Skip to main content

Cloud Enabled Intrusion Detector and Alerter Using Improved Deep Learning Technique

  • Conference paper
  • First Online:
  • 646 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 941))

Abstract

Deep learning is a popular machine learning technique, used in variety of applications like autonomous vehicles, aerospace and medical research. Wireless Integrated Network Sensors (WINS) is an architecture that provide continuous monitoring and control of an environment with high accuracy and low power consumption. The amalgamation of deep learning and WINS can provide an effective system to monitor the remote environment. In this paper a system is designed using WINS and Improved Convolution Neural Network (ICNN). This can be used to create a virtual wall across the border of the county. This virtual wall is made up of sensors and cameras that are placed at regular intervals. The images of the suspected intruders are captured and are classified by ICNN. The processed image is stored in the fire base cloud which in turn will alert the country border security authorities by sending a message to them using MQTT protocol. This system is effective and can easily identify the intruders instantaneously. The experimental results shows that the improved convolution algorithm performs image classification better and faster than the traditional convolution algorithms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Pottie, G.J., Kaiser, W.J.: Wireless integrated network sensors. Commun. ACM 43(5), 51–58 (2000)

    Article  Google Scholar 

  2. Vardhan, S., Wilczynski, M., Pottie, G.J., Kaiser, W.J.: Wireless integrated network sensors (WINS): distributed in situ sensing for mission and flight systems. IEEE (2000). 0-7803-5846-51001$10.00 0

    Google Scholar 

  3. Shire, I., Payal, K., Katkhede, K.N., Mande, K.P.: A review on security of border using WINS. Int. J. Eng. Sci. Res. Technol. 6(8), 109–111 (2017). Accessed 5 Aug 2017

    Google Scholar 

  4. Yim, J., Ju, J., Jung, H., Kim, J.: Image classification using convolutional neural networks with multi-stage feature. In: Kim, J.-H., Yang, W., Jo, J., Sincak, P., Myung, H. (eds.) Robot Intelligence Technology and Applications 3. AISC, vol. 345, pp. 587–594. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16841-8_52

    Chapter  Google Scholar 

  5. Tripathi, G., Singh, K., Vishwakarma, D.K.: Convolutional neural networks for crowd behaviour analysis: a survey. Vis Comput. Int. J. Comput. Graph. (2018). https://doi.org/10.1007/s00371-018-1499-5

  6. Anuse, A., Vyas, V.: A novel training algorithm for convolutional neural network. J. Complex Intell. Syst. 2(3), 221–234 (2016)

    Article  Google Scholar 

  7. Cao, Y.S., Niu, X., Dou, Y.: Region-based convolutional neural networks for object detection in very high resolution remote sensing images. In: International Conference on Natural Computation, Changsha, China (2016)

    Google Scholar 

  8. Ding, P., Zhang, Y., Deng, W.J., Jia, P., Kuijper, A.: A light and faster regional convolutional neural network for object detection in optical remote sensing images. ISPRS J. Photogramm. Remote. Sens. 141, 208–2018 (2018)

    Article  Google Scholar 

  9. Srivastava, N., Shree, U., Chauhan, N.R., Tiwari, D.K.: Firebase cloud messaging. Int. J. Innov. Res. Sci. Eng. Technol. 6(9), 1–8 (2017)

    Google Scholar 

  10. Soni, D., Makwana, A.: A Survey on MQTT: A Protocol of Internet of Things (IoT), Conference Paper (2017)

    Google Scholar 

  11. Firebase Cloud Messaging. https://firebase.google.com/docs/cloud-messaging. Accessed 27 July 2018

  12. Message Queuing Telemetry Transport. https://www.pubnub.com/blog/what-is-mqtt-use-cases. Accessed 27 July 2018

  13. Kendall, J.: Controlling cross-border traffic without sacrificing security (2018)

    Google Scholar 

  14. del Rio, J.S., Moctezuma, D., Conde, C., de Diego, I.M., Cabello, E.: Automated border control e-gates and facial recognition systems. J. Comput. Secur. 62, 49–72 (2016)

    Article  Google Scholar 

  15. Nunamaker Jr., J.F., Burgoon, J.: Sensors for Intelligent Monitoring of Human Interactions (2017)

    Google Scholar 

  16. Alom, M.Z., Hasan, M., Yakopcic, C., Taha, T.M., Asari, V.K.: Improved Inception-Residual Convolutional Neural Network for Object Recognition (2017)

    Google Scholar 

  17. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. Microsoft Research (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Kanagaraj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kanagaraj, K., Swamynathan, S., Karthikeyan, A. (2019). Cloud Enabled Intrusion Detector and Alerter Using Improved Deep Learning Technique. In: Akoglu, L., Ferrara, E., Deivamani, M., Baeza-Yates, R., Yogesh, P. (eds) Advances in Data Science. ICIIT 2018. Communications in Computer and Information Science, vol 941. Springer, Singapore. https://doi.org/10.1007/978-981-13-3582-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3582-2_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3581-5

  • Online ISBN: 978-981-13-3582-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics