Advertisement

Wireless Sensor Network-Based Hybrid Intrusion Detection System on Feature Extraction Deep Learning and Reinforcement Learning Techniques

  • K. C. Krishnachalitha
  • C. Priya
Conference paper
  • 38 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 118)

Abstract

A Wireless Sensor Network (WSN) is one of the most huge parts of the field of correspondence innovation. A Wireless Sensor Network is one kind of remote framework that consolidates endless coursing, self-composed, minute, low controlled contraptions named sensor center points called motes. This innovation has numerous application zones like therapeutic, ecological, transportation, military, amusement, country guard, emergency the board and furthermore keen spaces. Security is one of the most vital aspects concerned with WSN. Intrusion detection (ID) is one of the main issues while concerning about security. This paper is concerned with the comparative study on the existing hybrid intrusion detection method with their advantages in addition to disadvantages. The article also proposes a hybrid interruption recognition system on the basis of feature extraction, deep learning and reinforcement learning techniques which reduces human dependency and takes most decisions automatically. The proposed system integrates anomaly based as well as signature mechanisms for detecting attacks.

Key Terms

Deep learning Feature extraction Hybrid intrusion Reinforcement learning 

References

  1. 1.
    Indira K, UshaNandini D, Sivasangari A (2018) An efficient hybrid intrusion detection system for wireless sensor networks. Int J Pure Appl Math 119(7):539–556Google Scholar
  2. 2.
    Jinhuia X, Yang T, Feiyue Y, Leina P, Juan X, Yao H (2018) Intrusion detection system for hybrid DoS Attacks, ScienceDirect. Procedia Comput Sci 131:1188–1195 (8th International Congress of Information and Communication Technology (ICICT-2018))Google Scholar
  3. 3.
    Priya C et al (2011) Monitoring system using smart phones. Int J Comput Eng Technol (3). ISSN: 0976-6375, 1:2011Google Scholar
  4. 4.
  5. 5.
    El Mourabit Y, Bouirden A, Toumanari A, El Moussaid N (2015) Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection. Int J Adv Comput Sci Appl (IJACSA) 6(9)Google Scholar
  6. 6.
    Niyaz Q, Sun W, Javaid AY, Alam M (2015) A deep learning approach for network intrusion detection system. BICT 2015, December 03-05, New York, United States.  https://doi.org/10.4108/eai.3-12-2015.2262516

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • K. C. Krishnachalitha
    • 1
  • C. Priya
    • 2
  1. 1.School of Computing SciencesVels Institute of Science, Technology and Advanced Studies (VISTAS)ChennaiIndia
  2. 2.Department of Information TechnologySchool of Computing Science, Vels Institute of Science, Technology and Advanced Studied (VISTAS)ChennaiIndia

Personalised recommendations