • H. Rajadurai, and U. D. Gandhi, “A stacked ensemble learning model for intrusion detection in wireless network,” Neural Comput. Appl., Vol. 34, no. 18, pp. 15387–95, May 2020. DOI: 10.1007/s00521-020-04986-5.
  • N. Satheesh, et al., “Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network,” Microprocess. Microsyst., Vol. 79, pp. 103285, Nov. 2020. DOI: 10.1016/j.micpro.2020.103285.
  • N. B. Singh, M. M. Singh, A. Sarkar, and J. K. Mandal, “A novel wide & deep transfer learning stacked GRU framework for network intrusiondetection,” J. Inform. Security Appl., Vol. 61, pp. 102899, 2021.
  • S. Manimurugan, M. Al-Qdah, M. Mohmmed, C. Narmatha, and R. Varatharajan, “Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system,” Microprocess. Microsyst., Vol. 79, pp. 103261, Nov. 2020. DOI: 10.1016/j.micpro.2020.103261.
  • H. Benmeziane. “Comparison of deep learning frameworks and compilers,” M.S. thesis, Dept. Comput. Sci., École Nationale Supérieured’ Informatique, Oued Smar, Algeria, 2020.
  • Y. LeCun, Y. Bengio, and G. E. Hinton, “Deep learning,” Nature, Vol. 521, no. 7553, pp. 436–44, May 2015. DOI: 10.1038/nature14539.
  • I. Goodfellow, Y. Bengio, and A. Courville. “Deep learning,” 2016. [Online]. Available: https://dl.acm.org/citation.cfm?id=3086952.
  • I. T. Jolliffe. Principal component analysis. encyclopaedia of statistics in behavioural science. John Wiley & Sons, Ltd., 2005. DOI: 10.1002/9781118445112.stat06472.
  • K. Maheswari, C. Siva, and G. N. Priya, “An optimal cluster-based intrusion detection system for defence against attack in web and cloud computing environments,” Wirel. Pers. Commun., Vol. 128, no. 3, pp. 2011–37, Sep. 2022. DOI: 10.1007/s11277-022-10030-7.
  • K. Sechidis, G. Tsoumakas, and I. Vlahavas. “On the stratification of multi-label data,” in Springer eBooks, 2011, pp. 145–58. DOI: 10.1007/978-3-642-23808-6_10.
  • W. Li, P. Yi, Y. Wu, L. Pan, and J. Li, “A new intrusion detection system based on KNN classification algorithm in wireless sensor network,” J. Electric. Comput. Eng., Vol. 2014, pp. 1–8, Jan. 2014. DOI: 10.1155/2014/240217.
  • M. K. Putchala. “Deep learning approach for intrusion detection system (IDS) in the internet of things (IoT) network using gated recurrent neural networks (GRU),” M.S. Thesis, Dept. Comput. Sci. Eng., Wright State Univ., Dayton, OH, USA, Jan. 2017, [Online]. Available: https://corescholar.libraries.wright.edu/cgi/viewcontent.cgi?article=2989&context=etd_all.
  • K. Lang, E. Liberty, and K. Shmakov. “Stratified sampling meets machine learning,” in International Conference on Machine Learning, Jun. 2016, pp. 2320–9, [Online]. Available: http://jmlr.org/proceedings/papers/v48/liberty16.pdf.
  • T. O. Malley, E. Bursztein, J. Long, F. Chollet, H. Jin, and L. Invernizzi. “Hyperparameter tuning with Keras Tuner,” 2019. [Online]. Available: https://github.com/keras-team/keras-tuner (accessed on 8 January 2023).
  • H. Alkahtani, and T. H. H. Aldhyani, “Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms,” Complexity, Vol. 2021, pp. 1–18, Jul. 2021. DOI: 10.1155/2021/5579851.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.