Cyber Edge Intelligent Intrusion Detection Framework For UAV Network Based on Random Forest Algorithm

Vivian Ukamaka Ihekoronye, S. Ajakwe, Dong‐Seong Kim, Jae-Min Lee
{"title":"Cyber Edge Intelligent Intrusion Detection Framework For UAV Network Based on Random Forest Algorithm","authors":"Vivian Ukamaka Ihekoronye, S. Ajakwe, Dong‐Seong Kim, Jae-Min Lee","doi":"10.1109/ICTC55196.2022.9952400","DOIUrl":null,"url":null,"abstract":"The synchronization of swarms of drones (also known as unmanned aerial vehicles (UAV)) in a network can be attributed to their high mobility and maneuverability capabilities, making them deployable for time-critical operations such as security surveillance, disaster management, and search and rescue operations. However, the resource constraints of these flying robots are limitations to their functionalities. Likewise, the neglect of the security status of this network significantly promotes attacks by invaders, thus, thwarting the mission of this network. In this study, mobile edge computing (MEC) technology and anomaly-based intrusion detection scheme are leveraged to curb these challenges using an optimized Random Forest (RCSV) model embedded in dedicated UAV-MEC servers. The selection of prominent features and hyperparameters for modeling an optimized attack predictor is enabled by Pearson correlation coefficient (PCC) and randomized search cross-validation techniques. Also, the training and evaluation of the proposed model were achieved using intrusion detection data set (CICIDS2017 data set) comprised of complex network attack types. The simulation results obtained by the model in the detection and classification of the different attacks in the network (accuracy = 99.87%, precision = 99.32%, recall = 98.81 % and F1-score = 99.06%) shows its superiority over other optimized machine learning models and some existing models utilized in previous research.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC55196.2022.9952400","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The synchronization of swarms of drones (also known as unmanned aerial vehicles (UAV)) in a network can be attributed to their high mobility and maneuverability capabilities, making them deployable for time-critical operations such as security surveillance, disaster management, and search and rescue operations. However, the resource constraints of these flying robots are limitations to their functionalities. Likewise, the neglect of the security status of this network significantly promotes attacks by invaders, thus, thwarting the mission of this network. In this study, mobile edge computing (MEC) technology and anomaly-based intrusion detection scheme are leveraged to curb these challenges using an optimized Random Forest (RCSV) model embedded in dedicated UAV-MEC servers. The selection of prominent features and hyperparameters for modeling an optimized attack predictor is enabled by Pearson correlation coefficient (PCC) and randomized search cross-validation techniques. Also, the training and evaluation of the proposed model were achieved using intrusion detection data set (CICIDS2017 data set) comprised of complex network attack types. The simulation results obtained by the model in the detection and classification of the different attacks in the network (accuracy = 99.87%, precision = 99.32%, recall = 98.81 % and F1-score = 99.06%) shows its superiority over other optimized machine learning models and some existing models utilized in previous research.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于随机森林算法的无人机网络边缘智能入侵检测框架
网络中无人机群(也称为无人机(UAV))的同步可归因于它们的高机动性和机动性能力,使它们可用于时间关键型操作,如安全监视、灾害管理和搜索和救援操作。然而,这些飞行机器人的资源约束限制了它们的功能。同样,忽视该网络的安全状态会极大地促进入侵者的攻击,从而阻碍该网络的使命。在本研究中,利用移动边缘计算(MEC)技术和基于异常的入侵检测方案,利用嵌入在专用无人机-MEC服务器中的优化随机森林(RCSV)模型来遏制这些挑战。通过皮尔逊相关系数(PCC)和随机搜索交叉验证技术,可以选择突出特征和超参数来建模优化的攻击预测器。此外,使用由复杂网络攻击类型组成的入侵检测数据集(CICIDS2017数据集)对所提出的模型进行了训练和评估。仿真结果表明,该模型对网络中不同攻击的检测和分类准确率为99.87%,准确率为99.32%,召回率为98.81%,F1-score为99.06%,优于其他优化的机器学习模型和以往研究中使用的一些现有模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
6G Integrated Sensing and Communication: Recent Results and Future Directions Analysis of Use Cases Enabling AI/ML to IOT Service Platforms A Study on ECG Monitoring Embedded Systems Development of Touch Interface Using LIDAR for Multi-user Interactions in Projection-based VR Self-Conditional Crowd Activity Detection Network with Multi-label Classification Head
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1