Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO

With the rapid development of information technology, the problem of the network security of unmanned aerial vehicles (UAVs) has become increasingly prominent. In order to solve the intrusion detection problem of massive, high-dimensional, and nonlinear data, this paper proposes an intrusion detection method based on the deep belief network (DBN) optimized by particle swarm optimization (PSO). First, a classification model based on the DBN is constructed, and the PSO algorithm is then used to optimize the number of hidden layer nodes of the DBN, to obtain the optimal DBN structure. The simulations are conducted on a benchmark intrusion dataset, and the results show that the accuracy of the DBN-PSO algorithm reaches 92.44%, which is higher than those of the support vector machine (SVM), artificial neural network (ANN), deep neural network (DNN), and Adaboost. It can be seen from comparative experiments that the optimization effect of PSO is better than those of the genetic algorithm, simulated annealing algorithm, and Bayesian optimization algorithm. The method of PSO-DBN provides an effective solution to the problem of intrusion detection of UAV networks.

[1]  Timo D. Hämäläinen,et al.  Assessment of Deep Learning Methodology for Self-Organizing 5G Networks , 2019, Applied Sciences.

[2]  Naima Iltaf,et al.  CATSWoTS: Context Aware Trustworthy Social Web of Things System , 2019, Sensors.

[3]  Mohamed Touahria,et al.  Feature selection for intrusion detection using new multi-objective estimation of distribution algorithms , 2019, Applied Intelligence.

[4]  Xigang Yuan,et al.  An improved PSO algorithm for solving non-convex NLP/MINLP problems with equality constraints , 2007, Computers and Chemical Engineering.

[5]  Feng Qu,et al.  An Intrusion Detection Model Based on Deep Belief Network , 2017, ICNCC.

[6]  Jeongtae Kim,et al.  Machine Learning-Based Fast Banknote Serial Number Recognition Using Knowledge Distillation and Bayesian Optimization , 2019, Sensors.

[7]  Ran Wang,et al.  Noniterative Deep Learning: Incorporating Restricted Boltzmann Machine Into Multilayer Random Weight Neural Networks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[8]  Yiqiang Sheng,et al.  HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.

[9]  Salah El Hadaj,et al.  Performance evaluation of intrusion detection based on machine learning using Apache Spark , 2018 .

[10]  Said Fathy El-Zoghdy,et al.  A Neural Network-Based Learning Algorithm for Intrusion Detection Systems , 2017, Wirel. Pers. Commun..

[11]  Kashif Ishaque,et al.  An Improved Particle Swarm Optimization (PSO)–Based MPPT for PV With Reduced Steady-State Oscillation , 2012, IEEE Transactions on Power Electronics.

[12]  Gurveen Vaseer,et al.  Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks: A Single- and Multiattack Case Study , 2019, IEEE Consumer Electronics Magazine.

[13]  Yizhi Ren,et al.  Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks , 2019, Sensors.

[14]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[15]  Khaled Salah,et al.  COLIDE: a collaborative intrusion detection framework for Internet of Things , 2019, IET Networks.

[16]  Zuherman Rustam,et al.  Comparison between Support Vector Machine and Fuzzy C-Means as Classifier for Intrusion Detection System , 2018, Journal of Physics: Conference Series.

[17]  Bharti Suri,et al.  On the Effectiveness of Using Elitist Genetic Algorithm in Mutation Testing , 2019, Symmetry.

[18]  Md. Rezaul Karim,et al.  A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network , 2019, Symmetry.

[19]  Mamun Bin Ibne Reaz,et al.  A novel SVM-kNN-PSO ensemble method for intrusion detection system , 2016, Appl. Soft Comput..

[20]  Xiaohu You,et al.  Gibbs-Sampling-Based CRE Bias Optimization Algorithm for Ultradense Networks , 2017, IEEE Transactions on Vehicular Technology.

[21]  Biju Issac,et al.  Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System , 2017, Future Gener. Comput. Syst..

[22]  Paul D. Yoo,et al.  From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods , 2018, IEEE Communications Surveys & Tutorials.

[23]  Lixiang Li,et al.  Nearest neighbors based density peaks approach to intrusion detection , 2018 .

[24]  Kangfeng Zheng,et al.  Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network , 2019, Sensors.

[25]  Yang Yu,et al.  A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.

[26]  Xuemei Sun,et al.  Server Consolidation Based on Culture Multiple-Ant-Colony Algorithm in Cloud Computing , 2019, Sensors.

[27]  Qichao Zhang,et al.  Securing ICN-Based UAV Ad Hoc Networks with Blockchain , 2019, IEEE Communications Magazine.

[28]  Ren-Hung Hwang,et al.  An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level , 2019, Applied Sciences.

[29]  Fadi Al-Turjman,et al.  An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..

[30]  Dunwei Gong,et al.  A Set-Based Genetic Algorithm for Interval Many-Objective Optimization Problems , 2018, IEEE Transactions on Evolutionary Computation.

[31]  Jimmy Ming-Tai Wu,et al.  A Sanitization Approach to Secure Shared Data in an IoT Environment , 2019, IEEE Access.

[32]  Ying Zhang,et al.  Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.

[33]  Saru Kumari,et al.  Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks , 2019, Sensors.

[34]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[35]  Cao Chunxiang,et al.  Spectral characteristics and species identification of rhododendrons using a discriminative restricted Boltzmann machine , 2017 .

[36]  Zahid Akhtar,et al.  KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research , 2019, Computer.

[37]  Akhan Akbulut,et al.  Empirical study on multiclass classification‐based network intrusion detection , 2019, Comput. Intell..

[38]  Tie Li,et al.  Research and application of intelligent intrusion detection system with accuracy analysis methodology , 2018 .

[39]  Kusum Deep,et al.  A Hybrid Harmony search and Simulated Annealing algorithm for continuous optimization , 2018, Inf. Sci..

[40]  Xiaojie Liu,et al.  Ant-colony algorithm with a strengthened negative-feedback mechanism for constraint-satisfaction problems , 2017, Inf. Sci..

[41]  Seyed Mojtaba Hosseini Bamakan,et al.  A New Intrusion Detection Approach Using PSO based Multiple Criteria Linear Programming , 2015, ITQM.

[42]  Jun Gao,et al.  Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection , 2014, IEEE Transactions on Cybernetics.

[43]  Weizhi Meng,et al.  Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling , 2018, Computer.

[44]  Jie Gu,et al.  An effective intrusion detection framework based on SVM with feature augmentation , 2017, Knowl. Based Syst..

[45]  Jiankun Hu,et al.  A novel statistical technique for intrusion detection systems , 2018, Future Gener. Comput. Syst..

[46]  Derrick Wing Kwan Ng,et al.  Physical Layer Security in UAV Systems: Challenges and Opportunities , 2019, IEEE Wireless Communications.