ESP Journal of Engineering & Technology Advancements |
© 2022 by ESP JETA |
Volume 2 Issue 2 |
Year of Publication : 2022 |
Authors : Vikram Nattamai Sankaran, Dr. A. Punitha, Rakesh Thoppaen Suresh Babu |
: 10.56472/25832646/ESP-V2I2P107 |
Vikram Nattamai Sankaran, Dr. A. Punitha, Rakesh Thoppaen Suresh Babu, 2022. "Wireless Network Intrusion Detection: A Comprehensive Evaluation of Modified Catboost Classification Models" ESP Journal of Engineering & Technology Advancements 2(2): 35-43.
The increasing prevalence of wireless networks has made them a prime target for cyber threats and unauthorized access. Effective intrusion detection in such environments is crucial to maintaining network security and integrity. This study presents a novel approach to wireless network intrusion detection by leveraging a modified CatBoost algorithm, enhanced through Whale Optimization Algorithm (WOA)-based hyperparameter tuning. CatBoost, a gradient boosting framework, is adapted with modifications to better handle the unique challenges of intrusion detection, including class imbalance and high-dimensional data. The Whale Optimization Algorithm, inspired by the hunting behavior of whales, is employed to optimize CatBoost's hyperparameters, improving its performance and accuracy in detecting intrusions. The proposed method is evaluated on a real-world wireless network dataset, demonstrating superior detection capabilities compared to traditional approaches. The results indicate that the combination of modified CatBoost and WOA leads to a more robust and effective intrusion detection system, offering enhanced security for wireless networks.
[1] M. Gautam, S. Ahuja and A. Kumar, "Intrusion Detection System for Internet of Thing Environment using Feature Engineering and Balanced Random Forest Algorithm," 2024 International Conference on Expert Clouds and Applications (ICOECA), Bengaluru, India, 2024, pp. 449-455, doi: 10.1109/ICOECA62351.2024.00085.
[2] K. Sathish, H. Arya, K. S, S. Sivakumar, A. K. Arigela and R. Venkatesh, "A Deep Learning Approach for Sustainable and Secure Operations of Cloud Data Centres for Optimising the Energy Efficiency," 2024 International Conference on Expert Clouds and Applications (ICOECA), Bengaluru, India, 2024, pp. 694-699, doi: 10.1109/ICOECA62351.2024.00126.
[3] R. Siwal and S. P, "Optimising DOS Attacks Using Machine Learning Algorithms and Securing IOT Devices from Attacks," 2024 International Conference on Expert Clouds and Applications (ICOECA), Bengaluru, India, 2024, pp. 456-461, doi: 10.1109/ICOECA62351.2024.00086.
[4] E. A. Ichetovkin and I. V. Kotenko, "Modeling Poisoning Attacks Against Machine Learning Components of Intrusion Detection Systems," 2024 IEEE 25th International Conference of Young Professionals in Electron Devices and Materials (EDM), Altai, Russian Federation, 2024, pp. 1850-1855, doi: 10.1109/EDM61683.2024.10615198.
[5] S. Li, J. Wang, Y. Song, W. Quan and Y. Wang, "A Multiscale Deep Convolutional Malicious Code Classification Method Based on Structural Reparameterization," 2024 3rd International Conference on Big Data, Information and Computer Network (BDICN), Sanya, China, 2024, pp. 87-91, doi: 10.1109/BDICN62775.2024.00023.
[6] S. Wang, Y. Wang, B. Zheng, J. Cheng, Y. Su and Y. Dai, "Intrusion Detection System for Vehicular Networks Based on MobileNetV3," in IEEE Access, doi: 10.1109/ACCESS.2024.3437416.
[7] D. Attique, W. Hao, W. Ping, D. Javeed and M. Adil, "EX-DFL: An Explainable Deep Federated-based Intrusion Detection System for Industrial IoT," 2024 21st International Joint Conference on Computer Science and Software Engineering (JCSSE), Phuket, Thailand, 2024, pp. 358-364, doi: 10.1109/JCSSE61278.2024.10613665.
[8] K. R. Alla, G. Thangarasu and K. N. Kannan, "Optimal Attacks Classification in Edge Internet of Things Networks Using Deep Learning Algorithm," 2024 IEEE Symposium on Industrial Electronics & Applications (ISIEA), Kuala Lumpur, Malaysia, 2024, pp. 1-6, doi: 10.1109/ISIEA61920.2024.10607251. keywords: {Productivity;Deep learning;Privacy;Accuracy;Neural networks;Organizations;Feature extraction;Intrusion detection;Threats;Deep learning;EIoT network},
[9] B. Xie, M. Xu, C. Jin, F. Cui, Z. Li and H. Fan, "HDCBAN: Hybrid Neural Network for Network Intrusion Detection System," 2024 9th International Conference on Computer and Communication Systems (ICCCS), Xi'an, China, 2024, pp. 427-434, doi: 10.1109/ICCCS61882.2024.10603260.
[10] S. Bayan, U. Mohammad and A. A. Mohammad, "Position Falsification Attack Detection In Inter-Vehicle Networks Using Deep Learning," 2024 IEEE International Conference on Electro Information Technology (eIT), Eau Claire, WI, USA, 2024, pp. 621-626, doi: 10.1109/eIT60633.2024.10609919.
[11] M. Kodyš, Z. Dai and V. L. L. Thing, "Privacy-Preserving Intrusion Detection using Convolutional Neural Networks," 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, Singapore, 2024, pp. 1148-1153, doi: 10.1109/CAI59869.2024.00205.
[12] B. Ji and C. Ye, "Network Traffic Anomaly Detection Based on Port Attention Mechanism and ResNET-BiLSTM-RF," 2024 International Conference on Artificial Intelligence and Digital Technology (ICAIDT), Shenzhen, China, 2024, pp. 84-88, doi: 10.1109/ICAIDT62617.2024.00026.
[13] R. S and L. Selvam, "Memory-Based Network Model for Intrusion Detection in IoT Using Learning Approaches," 2024 International Conference on Expert Clouds and Applications (ICOECA), Bengaluru, India, 2024, pp. 403-407, doi: 10.1109/ICOECA62351.2024.00078.
[14] Vikram Nattamai Sankaran, 2021. "Advanced AI Techniques in Wireless MIMO Communication: Improving Throughput, Latency, and Robustness" ESP Journal of Engineering & Technology Advancements 1(2): 94-100.
[15] Sharda Kumari, 2021. "Context-Aware AI-Driven CRM: Enhancing Customer Journeys through Real-Time Personalization and Predictive Analytics" ESP Journal of Engineering & Technology Advancements 1(1): 7-13.
[16] Shamsuddin Ali Akbari A J, Mohammed Ali Hussian, 2022. "An Effective Malware Detection Algorithm for WSN 2(1): 1-4.
[17] Muhammadu Ansari, Sadamiro A. O, 2021. "Secured Low Power Wireless Sensor Network By Using Lion Optimization Algorithm" ESP Journal of Engineering & Technology Advancements 1(2): 14-20.
[18] A. Antony Simeon Raj, K. Jebastin, B. Vadivel, 2022. "Blockchain based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks" ESP Journal of Engineering & Technology Advancements 2(2): 10-14.
[19] Vikram Nattamai Sankaran, Dr. N. Rajkumar, 2021. "Wireless Network Powered by AI: A Leap towards Ultra-Connectivity" ESP Journal of Engineering & Technology Advancements 1(1): 65-82.
Wireless Network Intrusion Detection, CatBoost Classification Models, Gradient Boosting Algorithms, Modified CatBoost, Network Security, Intrusion Detection Systems (IDS), Machine Learning for Intrusion Detection, Feature Engineering, Categorical Feature Handling.