Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks

Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks

Mohandas V. Pawar, Anuradha J.
Copyright: © 2022 |Volume: 13 |Issue: 5 |Pages: 29
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781668462393|DOI: 10.4018/IJDST.300356
Cite Article Cite Article

MLA

Pawar, Mohandas V., and Anuradha J. "Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks." IJDST vol.13, no.5 2022: pp.1-29. http://doi.org/10.4018/IJDST.300356

APA

Pawar, M. V. & Anuradha J. (2022). Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks. International Journal of Distributed Systems and Technologies (IJDST), 13(5), 1-29. http://doi.org/10.4018/IJDST.300356

Chicago

Pawar, Mohandas V., and Anuradha J. "Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks," International Journal of Distributed Systems and Technologies (IJDST) 13, no.5: 1-29. http://doi.org/10.4018/IJDST.300356

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper tempts to implement a new machine-learning algorithm for detecting attacks in WSN. The developed model involves three main phases (a) Data Acquisition, (b) Feature Extraction, and (c) Detection. Next to the data acquisition from different benchmark datasets, the attributes in the form of features are extracted. Further, a new hybrid machine learning algorithm with the integration of Neural Network (NN), and Fuzzy Classifier is used for detection, and it is termed as FNN. As an improvement to the developed hybrid model, the number of hidden neurons in NN, and the membership function of Fuzzy Classifier is optimized by a modified optimization algorithm called Opposition-based Deer Hunting Optimization Algorithm (O-DHOA). Finally, the experiment analysis of our proposed model provides an effective solution to solve the problem of IDS detection and improves the performance of intrusion detection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.