SD-WSN Network Security Detection Methods for Online Network Education

Zhenpeng Zhang

Abstract


Online network education faces serious information security problems, and traditional network security detection methods are insufficient to deal with new types of attacks and unknown threats. To improve the security level of online education, the paper proposes an information security detection method for online education based on improved clustering detection algorithm and software-defined wireless sensor network to improve the detection accuracy. The study combines the improved clustering detection algorithm and software-defined wireless sensor network technology to construct a novel network security detection model. In the comparison test of the improved clustering detection algorithm, it is found that the algorithm has the lowest training error of 0.040 and 0.031 in the test and training sets, which are both better than the comparison algorithm. Subsequent empirical analysis of the network security detection model shows that the research proposed detection accuracy and detection time are 90.3% and 2.6s respectively, which are significantly better than the other models. The above data validate that the designed novel network security detection model can better safeguard the information security and user data privacy of online network education. The study not only improves the information security level of online education, but also provides strong support for promoting its healthy development.


Full Text:

PDF

References


Saranya T, Sridevi S, Deisy C, Chung T D, Khan M A. Performance analysis of machine learning algorithms in intrusion detection system: a review. Procedia Computer Science, 2020, 171(5): 1251-1260.

Hebbi C, Mamatha H. Comprehensive dataset building and recognition of isolated handwritten kannada characters using machine learning models. Artificial Intelligence and Applications, 2023, 1(3): 179-190.

Gheisari M, Hamidpour H, Liu Y, Saedi P, Raza A, Jalili A, Rokhsati H, Amin R. Data mining techniques for web mining: a survey. Artificial Intelligence and Applications, 2023, 1(1): 3-10.

Cho W, Kim J, Lee C. Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants. IET Information Security, 2021, 15(6): 417-427.

Logeshwaran J. AICSA-an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks. ICTACT Journal on Data Science and Machine Learning, 2021, 3(1): 251-253.

Shafique K, Khawaja B A, Sabir F, Qazi S, Mustaqim M. Internet of things (IoT) for next-generation smart systems: a review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access, 2020, 8(3): 23022-23040.

Chen D J I Z. Automatic vehicle license plate detection using K-means clustering algorithm and CNN. Journal of Electrical Engineering and Automation, 2021, 3(1): 15-23.

Banerjee A, Sufian A. Smart-Green-Mult (SGM): overhear from topological kingpins in software defined wireless sensor networks. Journal of Ambient Intelligence and Humanised Computing, 2021, 12(5): 387-404.

Younus M U, Khan M K, Bhatti A R. Improving the software-defined wireless sensor networks routing performance using reinforcement learning. ieee Internet of Things Journal, 2021, 9(5): 3495-3508.

Nagaraja A, Uma B, Gunupudi R. UTTAMA: An intrusion detection system based on feature clustering and feature transformation. foundations of Science, 2020, 25(4): 1049-1075.

Liang W, Zhang K, Tang M, He D, Li K C. Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. ieee internet of Things Journal, 2021, 9(16): 14741-14751.

Dincelli E, Chengalur-Smith I S. Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling. European Journal of Information Systems, 2020, 29(6): 669-687.

Guo J, Li C, Zhang G, Sun Y, Bie R. Blockchain-enabled digital rights management for multimedia resources of online education. multimedia Tools and Applications, 2020, 79(8): 9735-9755.

Kamar E, Howell C J, Maimon D, Berenblum T. The moderating role of thoughtfully reflective decision-making on the relationship between information security messages and smishing victimisation: an experiment. Justice Quarterly, 2023, 40(6): 837-858.

Arbanas K, Spremic M, Zajdela Hrustek N. Holistic framework for evaluating and improving information security culture. aslib Journal of Information Management, 2021, 73(5): 699-719.

Shafiq M, Tian Z, Sun Y, Du X, Guizani M. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. future Generation Computer Systems, 2020, 107(5): 433-442.

Rosenberg I, Shabtai A, Elovici Y, Rokach L. Adversarial machine learning attacks and defence methods in the cyber security domain. ACM Computing Surveys (CSUR), 2021, 54(5): 1-36.

Dhiman V, Kumar M. In search of cluster-based routing protocol for WSN using consensus algorithm. International Journal of Communication Networks and Distributed Systems, 2023, 29(3): 290-314.

Ikotun A M, Ezugwu A E, Abualigah L, Abuhaija B, Heming J. K-means clustering algorithms: a comprehensive review, variants analysis, and advances in the era of big data. Information Sciences, 2023, 622(3): 178-210.




DOI: https://doi.org/10.31449/inf.v48i21.6257

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.