Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/479904
Title: | Development of an effective Intrusion detection system using Hybrid scheme for wireless sensor Networks |
Researcher: | Karthic, S |
Guide(s): | Manoj Kumar, S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems challenging research Wireless Sensor Networks WSN is used in a wide range of applications |
University: | Anna University |
Completed Date: | 2023 |
Abstract: | One of the challenging research areas in the latest advancement in the engineering field is Wireless Sensor Networks (WSN). WSN is used in a wide range of applications such as traffic monitoring, battlefield, surveillance, environment monitoring, health care, etc. They are characterized by constrained energy resources, communication, and computational capabilities. They are vulnerable to attacks due to their characteristics and deployment in a hostile and unattended environment. New approaches are being introduced to increase the overall security of the network. In general, Intrusion Prevention, Intrusion Detection, and Intrusion Mitigation secure WSNs. This research provides the algorithms and schemes for Intrusion Detection System (IDS) to detect intrusions in different levels of the wireless sensor network. For security purposes, two approaches are established for improving security. newlineIn the first approach, to protect the network against security threats, an efficient IDS is designed. The NSL-KDD and UNSW-NB15 datasets consists of attributes about the entering and leaving packets of the network. The Stacked Auto Encoder processes the datasets to identify the promising parameters to enhance the performance of IDS. Upon identifying the most essential features, it is fed as input to the IDS model. In this method, RNN is modelled with an optimized feedback connected RNN model which serves as the IDS system. The POA optimally selects the weight values to enhance the effectiveness of IDS. In the testing phase, the proposed model determines whether the input packets are intruded or not. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/479904 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.6 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.38 MB | Adobe PDF | View/Open | |
03_content.pdf | 95.45 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 297.92 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 143.81 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 804.25 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 488.81 kB | Adobe PDF | View/Open | |
09_annexures.pdf | 115.01 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 57.75 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: