Volume 21 No 1 (2023)
 Download PDF
A Novel Machine Learning assisted Hierarchical Clustering approach for Wireless UAV System
Soufiene Ben Othman , Abdullah Ali Bahattab
Abstract
The current wireless Unmanned Aerial Vehicle (UAV) approaches based on supervised learning have a high false detection rate, making it difficult to recognise novel types of attack activities, and increasing the cost of collecting labelled network data. The method employs unsupervised learning and does not require human tagging of large amounts of wireless network data. As a result, it can quickly obtain training data sets and discover unknown assault patterns. The multi-view cosine distance method for hierarchical clustering is introduced. This makes clustering results more rational, network behavior assessment more accurate, and intrusion detection false detection rate lowered. The experiment uses the AWID (Aegean WIFI Intrusion Dataset) attack data collection. The principle component analysis approach decreases the dimensionality of the experimental data set, reducing the temporal complexity of the intrusion detection algorithm. The experimental findings reveal that the proposed multi-view hierarchical clustering wireless network intrusion detection algorithm outperforms the classic wireless network intrusion detection method in terms of detection rate, false detection rate, and unknown attack types
Keywords
Multi-View; UAV; Hierarchical Clustering; Wireless Network; Intrusion Detection; Principal Component Analysis
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.