Feature Selection with Stacked Autoencoder Based Intrusion Detection in Drones Environment

被引:1
|
作者
Mohamed, Heba G. [1 ]
Alotaibi, Saud S. [2 ]
Eltahir, Majdy M. [3 ]
Mohsen, Heba [4 ]
Hamza, Manar Ahmed [5 ]
Zamani, Abu Sarwar [5 ]
Yaseen, Ishfaq [5 ]
Motwakel, Abdelwahed [5 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Engn, Dept Elect Engn, POB 84428, Riyadh 11671, Saudi Arabia
[2] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Informat Syst, Mecca, Saudi Arabia
[3] King Khalid Univ, Coll Sci & Art Mahayil, Dept Informat Syst, Abha, Saudi Arabia
[4] Future Univ Egypt, Fac Comp & Informat Technol, Dept Comp Sci, New Cairo 11835, Egypt
[5] Prince Sattam Bin Abdulaziz Univ, Dept Comp & Self Dev, Alkharj, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 03期
关键词
Internet of drones; unmanned aerial vehicles; security; intrusion detection; machine learning; INTERNET; MANAGEMENT; SECURITY;
D O I
10.32604/cmc.2022.031887
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Drones (IoD) offers synchronized access to organized airspace for Unmanned Aerial Vehicles (known as drones). The availability of inexpensive sensors, processors, and wireless communication makes it possible in real time applications. As several applications comprise IoD in real time environment, significant interest has been received by research communications. Since IoD operates in wireless environment, it is needed to design effective intrusion detection system (IDS) to resolve security issues in the IoD environment. This article introduces a metaheuristics feature selection with optimal stacked autoencoder based intrusion detection (MFSOSAE-ID) in the IoD environment. The major intention of the MFSOSAE-ID technique is to identify the occurrence of intrusions in the IoD environment. To do so, the proposed MFSOSAE-ID technique firstly pre-processes the input data into a compatible format. In addition, the presented MFSOSAE-ID technique designs a moth flame optimization based feature selection (MFOFS) technique to elect appropriate features. Moreover, firefly algorithm (FFA) with stacked autoencoder (SAE) model is employed for the recognition and classification of intrusions in which the SAE parameters are optimally tuned with utilize of FFA. The performance validation of the MFSOSAE-ID model was tested utilizing benchmark dataset and the outcomes implied the promising performance of the MFSOSAE-ID model over other techniques with maximum accuracy of 99.72%.
引用
收藏
页码:5441 / 5458
页数:18
相关论文
共 50 条
  • [31] An Evolutionary Computation Based Feature Selection Method for Intrusion Detection
    Xue, Yu
    Jia, Weiwei
    Zhao, Xuejian
    Pang, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [32] A Hybrid Bat Based Feature Selection Approach for Intrusion Detection
    Laamari, Mohamed Amine
    Kamel, Nadjet
    BIO-INSPIRED COMPUTING - THEORIES AND APPLICATIONS, BIC-TA 2014, 2014, 472 : 230 - 238
  • [33] Euclidean-based Feature Selection for Network Intrusion Detection
    Suebsing, Anirut
    Hiransakolwong, Nualsawat
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 222 - 229
  • [34] An Intelligent CRF Based Feature Selection for Effective Intrusion Detection
    Ganapathy, Sannasi
    Vijayakumar, Pandi
    Yogesh, Palanichamy
    Kannan, Arputharaj
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (01) : 44 - 50
  • [35] An Ensemble Intrusion Detection System based on Acute Feature Selection
    Hariprasad S
    Deepa T
    Multimedia Tools and Applications, 2024, 83 : 8267 - 8280
  • [36] Intrusion detection based on feature selection and tree Parzen estimation
    Jin Z.
    Wu T.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (07): : 1954 - 1960
  • [37] Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection
    Prashanth S.K.
    Shitharth S.
    Praveen Kumar B.
    Subedha V.
    Sangeetha K.
    SN Computer Science, 3 (6)
  • [38] Correlation-based feature selection for intrusion detection design
    Chou, Te-Shun
    Yen, Kang K.
    Luo, Jun
    Pissinou, Niki
    Makki, Kia
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2300 - +
  • [39] Intrusion Detection Model Based on Feature Selection and Random Forest
    Dong, Rui Hong
    Shui, Yong Li
    Zhang, Qiu Yu
    International Journal of Network Security, 2021, 23 (06) : 985 - 996
  • [40] A Lightweight Network Intrusion Detection Model Based on Feature Selection
    Dai Hong
    Li Haibo
    IEEE 15TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2009, : 165 - +