Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN
M. Anoop,L. William Mary,Allan J. Wilson,W. S. Kiran
DOI: https://doi.org/10.1007/s11042-024-19516-x
IF: 2.577
2024-06-16
Multimedia Tools and Applications
Abstract:In today's rapidly evolving network landscape, cybersecurity has become increasingly crucial. However, wireless sensor networks face unique challenges due to their limited resources and diverse composition, high computational demands, diminished accuracy rates, making them susceptible to a wide array of cyber threats. To tackle these challenges, this research introduced a novel method known as Optimized Graph Transformer with Molecule Attention Network (OGTMAN) on the fusion of Secure Multi-party Computation (SMC) and differential privacy aimed at enhancing privacy and security. This approach starts with data preprocessing, employing min–max normalization to address dataset imbalances. N-Tuple Contrastive Learning with Generative transformer(N-TCLG)feature extractor distinguish between different classes of data instances and effectively learns representations that capture relevant information about network traffic patterns Further, feature selection by enhanced chi-square statistics with kepler algorithm, is utilized to assess the significance of each feature in characteristic between normal network behavior and malicious activities further refines the feature selection method by optimizing the selection criteria based on the statistical properties of the dataset. Finally, the proposed OGTMAN classifies various attacks based on their behavioural patterns with the help of enhanced ant aphid optimization with adaptive step factor. Ultimately, this fine-tuning yield superior model training outcomes, resulting more accurate attack classification outcomes. To evaluate the effectiveness of this approach, datasets encompassing with KDD Cup 99 datasets are employed. The efficiency of the introduced method is demonstrated when compared with prevailing attack detection methods in terms of accuracy, recall, precision and F-measure of 99.98%, 99.5%.,99.9% and 99.5% respectively.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering