SlideShare a Scribd company logo
INTRUSION DETECTION IN A
SMART FOREST-FIRE EARLY
WARNING SENSORY SYSTEM
Group[2]
Ratul ,Ravali,Suraj and Amani
OBJECTIVE
Finding an approach for early smart detection of forest fires focusing on intrusions and
malfunctions using neural networks.
2
METHODOLOGY
 Field Experiment
 Data Analysis
 Determination of Classes
 Data Preprocessing
 Data Processing : Slow motion the data
 Data Processing : Working on data with WEKA
 Comparing Results
 Compare existing work and papers
 Future Work
3
THE EXPERIMENT
4
● Radio communication on 2.4-2.48GHz ISM band,
IEEE 802.15.4 compliant.
● 250kbps data rate.
● Range up to 50m indoors and 500m outdoors.
● Atmel ATmega1281 based.
● 128KB program flash, 512KB measurement flash,
8KB RAM
DATA ANALYSIS
5
DATA ANALYSIS : SINGLE NODE BEHAVIOUR
6
DATA ANALYSIS : NEIGHBOUR NODE BEHAVIOUR
7
PRIMARY CLASSES
 Malfunctioning:
 Malfunctioning for While
 Malfunctioning for Long
 Intrusion:
 Intrusion detection because of neighbourhood nodes
8
DATA ANALYSIS : BEHAVIOUR OF DEAD NODE
9
ALL CLASSES
Malfunctioning:
Malfunctioning for While
Malfunctioning for Long
Intrusion:
Intrusion detection because of neighbourhood nodes
Dead Node behave like Working Node.
Secondary Classes:
Fire-No Fire
10
DATA PREPROCESSING
Data preprocessing include two stages :
 Stage 1: Filling missing data to track each node if its not working and for how long.
 Stage 2: Adding neighbors for each node to do comparison
11
DATA PROCESSING
 Stage 1: Slow motion the data using a script.
 Stage 2: Creating the super vector.
 Stage 3: Feeding the data into WEKA.
 Stage 4:Using different classifiers in WEKA.
 Stage 5:Analyze and compare the different results.
12
SLOW MOTION TECHNIQUE
13
COMPARING WITH NEIGHBOR DATA
for all node nodei do
for all neighbor neij do
for specific amount of time tim do
if ( diff of reading between neighbor > threshold_value)
occourance ++
else
continue
endif
endfor
if( occourance > target_number_of_occourance )
number_of_node_with_difference ++
else
number_of_node_with_difference = 0
endif
endfor
if(number_of_node_with_difference == number of node nodei has)
nodei is in potential threat
endif
endfor
14
SUPERVECTORSAMPLE
15
RESULTSFORMALFUNCTIONS:
BASENET
16
RESULTSFORMALFUNCTIONS:
LVQ1
17
RESULTSFORMALFUNCTIONS:
MULTIPASSLVQ
18
RESULTSFORMALFUNCTIONS:
RANDOMFOREST
19
RESULTSFORMALFUNCTIONS:
SMO
20
INTRUSION IMPLEMENTATION
21
WE IMPLEMENT INTRUSION BY ALTERING NODE
NUMBER 13.
AND THE RESULT WITH SAME CLASSIFIERS SHOWS AS
FOLLOWING IN NEXT SLIDES.
RESULTSFORMALFUNCTIONS:
BAYESNET
22
RESULTSFORMALFUNCTIONS:
IBKWITH10FOLD
23
RESULTSFORMALFUNCTIONS:
LAZYIBK
24
RESULTSFORMALFUNCTIONS:
LVQ1
25
RESULTSFORMALFUNCTIONS:
MULTIPASS_LVQ
26
RESULTSFORMALFUNCTIONS:
RANDOMFOREST
27
RESULTSFORMALFUNCTIONS:
SMO
28
CONCLUSION
 This work included spatial & temporal components at each time stamp and weka results for
each class.
 The problem was modeled as event detection task, where the aim was the prediction of the
Asynchronous event.
29
FUTURE WORK
 Adding virtual nodes to implement intrusion.( Done)
 Adding weight to the classes.
30

More Related Content

PPTX
wireless sensor networks & application :forest fire detection
PPTX
Using wireless sensor networks for reliable forest fires
PDF
Monitoring of Forest Fire Detection System using ZigBee
PPT
gcettb presentation on sensor network
PPTX
Wireless sensor network (WSN)
PPTX
Wireless Sensor Networks (WSN)
PPTX
Hetrogenous wireless sensor network
DOCX
Wireless sensor network report
wireless sensor networks & application :forest fire detection
Using wireless sensor networks for reliable forest fires
Monitoring of Forest Fire Detection System using ZigBee
gcettb presentation on sensor network
Wireless sensor network (WSN)
Wireless Sensor Networks (WSN)
Hetrogenous wireless sensor network
Wireless sensor network report

What's hot (19)

PPTX
Sensor Network
PPT
WIRELESS SENSOR NETWORK
PDF
Modelling of wireless sensor networks for detection land and forest fire hotspot
PDF
seminar report on wireless Sensor network
PPT
Wireless sensor network
DOC
Report on WIRELESS SENSOR NETWORK
DOCX
Seminar report on WSN technology
PDF
IRJET- An IoT Based Forest Fire Detection and Prevention System using Raspber...
PDF
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
PDF
A Survey on Routing Protocols in Wireless Sensor Networks
PPTX
Wireless Sensor Networks ppt
PPTX
FPGA Based Data Processing for Real-time WSN Applications:
PDF
IJRET-V1I1P1 - Forest Fire Detection Based on Wireless Image Processing
PDF
533 450-457
PPTX
Data aggregation in wireless sensor network , 11751 d5811
PPTX
Wireless sensor networks (Yogesh Chandra Fulara)
PPT
paper presentation _ survey of wireless sensor netwrok
PDF
IRJET- Forest Fire Detection and Alerting System
PDF
Wireless sensor networks
Sensor Network
WIRELESS SENSOR NETWORK
Modelling of wireless sensor networks for detection land and forest fire hotspot
seminar report on wireless Sensor network
Wireless sensor network
Report on WIRELESS SENSOR NETWORK
Seminar report on WSN technology
IRJET- An IoT Based Forest Fire Detection and Prevention System using Raspber...
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
A Survey on Routing Protocols in Wireless Sensor Networks
Wireless Sensor Networks ppt
FPGA Based Data Processing for Real-time WSN Applications:
IJRET-V1I1P1 - Forest Fire Detection Based on Wireless Image Processing
533 450-457
Data aggregation in wireless sensor network , 11751 d5811
Wireless sensor networks (Yogesh Chandra Fulara)
paper presentation _ survey of wireless sensor netwrok
IRJET- Forest Fire Detection and Alerting System
Wireless sensor networks
Ad

Similar to Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System (20)

PDF
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
PPT
SRM REVIEW PRESENTATION (27.01.2025).ppt
PDF
Secured node detection technique based on artificial neural network for wirel...
PDF
Neighbor Node Trust Based Intrusion Detection System for WSN
PDF
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
PPTX
Intrusion detection system
PDF
Smart surveillance using deep learning
PPTX
Network Intrusion Detection (1)-converted-1.pptx
PDF
Anomaly Detection in Smart Home IoT Systems Using Machine Learning Approaches
PPTX
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
PDF
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
PDF
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
PPT
"An adaptive modular approach to the mining of sensor network ...
PDF
Hybrid intrusion detection model for hierarchical wireless sensor network usi...
PPTX
Hybrid black chain based on authentication identified scheme
PPTX
Intrusion detection systems in wireless sensor networks
PPTX
Intrusion detection systems in wireless sensor networks
PPTX
Machine Learning
PPTX
intrusion-detection-using-ML.pptx
DOCX
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
SRM REVIEW PRESENTATION (27.01.2025).ppt
Secured node detection technique based on artificial neural network for wirel...
Neighbor Node Trust Based Intrusion Detection System for WSN
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
Intrusion detection system
Smart surveillance using deep learning
Network Intrusion Detection (1)-converted-1.pptx
Anomaly Detection in Smart Home IoT Systems Using Machine Learning Approaches
An Asynchronous Distributed Deep Learning Based Intrusion Detection System fo...
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
"An adaptive modular approach to the mining of sensor network ...
Hybrid intrusion detection model for hierarchical wireless sensor network usi...
Hybrid black chain based on authentication identified scheme
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Machine Learning
intrusion-detection-using-ML.pptx
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
Ad

More from Ratul Alahy (6)

PPTX
Object recognition of CIFAR - 10
PPTX
Regression vs Deep Neural net vs SVM
PPTX
Regression vs Neural Net
PPTX
Digital Right Management
PPTX
Semantics Empowered Social Computing
PPTX
Shape Matching and Object Recognition Using Shape Contexts
Object recognition of CIFAR - 10
Regression vs Deep Neural net vs SVM
Regression vs Neural Net
Digital Right Management
Semantics Empowered Social Computing
Shape Matching and Object Recognition Using Shape Contexts

Recently uploaded (20)

PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
composite construction of structures.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Digital Logic Computer Design lecture notes
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Geodesy 1.pptx...............................................
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
web development for engineering and engineering
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Well-logging-methods_new................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
PPT on Performance Review to get promotions
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Lesson 3_Tessellation.pptx finite Mathematics
composite construction of structures.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Digital Logic Computer Design lecture notes
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
additive manufacturing of ss316l using mig welding
Geodesy 1.pptx...............................................
OOP with Java - Java Introduction (Basics)
web development for engineering and engineering
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Well-logging-methods_new................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPT on Performance Review to get promotions
Foundation to blockchain - A guide to Blockchain Tech
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Strings in CPP - Strings in C++ are sequences of characters used to store and...

Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System