Volume 15 , Issue 1 , PP: 180-195, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
P. Sherubha 1 , Mohammed Iqbal 2 * , Aileen Chris 3 , Arivazhagi 4 , Nandhagopal Subramani 5
Doi: https://doi.org/10.54216/FPA.150114
The adversarial machine learning approaches are modelled to provide a defence mechanism during the prediction of cloning and jamming attacks launched over the wireless communication process. The transmitter is supplied with a pre-trained classifier to analyze the status of the channel based on the sensing nature and determine the other transmission process. The learning method gathers all acknowledgements and fusion made between nodes and the channel's current state to build a learning model that can accurately identify the succeeding transmission constraint caused by network jamming. In this instance, compared to random jamming procedures, an inventive anti-clone detection strategy aims to minimize the number of clones and jamming found throughout the network model. The transmitter analyzes the power restrictions over the sensor networks using the learning-based fisher score (FS). Here, an adversarial network model (ANM-FS) is fused to diminish the computational time to collect the training dataset by examining the incoming samples. With this defence mechanism, the transmitter intends to predict the false prediction rate (FPR) and design a better model for providing a reliable classifier. Systematically, the transmitter identifies the floating of attacks over the network model and adopts the defending mechanism to mislead the injected clone, enhancing the throughput and reducing the prediction error.
Wireless Sensor Networks , clone , jamming , adversarial network model , fisher score , classifier
[1] Y. LeCun, Y. Bengio, and G. Hinton, ‘‘Deep learning,’’ Nature, vol. 521, no. 7553, pp. 436–444, May 2015.
[2] Reddy, Y. Ramadevi, and K. V. N. Sunitha, ‘‘Effective discriminant function for intrusion detection using SVM,’’ in Proc. Int. Conf. Adv. Comput., Commun. Inform. (ICAC), Sep. 2016, pp. 1148–1153.
[3] Ingre and A. Yadav, ‘‘Performance analysis of NSL-KDD dataset using ANN,’’ in Proc. Int. Conf. Signal Process. Commun. Eng. Syst., Jan. 2015, pp. 92–96.
[4] Farnaaz and M. A. Jabbar, ‘‘Random forest modelling for network intrusion detection system,’’ Procedia Comput. Sci., vol. 89, pp. 213–217, Jan. 2016.
[5] Khan and N. Jain, ‘‘A survey on intrusion detection systems and classification techniques,’’ Int. J. Sci. Res. Sci., Eng. Technol., vol. 2, no. 5, pp. 202–208, 2016
[6] Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ''Deep learning approach for network intrusion detection in software-defined networking,'' Proc. Int. Conf. Wireless Netw. Mobile Commun. (WINCOM), Oct. 2016, pp. 258–263.
[7] Ashfaq, X.-Z. Wang, J. Z. Huang, H. Abbas, and Y.-L. He, ''Fuzziness based semi-supervised learning approach for an intrusion detection system,'' Inf. Sci., vol. 378, pp. 484–497, Feb. 2017.
[8] Ashfaq, X.-Z. Wang, J. Z. Huang, H. Abbas, and Y.-L. He, ''Fuzziness based semi-supervised learning approach for an intrusion detection system,'' Inf. Sci., vol. 378, pp. 484–497, Feb. 20
[9] Chang, W. Li, and Z. Yang, "Network intrusion detection based on random forest and support vector machine," Proc. IEEE Int. Conf. Comput. Sci. Eng./IEEE Int. Conf. Embedded Ubiquitous Comput., Jul. 2017, pp. 635–638
[10] Zhao, R. Yan, Z. Chen, K. Mao, P. Wang, and R. X. Gao, “Deep learning and its applications to machine health monitoring: A survey,” Submitted to IEEE Trans. Neural Netw. Learn. Syst., 2016. [Online]. Available: http://arxiv.org/abs/1612.07640
[11] Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.-A. Manzagol, “Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion,” J. Mach. Learn. Res., vol. 11, pp. 3371–3408, 2010.
[12] you, Y. Li, Y. Wang, J. Zhang, and Y. Yang, "A deep learning-based RNNs model for automatic security audit of short messages," in Proc. 16th Int. Symp. Commun. Inf. Technol., Qingdao, China, Sep. 2016, pp. 225–229.
[13] Alrawashdeh and C. Purdy, “Toward an online anomaly intrusion detection system based on deep learning,” in Proc. 15th IEEE Int. Conf. Mach. Learn. Appl., Anaheim, CA, USA, Dec. 2016, pp. 195–200
[14] Potluri and C. Diedrich, "Accelerated deep neural networks for an enhanced intrusion detection system," Proc. IEEE 21st Int. Conf. Emerg. Technol. Factory Autom., Berlin, Germany, Sep. 2016, pp. 1–8.
[15] Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep learning approach for network intrusion detection in software-defined networking," Proc. Int. Conf. Wireless Netw. Mobile Commun., Oct. 2016, pp. 258–263
[16] Hodo, X. J. A. Bellekens, A. Hamilton, C. Tachtatzis, and R. C. Atkinson, Shallow and deep networks intrusion detection system: A taxonomy and survey, Submitted to ACM Survey, 2017, [Online]. Available: http://arxiv.org/abs/1701.02145
[17] Kim, G., Yi, H., Lee, J., Paek, Y., Yoon, S.: Lstm-based system-call language modelling and robust ensemble method for designing host-based intrusion detection systems. arXiv preprint arXiv:1611.01726 (2016)
[18] Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials 18(2) (2016) 1153–1176
[19] Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), New York, NY, USA. Volume 35. (2015) 2126
[20] Safa Otoum, Burak Kantarci, and Hussein T. Mouftah, “Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures,” in 2018 IEEE International Conference on Communications (ICC), May 2018, pp. 1–6
[21] Arnaldo Gouveia and Miguel Correia, A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection, vol. 10305, 05 2017.
[22] Beigh and M. A. Peer, “Performance evaluation of different intrusion detection system: An empirical approach,” in Intl Conf. on Computer Communication and Informatics, Jan 2014, pp. 1–7.
[23] Zhou W., Wen J., Koh Y., Xiong Q., Gao M., Dobbie G., Alam S. (2015), “Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis” PLoS One, July, 10(7), p.e0130968
[24] Kumari T., Bedi P. (2017), “A Comprehensive Study of Shilling Attacks in Recommender Systems”, IJCSI International Journal of Computer Science Issues, 14(4), 44-50
[25] Cao, J., Wu, Z., Mao, B. & Zhang, Y (2013). “Shilling attack detection utilizing semi-supervised learning method for attack detection utilizing semi-supervised learning method for collaborative recommender system”. World Wide Web Jornal, 16(5-6): 729-748.
[26] Yu H, Gao R, Wang K, Zhang F (2017), “A novel robust recommendation method based on kernel matrix factorization”. J Intell Fuzzy Syst 32(3):2101–2109
[27] Yang Z., Cai Z. (2017), “Detecting abnormal profiles in collaborative filtering recommender systems”. Journal of Intelligent Information Systems, 48(3), 499-518
[28] Zhou W., Wen J., Qu Q., Zeng J., Cheng T. (2018), “Shilling attack detection for recommender systems based on credibility of group users and rating time series”, PLoS One, May, 13(5), p.e0196533
[29] Turk A., Bilge A., (2019). “Robustness analysis of multi-criteria collaborative filtering algorithms against shilling attacks”, Expert Systems with Applications, 115, p.386-402
[30] Moradi P., Ahmadian S., (2015), “A reliability-based recommendation method to improve trust-aware recommender systems”, Expert Systems with Applications, 42, 7386-7389.
[31] Paradarami, N.D. Bastian, J.L. Wightman, “A Hybrid recommender system using artificial neural networks”, Expert Systems with Applications, Vol. 83, (2017), 300-313.
[32] Agar ap, ''A neural network architecture combines gated recurrent unit (GRU) and support vector machine (SVM) for intrusion detection in network traffic data,'' Proc. 10th Int. Conf. Mach. Learn. Comput., Feb. 2018, pp. 26–30.
[33] Around, M.-A. El Hussaini, A. El Hore, and J. Ben-Othman, ''Real-time detection of MAC layer misbehaviour in mobile ad hoc networks,’’ Appl. Comput. Information., vol. 13, no. 1, pp. 1–9, 2017.