DOI QR코드

DOI QR Code

Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network

  • Shyam Sundar S (College of Engineering Guindy, Anna University) ;
  • R.S. Bhuvaneswaran (College of Engineering Guindy, Anna University) ;
  • SaiRamesh L (St. Joseph's Institute of Technology)
  • Received : 2022.08.15
  • Accepted : 2024.07.29
  • Published : 2024.08.31

Abstract

Wireless sensor network (WSN) consists of large number of sensor nodes that are deployed in geographical locations to collect sensed information, process data and communicate it to the control station for further processing. Due the unfriendly environment where the sensors are deployed, there exist many possibilities of malicious nodes which performs malicious activities in the network. Therefore, the security threats affect performance and life time of sensor networks, whereas various security aspects are there to address security issues in WSN namely Cryptography, Trust Management, Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS). However, IDS detect the malicious activities and produce an alarm. These malicious activities exploit vulnerabilities in the network layer and affect all layers in the network. Existing feature selection methods such as filter-based methods are not considering the redundancy of the selected features and wrapper method has high risk of overfitting the classification of intrusion. Due to overfitting, the classification algorithm fails to detect the intrusion in better manner. The main objective of this paper is to provide the efficient feature selection algorithm which was suitable for any type classification algorithm to detect the intrusion in an effective manner. This paper, the security of the network is addressed by proposing Feature Selection Algorithm using Chi Squared with Ensemble Method (FSChE). The proposed scheme employs the combination of decision tree along with the random forest classification algorithm to form ensemble classifier. The experimental results justify the feasibility of the proposed scheme in terms of attack detection, packet delivery ratio and time analysis by employing NSL KDD cup data Set. The obtained results shows that the proposed ensemble method increases the overall performance by 10% to 25% with respect to mentioned parameters.

Keywords

References

  1. S. Rajasoundaran, S. V. N. Santhosh Kumar, M. Selvi, S. Ganapathy, R. Rakesh, A. Kannan, "Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks," Wireless Networks, vol.27, no.7, pp.4513-4534, 2021.
  2. S. V. N. Santhosh Kumar, Y. Palanichamy, M. Selvi, S. Ganapathy, A. Kannan, S. P. Perumal, "Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks," Wireless Networks, vol.27, pp.3873-3894, 2021.
  3. M. Selvi, K. Thangaramya, S. Ganapathy, K. Kulothungan, H. K. Nehemiah, A. Kannan, "An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks," Wireless Personal Communications, vol.105, pp.1475-1490, 2019.
  4. K. Thangaramya, K. Kulothungan, S. I. Gandhi, M. Selvi, S. V. N. Santhosh Kumar, K. Arputharaj, "Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN," Soft Computing, vol.24, pp.16483-16497, 2020.
  5. J. P. Anderson, "Computer Security threat monitoring and surveillance," Technical Report, James P. Anderson company, 1980. 
  6. I. Martins, J. S. Resende, P. R. Sousa, S. Silva, L. Antunes, and J. Gama, "Host-based IDS: A review and open issues of an anomaly detection system in IoT," Future Generation Computer Systems, vol.133, pp.95-113, 2022. 
  7. C.-M. Ou, "Host-based Intrusion Detection Systems inspired by Machine Learning of Agent-based Artificial Immune Systems," in Proc. of IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA), pp.1-5, 2019.
  8. S. Raj, K. N. Singh, N. K. Gupta, R. Nigam, B. Verma, S. Karsoliya, "High Accuracy of Hybrid IDS System using Evidence Theory and SVM ML Technique," in Proc. of 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp.1261-1264, 2021.
  9. W. T. Yue, M. Cakanyildirim, "A cost-based analysis of intrusion detection system configuration under active or passive response," Decision Support Systems, vol.50, no.1, pp.21-31, 2010.
  10. I. Dutt, S. Borah, and I. K. Maitra, "Immune System Based Intrusion Detection System (IS-IDS): A Proposed Model," IEEE Access, vol.8, pp.34929-34941, 2020.
  11. S. Ganapathy, K. Kulothungan, S. Muthurajkumar, M. Vijayalakshmi, P. Yogesh, A. Kannan, "Intelligent feature selection and classification techniques for intrusion detection in networks: a survey," EURASIP Journal on Wireless Communications and Networking, vol.2013, no.1, 2013. 
  12. S. Murugesan, R. S. Bhuvaneswaran, H. Khanna Nehemiah, S. Keerthana Sankari, Y. Nancy Jane, "Feature Selection and Classification of Clinical Datasets Using Bioinspired Algorithms and Super Learner," Computational and Mathematical Methods in Medicine, vol.2021, pp.1-18, 2021.
  13. V. R. Elgin Christo, H. Khanna Nehemiah, B. Minu, and A. Kannan, "Correlation-Based Ensemble Feature Selection Using Bioinspired Algorithms and Classification Using Backpropagation Neural Network," Computational and Mathematical Methods in Medicine, vol. 2019, 2019.
  14. S. Sinha, A. Paul, "Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network," Wireless Personal Communications, vol.114, pp.835-851, 2020.
  15. M. Riecker, S. Biedermann, M. Hollick, "Lightweight energy consumption based intrusion detection system for wireless sensor networks," in Proc. of SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp.1784-1791, 2013. 
  16. P. Nancy, S. Muthurajkumar, S. Ganapathy, S.V.N. Santhosh Kumar, M. Selvi, K. Arputharaj, "Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks," IET Communications, vol.14, no.5, pp.888-895, 2020. 
  17. F. A. Khan, A. Gumaei, A. Derhab, and A. Hussain, "A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection," IEEE Access, vol.7, pp.30373-30385, 2019.
  18. A. Khraisat, I. Gondal, P. Vamplew and J. Kamruzzaman, "Survey of intrusion detection systems: techniques, datasets and challenges," Cybersecurity, vol.2, 2019. 
  19. H. S. Hota and A. K. Shrivas, "Decision Tree Techniques Applied on NSL-KDD Data and Its Comparison with Various Feature Selection Techniques," in Proc. of Advanced Computing, Networking and Informatics, Smart Innovation, Systems and Technologies, vol.27, pp.205-211, 2014. 
  20. D. H. Deshmukh, T. Ghorpade, P. Padiya, "Intrusion detection system by improved preprocessing methods and Naive Bayes classifier using NSL-KDD 99 Dataset," in Proc. of 2014 International Conference on Electronics and Communication Systems (ICECS), pp.1-7, 2014.
  21. M. S. Pervez, and D. Md. Farid, "Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs," in Proc. of the 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), pp.1-6, 2014.
  22. N. Paulauskas, J. Auskalnis, "Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset," in Proc. of 2017 Open Conference of Electrical, Electronic and Information Sciences (eStream), pp.1-5, 2017.
  23. C. Yin, Y. Zhu, J. Fei, and X. He, "A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks," IEEE Access, vol.5, pp.21954-21961, 2017.
  24. S. T. Ikram, A. K. Cherukuri, "Intrusion detection model using fusion of chi-square feature selection and multi class SVM," Journal of King Saud University - Computer and Information Sciences, vol.29, no.4, pp.462-472, 2017.
  25. E. Tufan, C. Tezcan, and C. Acarturk, "Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network," IEEE Access, vol.9, pp.50078-50092, 2021.
  26. L. Hakim, R. Fatma, Novriandi, "Influence Analysis of Feature Selection to Network Intrusion Detection System Performance Using NSL-KDD Dataset," in Proc. of 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE), pp.217-220, 2019.