Intrusion Detection Algorithm and Simulation of Wireless Sensor Network under Internet Environment

As an effective security protection technology, intrusion detection technology has been widely used in traditional wireless sensor network environments. With the rapid development of wireless sensor network technology and wireless sensor network applications, the wireless sensor network data traffic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of sensors 2021-11, Vol.2021 (1)
1. Verfasser: Jin, Jing
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title Journal of sensors
container_volume 2021
creator Jin, Jing
description As an effective security protection technology, intrusion detection technology has been widely used in traditional wireless sensor network environments. With the rapid development of wireless sensor network technology and wireless sensor network applications, the wireless sensor network data traffic also grows rapidly, and various kinds of viruses and attacks appear. Based on the temporal correlation characteristics of the intrusion detection dataset, we propose a multicorrelation-based intrusion detection model for long- and short-term memory wireless sensor networks. The model selects the optimal feature subset through the information gain feature selection module, converts the feature subset into a TAM matrix using the multicorrelation analysis algorithm, and inputs the TAM matrix into the long- and short-term memory wireless sensor network module for training and testing. Aiming at the problems of low detection accuracy and high false alarm rate of traditional machine learning-based wireless sensor network intrusion detection models in the intrusion detection process, a wireless sensor network intrusion detection model combining two-way long- and short-term memory wireless sensor network and C5.0 classifier is proposed. The model first uses the hidden layer of the bidirectional long- and short-term memory wireless sensor network to extract the features of the intrusion detection data set and finally inputs extracted features into the C5.0 classifier for training and classification. In order to illustrate the applicability of the model, the experiment selects three different data sets as the experimental data sets and conducts simulation performance analysis through simulation experiments. Experimental results show that the model had better classification performance.
doi_str_mv 10.1155/2021/9089370
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2600071010</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2600071010</sourcerecordid><originalsourceid>FETCH-LOGICAL-c404t-7c6670b71fae3612cbe1c07fb13929e084d1671ae7a78d7fe57eee8e4df319333</originalsourceid><addsrcrecordid>eNp9kFFLwzAUhYMoOKdv_oCAj1p307RJ-zh06mDowxR9K2l76zLXZCapw39v54aPPt0D9-Mc-Ag5Z3DNWJqOYojZKIcs5xIOyICJTEYyFtnhX07fjsmJ90sAwSXnA1JOTXCd19bQWwxYhW0ar96t02HRUmVqOtdtt1K_D9vQV-1whd7TORpvHX3EsLHug3amRkf7NnQGA52YL-2sadGEU3LUqJXHs_0dkpe7yfPNQzR7up_ejGdRlUASIlkJIaGUrFHIBYurElkFsikZz-McIUtqJiRTKJXMatlgKhExw6RuOMs550NysetdO_vZoQ_F0nbO9JNFLABAMmDQU1c7qnLWe4dNsXa6Ve67YFBsLRZbi8XeYo9f7vCFNrXa6P_pH0dAcso</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2600071010</pqid></control><display><type>article</type><title>Intrusion Detection Algorithm and Simulation of Wireless Sensor Network under Internet Environment</title><source>Wiley Online Library Open Access</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Jin, Jing</creator><contributor>Shi, Guolong</contributor><creatorcontrib>Jin, Jing ; Shi, Guolong</creatorcontrib><description>As an effective security protection technology, intrusion detection technology has been widely used in traditional wireless sensor network environments. With the rapid development of wireless sensor network technology and wireless sensor network applications, the wireless sensor network data traffic also grows rapidly, and various kinds of viruses and attacks appear. Based on the temporal correlation characteristics of the intrusion detection dataset, we propose a multicorrelation-based intrusion detection model for long- and short-term memory wireless sensor networks. The model selects the optimal feature subset through the information gain feature selection module, converts the feature subset into a TAM matrix using the multicorrelation analysis algorithm, and inputs the TAM matrix into the long- and short-term memory wireless sensor network module for training and testing. Aiming at the problems of low detection accuracy and high false alarm rate of traditional machine learning-based wireless sensor network intrusion detection models in the intrusion detection process, a wireless sensor network intrusion detection model combining two-way long- and short-term memory wireless sensor network and C5.0 classifier is proposed. The model first uses the hidden layer of the bidirectional long- and short-term memory wireless sensor network to extract the features of the intrusion detection data set and finally inputs extracted features into the C5.0 classifier for training and classification. In order to illustrate the applicability of the model, the experiment selects three different data sets as the experimental data sets and conducts simulation performance analysis through simulation experiments. Experimental results show that the model had better classification performance.</description><identifier>ISSN: 1687-725X</identifier><identifier>EISSN: 1687-7268</identifier><identifier>DOI: 10.1155/2021/9089370</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Accuracy ; Algorithms ; Classification ; Classifiers ; Datasets ; False alarms ; Feature extraction ; Feature selection ; Genetic algorithms ; Internet access ; Intrusion detection systems ; Machine learning ; Methods ; Modules ; R&amp;D ; Research &amp; development ; Sensors ; Simulation ; Software ; Support vector machines ; Training ; Wireless networks ; Wireless sensor networks</subject><ispartof>Journal of sensors, 2021-11, Vol.2021 (1)</ispartof><rights>Copyright © 2021 Jing Jin.</rights><rights>Copyright © 2021 Jing Jin. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c404t-7c6670b71fae3612cbe1c07fb13929e084d1671ae7a78d7fe57eee8e4df319333</citedby><cites>FETCH-LOGICAL-c404t-7c6670b71fae3612cbe1c07fb13929e084d1671ae7a78d7fe57eee8e4df319333</cites><orcidid>0000-0001-6889-8409</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Shi, Guolong</contributor><creatorcontrib>Jin, Jing</creatorcontrib><title>Intrusion Detection Algorithm and Simulation of Wireless Sensor Network under Internet Environment</title><title>Journal of sensors</title><description>As an effective security protection technology, intrusion detection technology has been widely used in traditional wireless sensor network environments. With the rapid development of wireless sensor network technology and wireless sensor network applications, the wireless sensor network data traffic also grows rapidly, and various kinds of viruses and attacks appear. Based on the temporal correlation characteristics of the intrusion detection dataset, we propose a multicorrelation-based intrusion detection model for long- and short-term memory wireless sensor networks. The model selects the optimal feature subset through the information gain feature selection module, converts the feature subset into a TAM matrix using the multicorrelation analysis algorithm, and inputs the TAM matrix into the long- and short-term memory wireless sensor network module for training and testing. Aiming at the problems of low detection accuracy and high false alarm rate of traditional machine learning-based wireless sensor network intrusion detection models in the intrusion detection process, a wireless sensor network intrusion detection model combining two-way long- and short-term memory wireless sensor network and C5.0 classifier is proposed. The model first uses the hidden layer of the bidirectional long- and short-term memory wireless sensor network to extract the features of the intrusion detection data set and finally inputs extracted features into the C5.0 classifier for training and classification. In order to illustrate the applicability of the model, the experiment selects three different data sets as the experimental data sets and conducts simulation performance analysis through simulation experiments. Experimental results show that the model had better classification performance.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Classification</subject><subject>Classifiers</subject><subject>Datasets</subject><subject>False alarms</subject><subject>Feature extraction</subject><subject>Feature selection</subject><subject>Genetic algorithms</subject><subject>Internet access</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Methods</subject><subject>Modules</subject><subject>R&amp;D</subject><subject>Research &amp; development</subject><subject>Sensors</subject><subject>Simulation</subject><subject>Software</subject><subject>Support vector machines</subject><subject>Training</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>1687-725X</issn><issn>1687-7268</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp9kFFLwzAUhYMoOKdv_oCAj1p307RJ-zh06mDowxR9K2l76zLXZCapw39v54aPPt0D9-Mc-Ag5Z3DNWJqOYojZKIcs5xIOyICJTEYyFtnhX07fjsmJ90sAwSXnA1JOTXCd19bQWwxYhW0ar96t02HRUmVqOtdtt1K_D9vQV-1whd7TORpvHX3EsLHug3amRkf7NnQGA52YL-2sadGEU3LUqJXHs_0dkpe7yfPNQzR7up_ejGdRlUASIlkJIaGUrFHIBYurElkFsikZz-McIUtqJiRTKJXMatlgKhExw6RuOMs550NysetdO_vZoQ_F0nbO9JNFLABAMmDQU1c7qnLWe4dNsXa6Ve67YFBsLRZbi8XeYo9f7vCFNrXa6P_pH0dAcso</recordid><startdate>20211108</startdate><enddate>20211108</enddate><creator>Jin, Jing</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SP</scope><scope>7U5</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>D1I</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KB.</scope><scope>L6V</scope><scope>L7M</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-6889-8409</orcidid></search><sort><creationdate>20211108</creationdate><title>Intrusion Detection Algorithm and Simulation of Wireless Sensor Network under Internet Environment</title><author>Jin, Jing</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c404t-7c6670b71fae3612cbe1c07fb13929e084d1671ae7a78d7fe57eee8e4df319333</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Classification</topic><topic>Classifiers</topic><topic>Datasets</topic><topic>False alarms</topic><topic>Feature extraction</topic><topic>Feature selection</topic><topic>Genetic algorithms</topic><topic>Internet access</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Methods</topic><topic>Modules</topic><topic>R&amp;D</topic><topic>Research &amp; development</topic><topic>Sensors</topic><topic>Simulation</topic><topic>Software</topic><topic>Support vector machines</topic><topic>Training</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jin, Jing</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Materials Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of sensors</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jin, Jing</au><au>Shi, Guolong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intrusion Detection Algorithm and Simulation of Wireless Sensor Network under Internet Environment</atitle><jtitle>Journal of sensors</jtitle><date>2021-11-08</date><risdate>2021</risdate><volume>2021</volume><issue>1</issue><issn>1687-725X</issn><eissn>1687-7268</eissn><abstract>As an effective security protection technology, intrusion detection technology has been widely used in traditional wireless sensor network environments. With the rapid development of wireless sensor network technology and wireless sensor network applications, the wireless sensor network data traffic also grows rapidly, and various kinds of viruses and attacks appear. Based on the temporal correlation characteristics of the intrusion detection dataset, we propose a multicorrelation-based intrusion detection model for long- and short-term memory wireless sensor networks. The model selects the optimal feature subset through the information gain feature selection module, converts the feature subset into a TAM matrix using the multicorrelation analysis algorithm, and inputs the TAM matrix into the long- and short-term memory wireless sensor network module for training and testing. Aiming at the problems of low detection accuracy and high false alarm rate of traditional machine learning-based wireless sensor network intrusion detection models in the intrusion detection process, a wireless sensor network intrusion detection model combining two-way long- and short-term memory wireless sensor network and C5.0 classifier is proposed. The model first uses the hidden layer of the bidirectional long- and short-term memory wireless sensor network to extract the features of the intrusion detection data set and finally inputs extracted features into the C5.0 classifier for training and classification. In order to illustrate the applicability of the model, the experiment selects three different data sets as the experimental data sets and conducts simulation performance analysis through simulation experiments. Experimental results show that the model had better classification performance.</abstract><cop>New York</cop><pub>Hindawi</pub><doi>10.1155/2021/9089370</doi><orcidid>https://orcid.org/0000-0001-6889-8409</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1687-725X
ispartof Journal of sensors, 2021-11, Vol.2021 (1)
issn 1687-725X
1687-7268
language eng
recordid cdi_proquest_journals_2600071010
source Wiley Online Library Open Access; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects Accuracy
Algorithms
Classification
Classifiers
Datasets
False alarms
Feature extraction
Feature selection
Genetic algorithms
Internet access
Intrusion detection systems
Machine learning
Methods
Modules
R&D
Research & development
Sensors
Simulation
Software
Support vector machines
Training
Wireless networks
Wireless sensor networks
title Intrusion Detection Algorithm and Simulation of Wireless Sensor Network under Internet Environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T02%3A21%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intrusion%20Detection%20Algorithm%20and%20Simulation%20of%20Wireless%20Sensor%20Network%20under%20Internet%20Environment&rft.jtitle=Journal%20of%20sensors&rft.au=Jin,%20Jing&rft.date=2021-11-08&rft.volume=2021&rft.issue=1&rft.issn=1687-725X&rft.eissn=1687-7268&rft_id=info:doi/10.1155/2021/9089370&rft_dat=%3Cproquest_cross%3E2600071010%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2600071010&rft_id=info:pmid/&rfr_iscdi=true