JNACSISSN:2582-3817

Intrusion Detection System for Wireless Mesh Networks via Improved Whale Optimization

Abstract

Wireless Mesh networks (WMNs) suffers from abundant security issues because of its dynamic and open communication channels. It is thus risky to formulate an Intrusion Detection System (IDS) that could make out diverse unidentified attacks in the network. This paper intends to propose an Improved Selection of Encircling and Spiral updating position of WO (ISESW) based model for detecting the attacks in WMN systems. The adopted scheme includes two phase’s namely, Feature Selection and Classification. Initially, the features (informative features) from the given data are selected using Principal Component Analysis (PCA) model. The selected informative features are then subjected to classification process using Neural Network (NN), where the presence of attacks is classified. To make the detection more accurate, the weights of NN are fine-tuned using the ISESW algorithm, which is the improved version of WOA model. Finally, the superiority of adopted scheme is evaluated over traditional models in terms of varied measures.

References

  • Cheng-Ru Wang, Rong-Fang Xu, Shie-Jue Lee, Chie-Hong Lee, "Network intrusion detection using equality
    constrained-optimization-based extreme learning machines" Knowledge-Based Systems, vol. 147, pp. 68-801,
    May 2018.
  • Muhammet Baykara, Resul Das, “A novel honeypot based security approach for real-time intrusion detection
    and prevention systems”, Journal of Information Security and Applications, vol. 41, pp. 103-116, August 2018.
  • Tamer Aldwairi, Dilina Perera, Mark A. Novotny, “An evaluation of the performance of Restricted Boltzmann
    Machines as a model for anomaly network intrusion detection”, Computer Networks, vol. 144, pp. 111-119, 24
    October 2018.
  • Hongchun Qu, Zeliang Qiu, Xiaoming Tang, Min Xiang, Ping Wang, “Incorporating unsupervised learning into
    intrusion detection for wireless sensor networks with structural co-evolvability”, Applied Soft Computing, vol.
    71, pp. 939-951, October 2018.
  • Tarfa Hamed, Rozita Dara, Stefan C. Kremer, “Network intrusion detection system based on recursive feature
    addition and bigram technique”, Computers & Security, vol. 73, pp. 137-155, March 2018.
  • Pravendra Kumar, Sanjeev Kumar Singh Yadav,"Multi-objective optimization of electrical discharge drilling
    (EDD) process using PCA based grey relational analysis",Materials Today: Proceedings, vol.26,2020.
  • Seyedali Mirjalili,Andrew Lewisa,"The Whale Optimization Algorithm",Advances in Engineering
    Software,vol.95,pp.51-67,May 2016.
  • Yogeswaran Mohan, Sia Seng Chee, Donica Kan Pei Xin and Lee Poh Foong, "Artificial Neural Network for
    Classification of Depressive and Normal in EEG", 2016 IEEE EMBS Conference on Biomedical Engineering and
    Sciences (IECBES), 2016.
  • B. R. Rajakumar, "Impact of Static and Adaptive Mutation Techniques on Genetic Algorithm", International
    Journal of Hybrid Intelligent Systems, vol. 10, no. 1, pp.11-22, 2013.
  • B. R. Rajakumar, "Static and Adaptive Mutation Techniques for Genetic algorithm: A Systematic Comparative
    Analysis", International Journal of Computational Science and Engineering, Vol. 8, No. 2, pages: 180-193, 2013.
  • S. M. Swamy, B. R. Rajakumar and I. R. Valarmathi, “Design of Hybrid Wind and Photovoltaic Power System
    using Opposition-based Genetic Algorithm with Cauchy Mutation”, IET, Chennai, India, Dec. 2013, DOI:
    10.1049/ic.2013.0361
  • Aloysius George and B. R. Rajakumar, "APOGA: An Adaptive Population Pool Size based Genetic Algorithm",
    AASRI Procedia - 2013 AASRI Conference on Intelligent Systems and Control (ISC 2013), Vol. 4, pages: 288-296,
    2013.
  • B. R. Rajakumar and Aloysius George, "A New Adaptive Mutation Technique for Genetic Algorithm", In
    proceedings of IEEE International Conference on Computational Intelligence and Computing Research (ICCIC),
    pages: 1-7, December 18-20, Coimbatore, India, 2012, DOI: 10.1109/ICCIC.2012.6510293.
  • Erfan A. Shams, Ahmet Rizaner, Ali Hakan Ulusoy, “Trust aware support vector machine intrusion detection
    and prevention system in vehicular ad hoc networks”, Computers & Security, vol. 78, pp. 245-254, September
    2018.
  • Y. LeCun, K. Kavukvuoglu, and C. Farabet, “Convolutional networks and applications in vision”, In Circuits and
    Systems, International Symposium on, pages 253–256, 2010.