MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek
in WSNs
- URL: http://arxiv.org/abs/2402.13277v2
- Date: Thu, 22 Feb 2024 19:17:37 GMT
- Title: MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek
in WSNs
- Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul
Islam and Sunil Aryal
- Abstract summary: Wireless Sensor Networks (WSNs) play a pivotal role as infrastructures, encompassing both stationary and mobile sensors.
Existing intrusion detection methods for WSNs encounter challenges such as low detection rates, computational overhead, and false alarms.
We propose an innovative intrusion detection approach that integrates Machine Learning (ML) techniques with the Synthetic Minority Oversampling Technique Tomek Link (SMOTE-TomekLink) algorithm.
This blend synthesizes minority instances and eliminates Tomek links, resulting in a balanced dataset that significantly enhances detection accuracy in WSNs.
- Score: 3.887356044145916
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Wireless Sensor Networks (WSNs) play a pivotal role as infrastructures,
encompassing both stationary and mobile sensors. These sensors self-organize
and establish multi-hop connections for communication, collectively sensing,
gathering, processing, and transmitting data about their surroundings. Despite
their significance, WSNs face rapid and detrimental attacks that can disrupt
functionality. Existing intrusion detection methods for WSNs encounter
challenges such as low detection rates, computational overhead, and false
alarms. These issues stem from sensor node resource constraints, data
redundancy, and high correlation within the network. To address these
challenges, we propose an innovative intrusion detection approach that
integrates Machine Learning (ML) techniques with the Synthetic Minority
Oversampling Technique Tomek Link (SMOTE-TomekLink) algorithm. This blend
synthesizes minority instances and eliminates Tomek links, resulting in a
balanced dataset that significantly enhances detection accuracy in WSNs.
Additionally, we incorporate feature scaling through standardization to render
input features consistent and scalable, facilitating more precise training and
detection. To counteract imbalanced WSN datasets, we employ the SMOTE-Tomek
resampling technique, mitigating overfitting and underfitting issues. Our
comprehensive evaluation, using the WSN Dataset (WSN-DS) containing 374,661
records, identifies the optimal model for intrusion detection in WSNs. The
standout outcome of our research is the remarkable performance of our model. In
binary, it achieves an accuracy rate of 99.78% and in multiclass, it attains an
exceptional accuracy rate of 99.92%. These findings underscore the efficiency
and superiority of our proposal in the context of WSN intrusion detection,
showcasing its effectiveness in detecting and mitigating intrusions in WSNs.
Related papers
- Enhanced Convolution Neural Network with Optimized Pooling and Hyperparameter Tuning for Network Intrusion Detection [0.0]
We propose an Enhanced Convolutional Neural Network (EnCNN) for Network Intrusion Detection Systems (NIDS)
We compare EnCNN with various machine learning algorithms, including Logistic Regression, Decision Trees, Support Vector Machines (SVM), and ensemble methods like Random Forest, AdaBoost, and Voting Ensemble.
The results show that EnCNN significantly improves detection accuracy, with a notable 10% increase over state-of-art approaches.
arXiv Detail & Related papers (2024-09-27T11:20:20Z) - SIRST-5K: Exploring Massive Negatives Synthesis with Self-supervised
Learning for Robust Infrared Small Target Detection [53.19618419772467]
Single-frame infrared small target (SIRST) detection aims to recognize small targets from clutter backgrounds.
With the development of Transformer, the scale of SIRST models is constantly increasing.
With a rich diversity of infrared small target data, our algorithm significantly improves the model performance and convergence speed.
arXiv Detail & Related papers (2024-03-08T16:14:54Z) - Machine learning-based network intrusion detection for big and
imbalanced data using oversampling, stacking feature embedding and feature
extraction [6.374540518226326]
Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities.
This paper introduces a novel ML-based network intrusion detection model that uses Random Oversampling (RO) to address data imbalance and Stacking Feature Embedding (PCA) for dimension reduction.
Using the CIC-IDS 2017 dataset, DT, RF, and ET models reach 99.99% accuracy, while DT and RF models obtain 99.94% accuracy on CIC-IDS 2018 dataset.
arXiv Detail & Related papers (2024-01-22T05:49:41Z) - Performance evaluation of Machine learning algorithms for Intrusion Detection System [0.40964539027092917]
This paper focuses on intrusion detection systems (IDSs) analysis using Machine Learning (ML) techniques.
We analyze the KDD CUP-'99' intrusion detection dataset used for training and validating ML models.
arXiv Detail & Related papers (2023-10-01T06:35:37Z) - Shi-NeSS: Detecting Good and Stable Keypoints with a Neural Stability
Score [73.91231776658375]
We build on the principled and localized keypoints provided by the Shi detector and perform their selection using the keypoint stability score regressed by the neural network.
We evaluate Shi-NeSS on HPatches, ScanNet, MegaDepth and IMC-PT, demonstrating state-of-the-art performance and good generalization on downstream tasks.
arXiv Detail & Related papers (2023-07-03T14:50:14Z) - Signal Detection in MIMO Systems with Hardware Imperfections: Message
Passing on Neural Networks [101.59367762974371]
In this paper, we investigate signal detection in multiple-input-multiple-output (MIMO) communication systems with hardware impairments.
It is difficult to train a deep neural network (DNN) with limited pilot signals, hindering its practical applications.
We design an efficient message passing based Bayesian signal detector, leveraging the unitary approximate message passing (UAMP) algorithm.
arXiv Detail & Related papers (2022-10-08T04:32:58Z) - An Online Ensemble Learning Model for Detecting Attacks in Wireless
Sensor Networks [0.0]
We develop an intelligent, efficient, and updatable intrusion detection system by applying an important machine learning concept known as ensemble learning.
In this paper, we examine the application of different homogeneous and heterogeneous online ensembles in sensory data analysis.
Among the proposed novel online ensembles, both the heterogeneous ensemble consisting of an Adaptive Random Forest (ARF) combined with the Hoeffding Adaptive Tree (HAT) algorithm and the homogeneous ensemble HAT made up of 10 models achieved higher detection rates of 96.84% and 97.2%, respectively.
arXiv Detail & Related papers (2022-04-28T23:10:47Z) - SignalNet: A Low Resolution Sinusoid Decomposition and Estimation
Network [79.04274563889548]
We propose SignalNet, a neural network architecture that detects the number of sinusoids and estimates their parameters from quantized in-phase and quadrature samples.
We introduce a worst-case learning threshold for comparing the results of our network relative to the underlying data distributions.
In simulation, we find that our algorithm is always able to surpass the threshold for three-bit data but often cannot exceed the threshold for one-bit data.
arXiv Detail & Related papers (2021-06-10T04:21:20Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Hybrid Model For Intrusion Detection Systems [0.0]
This project involves analysis of different machine learning algorithms used in intrusion detection systems.
After the analysis of different intrusion detection systems on both the datasets, this project aimed to develop a new hybrid model for intrusion detection systems.
arXiv Detail & Related papers (2020-03-19T05:52:29Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.