Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Anurag Khadtare , Pranav Kakani, Tushar Jambhulkar, Pratik Jagtap, Sumedh Dhengre
DOI Link: https://doi.org/10.22214/ijraset.2023.49493
Certificate: View Certificate
Detecting intruders in computer networks is very important because it affects multiple communication and security domains finding network intruders can be difficult furthermore network intrusion detection remains a challenging undertaking due to the large amount of data required to train modern machine learning models to detect network intrusion risks recently many methods have been published for detecting network intruders however they face significant challenges as new threats continue to emerge that are undetectable by older systems this study evaluates different approaches to creating network intrusion detection systems the best features of the dataset are selected based on the correlations between features in addition we provide a complete functional and performance overview of an adaboost-based network attack detection solution based on these selected characteristics.
I. INTRODUCTION
Over the past few years, as information technology has developed and spread, there have been considerable trade-offs among its benefits. Under the ongoing danger of black-hats, network security has received more attention. Network attacks have significantly increased during the past ten years. These attacks have been quite severe and intricate. Each day, tens of thousands of hackers probe and assault computer networks.[1] Personal privacy is violated, data is taken and sold on the black market. As a result, it is necessary to create an effective and efficient system for identifying the different types of threats.[4]
One security tool used to distinguish between permitted and unauthorized user activity on a system or network is intrusion detection [3]. It is employed to safeguard computer systems and network infrastructure from nefarious actions and illegal uses. It recognises various hazards. It enables users and network administrators to take preventative action. In order to identify suspicious behavior, intrusion detection systems record and examine network traffic.
IDS mainly works on two different approaches:
The type of IDS can be chosen based on the demands of the company. The cost of NIDS will be lower for large enterprises. But it's crucial to realize that NIDS and HIDS both employ unique approaches, so one cannot be used in place of the other.[5]
The main reason for doing this literature review is the dearth of specialized information on ML-based IDS (Intrusion Detection System) methods in WSNs in earlier studies.
The past literature surveys reveal the following information:
A. Machine Learning
Artificial intelligence's machine learning field of study focuses on designing and creating algorithms that enable computers to evolve behaviors based on empirical data, such as that gathered from databases or sensor data. The automated recognition of complicated patterns and the ability to derive wise conclusions from data are two fundamental goals of machine learning research.
Search engines, medical diagnosis, language and handwriting recognition, picture screening, load forecasting, marketing and sales diagnosis, and other uses for ML are many. In the domain of intrusion detection, ML was originally applied in 1994 to classify Internet flow. The majority of the work on classifying Internet traffic using ML approaches begins here.
A large number of wireless sensors are placed in an ad hoc way to create a wireless sensor network (WSN), which lacks any physical infrastructure and is used to track system, physical, and environmental factors.
B. The Wireless Sensor Network
The Wireless Sensor Network (WSN), which is used to track system, physical, and environmental factors, is a wireless network without any underlying infrastructure. It is implemented ad hoc using a large number of wireless sensors.[2]
In a wireless sensor network (WSN), sensor nodes with an integrated CPU are used to control and keep an eye on a specific area's surroundings. They are associated with the Base Station, a component of the WSN System that serves as a processing unit.
For the purpose of sharing data, base stations in a WSN system are linked over the Internet
C. Architecture of WSN
Understanding security concerns with WSNs requires an understanding of the architecture of such LR-WPAN (IEEE 802.15.4) radio communications. The five tiers that make up the WSN architectural structure [2] provide the following services:
6LoWPAN design adds an adaption layer between the network and data link layers any of the currently available address spaces can be used to handle the compatibility of ipv6 packets over existing ipv4 networks translation strategies adapted by the edge router in figure 2 the normal tcpip design of conventional wsns is contrasted with the 6lowpan architecture that enables wsn to connect to the internet the 6lowpan edge routers adaption layer handles packet forwarding at the network layer, so removing the the requirement to save application layer state. This lowers the energy usage and hinders the integration of low-powered devices devices to the Internet, making security a significant issue concern. This has also led to the development of new Internet applications. Internet of Everything (IoE) and the Internet of Things (IoT), which are outside the purview of this paper.
D. Attacks on WSN
Types of Attacks on WSNS
Illustrates how multiple malicious wsn attacks impact both power and cpu usage in addition to security concerns therefore compared to other forms of networks these sorts of networks must place a greater emphasis on coming up with workable and realistic solutions we go into great detail on how each kind of assault impacts wsns.
II. METHODOLOGY
A. SVM
Support vector machine svm is mostly used algorithm in supervised learning techniques in machine learning for classification and regression problems.
In order to swiftly categorize new points in the future the svm algorithm aims to determine the optimum line or decision boundary that can divide n-dimensional space into classes.
This best decision boundary is known as a hyperplane; the extreme vectors and points that help build the hyperplane are chosen by svm are known as support vectors after which it is named.
Support Vectors: Support vectors are the points which are closest from the hyperplane and which can impact the orientation and position of the hyperplane. Using these support vectors, we maximize the margin of the classifier. Deleting the support vectors will change the position of the hyperplane. These are the points that help us build our SVM
B. Types Of SVM
C. Mathematical Intuition behind Support Vector Machine
As we know, the projection of any vector or another vector is called a dot-product. Hence, we take the dot product of x and w vectors. If the dot product is greater than ‘c’ then we can say that the point lies on the right side. If the dot product is less than ‘c’ then the point is on the left side and if the dot product is equal to ‘c’ then the point lies on the decision boundary.
1) Margin in Support Vector Machine
Intrusion crimes is increasing day by day. Hence there is need to find the optimal intrusion detection system when compared to the intrusion detection systems that use the traditional clustering algorithms. In this paper, we developed an intrusion detection system that uses Support Vector Machine algorithm to detect the type of intrusion. A brief description of security is provided, focused on IDS and related ML and DL literature for WSNs. An introduction of middleware architectures for WSNs, extended to IoT are also considered along with well-known IDS datasets. A discussion of future research directions are presented to help the researchers find proper motivation to explore the unexplored, yet related areas.
[1] Jayshree Jha and Leena Ragha(2013).Intrusion Detection System using Suppoort Vector Machine. [2] Nitish A ,Hanumanthappa J , P. Deepa Shenoy ,K.R. Venugopal(2019).Aspects of Machine Learning based Intrusion Detection Systems in Wireless Sensor Networks:A Review. [3] Zakiyabanu S. Malek, Bhushan Trivedi, Axita Shah(2020).User behavior Pattern -Signature based Intrusion Detection. [4] Anand Sukumar J V, Pranav I, Neetish MM, Jayasree Narayanan (2018).Network Intrusion Detection Using Improved Genetic k-means Algorithm. [5] Dr. Manish Kumar and Ashish Kumar Singh(2020).Distributed Intrusion Detection System using Blockchain and Cloud Computing Infrastructure. [6] WEN-TAOLIU(2008).RESEARCH ON INTRUSION DETECTION RULES BASED ON XML IN DISTRIBUTED IDS. [7] Zhan Xin,Wang Xiaodong and Yuan Huabing(2019).Research on Block Chain Network Intrusion Detection System. [8] Shan Suthaharan(2012).An Iterative Ellipsoid-Based Anomaly Detection Technique for Intrusion D.
Copyright © 2023 Anurag Khadtare , Pranav Kakani, Tushar Jambhulkar, Pratik Jagtap, Sumedh Dheng re. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET49493
Publish Date : 2023-03-11
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here