SD-WSN Network Security Detection Methods for Online Network Education
DOI:
https://doi.org/10.31449/inf.v48i21.6257Abstract
Online network education faces serious information security problems, and traditional network security detection methods are insufficient to deal with new types of attacks and unknown threats. To improve the security level of online education, the paper proposes an information security detection method for online education based on improved clustering detection algorithm and software-defined wireless sensor network to improve the detection accuracy. The study combines the improved clustering detection algorithm and software-defined wireless sensor network technology to construct a novel network security detection model. In the comparison test of the improved clustering detection algorithm, it is found that the algorithm has the lowest training error of 0.040 and 0.031 in the test and training sets, which are both better than the comparison algorithm. Subsequent empirical analysis of the network security detection model shows that the research proposed detection accuracy and detection time are 90.3% and 2.6s respectively, which are significantly better than the other models. The above data validate that the designed novel network security detection model can better safeguard the information security and user data privacy of online network education. The study not only improves the information security level of online education, but also provides strong support for promoting its healthy development.References
Saranya T, Sridevi S, Deisy C, Chung T D, Khan M A. Performance analysis of machine learning algorithms in intrusion detection system: a review. Procedia Computer Science, 2020, 171(5): 1251-1260.
Hebbi C, Mamatha H. Comprehensive dataset building and recognition of isolated handwritten kannada characters using machine learning models. Artificial Intelligence and Applications, 2023, 1(3): 179-190.
Gheisari M, Hamidpour H, Liu Y, Saedi P, Raza A, Jalili A, Rokhsati H, Amin R. Data mining techniques for web mining: a survey. Artificial Intelligence and Applications, 2023, 1(1): 3-10.
Cho W, Kim J, Lee C. Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants. IET Information Security, 2021, 15(6): 417-427.
Logeshwaran J. AICSA-an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks. ICTACT Journal on Data Science and Machine Learning, 2021, 3(1): 251-253.
Shafique K, Khawaja B A, Sabir F, Qazi S, Mustaqim M. Internet of things (IoT) for next-generation smart systems: a review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access, 2020, 8(3): 23022-23040.
Chen D J I Z. Automatic vehicle license plate detection using K-means clustering algorithm and CNN. Journal of Electrical Engineering and Automation, 2021, 3(1): 15-23.
Banerjee A, Sufian A. Smart-Green-Mult (SGM): overhear from topological kingpins in software defined wireless sensor networks. Journal of Ambient Intelligence and Humanised Computing, 2021, 12(5): 387-404.
Younus M U, Khan M K, Bhatti A R. Improving the software-defined wireless sensor networks routing performance using reinforcement learning. ieee Internet of Things Journal, 2021, 9(5): 3495-3508.
Nagaraja A, Uma B, Gunupudi R. UTTAMA: An intrusion detection system based on feature clustering and feature transformation. foundations of Science, 2020, 25(4): 1049-1075.
Liang W, Zhang K, Tang M, He D, Li K C. Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. ieee internet of Things Journal, 2021, 9(16): 14741-14751.
Dincelli E, Chengalur-Smith I S. Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling. European Journal of Information Systems, 2020, 29(6): 669-687.
Guo J, Li C, Zhang G, Sun Y, Bie R. Blockchain-enabled digital rights management for multimedia resources of online education. multimedia Tools and Applications, 2020, 79(8): 9735-9755.
Kamar E, Howell C J, Maimon D, Berenblum T. The moderating role of thoughtfully reflective decision-making on the relationship between information security messages and smishing victimisation: an experiment. Justice Quarterly, 2023, 40(6): 837-858.
Arbanas K, Spremic M, Zajdela Hrustek N. Holistic framework for evaluating and improving information security culture. aslib Journal of Information Management, 2021, 73(5): 699-719.
Shafiq M, Tian Z, Sun Y, Du X, Guizani M. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. future Generation Computer Systems, 2020, 107(5): 433-442.
Rosenberg I, Shabtai A, Elovici Y, Rokach L. Adversarial machine learning attacks and defence methods in the cyber security domain. ACM Computing Surveys (CSUR), 2021, 54(5): 1-36.
Dhiman V, Kumar M. In search of cluster-based routing protocol for WSN using consensus algorithm. International Journal of Communication Networks and Distributed Systems, 2023, 29(3): 290-314.
Ikotun A M, Ezugwu A E, Abualigah L, Abuhaija B, Heming J. K-means clustering algorithms: a comprehensive review, variants analysis, and advances in the era of big data. Information Sciences, 2023, 622(3): 178-210.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika