Abstract
Wireless sensor networks (WSNs) have been affected by data due to their placement in random and risky atmospheres. Sensitive data in computer systems are increasing drastically and, thus, there is an utmost need to provide efficient cybersecurity. While detecting security bugs, software engineers discuss these bugs privately and they are not made public until security patches are available. This leads to many failures such as communication failure and hardware or software failure. This work aims to assist software developers in classifying bug reports in a better way by identifying security vulnerabilities as security bugs reports (SBRs) through the tuning of learners and data preprocessors. Practically, machine learning (ML) techniques are used to detect intrusions based on data and to learn by what means secure and nonsecure bugs can be differentiated. This work proposes a rudimentary classification model for bug prediction by involving Adaptive Ensemble Learning with Hyper Optimization (AEL-HO) technique. Classifier performance is analyzed based on the F1-score, detection accuracy (DA), Matthew’s correlation coefficients (MCC), and true positive rate (TPR) parameters. Comparisons are made among different already-existing classifiers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alenezi, M., Magel, K., & Banitaan, S. (2013). Efficient bug triaging using text mining. Journal of Software, 8(9), 2185–2190.
Guo, S., Chen, R., Li, H., Zhang, T., & Liu, Y. (2019). Identify severity bug report with distribution imbalance by CR-SMOTE and ELM. International Journal of Software Engineering and Knowledge Engineering, 29(6), 139–175.
**dal, R., Malhotra, R., & Jain, A. (2017). Prediction of defect severity by mining software project reports. International Journal of Systems Assurance Engineering and Management, 8, 334–351.
Kamei, Y., Shihab, E., Adams, B., et al. (2013). A large-scale empirical study of just-in-time quality assurance. IEEE Transactions on Software Engineering, 39(6), 757–773.
Kanwal, J., & Maqbool, O. (2012). Bug prioritization to facilitate bug report triage. Journal of Computer Science and Technology, 27(2), 397–412.
Lamkanfi, S., Demeyer, E. G., & Goethals, B. (2010). Predicting the severity of a reported bug. In Mining Software Repositories (MSR) (pp. 1–10).
Li, H., Gao, G., Chen, R., Ge, X., & Guo, S. (2019). The influence ranking for testers in bug tracking systems. International Journal of Software Engineering and Knowledge Engineering, 29(1), 1–21.
Sampathkumar, A., & Vivekanandan, P. (2018). Gene selection using multiple queen colonies in large scale machine learning. Journal of Electrical Engineering, 9(6), 97–111.
Singh, V. B., & Chaturvedi, K. K. (2011). Bug tracking and reliability assessment system. International Journal of Software Engineering and Its Applications, 5(4), 17–30.
Yang, X.-L., Lo, D., **a, X., Huang, Q., & Sun, J.-L. (2017). High-impact bug report identification with imbalanced learning strategies. Journal of Computer Science and Technology, 32(1), 181–198.
Yu, H., Zhang, W. Y., & Li, H. (2019). Data-tolerant compensation control based on sliding mode technique of unmanned marine vehicles subject to unknown persistent ocean disturbances. International Journal of Control, Automation, and Systems, 18(9), 739–752.
Zhang, T., Chen, J., Yang, G., Lee, B., & Luo, X. (2016). Towards more accurate severity prediction and fixer recommendation of software bugs. Journal of Systems and Software, 117, 166–184.
Alrosan, A., Alomoush, W., Norwawi, N., Alswaitti, M., & Makhadmeh, S. N. (2020). An improved artificial bee colony algorithm based on mean best-guided approach for continuous optimization problems and real brain MRI images segmentation. Neural Computing and Applications, 33(3), 1671–1697.
Elgamal, Z. M., Yasin, N. B. M., Tubishat, M., Alswaitti, M., & Mirjalili, S. (2020). An improved Harris hawks optimization algorithm with simulated annealing for feature selection in the medical field. IEEE Access, 8, 186638–186652.
Tubishat, M., Alswaitti, M., Mirjalili, S., Al-Garadi, M. A., Alrashdan, M. T., et al. (2020). Dynamic butterfly optimization algorithm for feature selection. IEEE Access, 8, 194303–194314.
Rohit, R., Kumar, S., & Mahmood, M. R. (2020). Color object detection based image retrieval using ROI segmentation with multi-feature method. Wireless Personal Communications, 112(1), 169–192.
Sandeep, K., Jain, A., Shukla, A. P., Singh, S., Raja, R., Rani, S., Harshitha, G., AlZain, M. A., & Masud, M. (2021). A comparative analysis of machine learning algorithms for detection of organic and nonorganic cotton diseases. Mathematical Problems in Engineering, 2021. https://doi.org/10.1155/2021/1790171
Naseem, U., Razzak, I., Khan, S. K., & Prasad, M. (2020). A comprehensive survey on word representation models: From classical to state-of-the-art word representation language models. ar**v preprint ar**v, 15036.
Vikram, K. K., & Narayana, V. L. (2016). Cross-layer Multi Channel MAC protocol for wireless sensor networks in 2.4-GHz ISM band. In IEEE conference on, computing, analytics and security trends (CAST-2016) on DEC 19–21, 2016 at Department of Computer Engineering & information technology. College of Engineering, Pune, Maharashtra. https://doi.org/10.1109/CAST.2016.7914986
Tiwari, L., Raja, R., Awasthi, V., Rohit Miri, G. R., Sinha, M. H., & Alkinani, K. P. (2021). Detection of lung nodule and cancer using novel Mask-3 FCM and TWEDLNN algorithms, 108882. Measurement, 172. https://doi.org/10.1016/j.measurement.2020.108882, ISSN 0263-2241.
Raja, R., Raja, H., Patra, R. K., Mehta, K., & Gupta, A. (2020). Assessment methods of cognitive ability of human brains for inborn intelligence potential using pattern recognition. In Biometric systems. IntechOpen. ISBN 978-1-78984-188-6.
Vikram, K., & Sahoo, S. K. (2017, December). Load Aware Channel estimation and channel scheduling for 2.4GHz frequency band wireless networks for smart grid applications. International Journal on Smart Sensing and Intelligent Systems, 10(4), 879–902. https://doi.org/10.21307/ijssis-2018-023
Naseem, U., Khan, S. K., Farasat, M., & Ali, F. (2019). Abusive language detection: A comprehensive review. Indian Journal of Science Technology, 12(45), 1–13.
Sharma, D. K., Singh, B., Regin, R., Steffi, R., & Chakravarthi, M. K. (2021). Efficient classification for neural machines interpretations based on mathematical models. In 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 2015–2020). https://doi.org/10.1109/ICACCS51430.2021.9441718
Arslan, F., Singh, B., Sharma, D. K., Regin, R., Steffi, R., & Suman Rajest, S. (2021). Optimization technique approach to resolve food sustainability problems. In 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 25–30). https://doi.org/10.1109/ICCIKE51210.2021.9410735
Ogunmola, G. A., Singh, B., Sharma, D. K., Regin, R., Rajest, S. S., & Singh, N. (2021). Involvement of distance measure in assessing and resolving efficiency environmental obstacles. In 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 13–18). https://doi.org/10.1109/ICCIKE51210.2021.9410765
Sharma, D. K., Singh, B., Raja, M., Regin, R., & Rajest, S. S. (2021). An efficient python approach for simulation of Poisson distribution. In 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 2011–2014). https://doi.org/10.1109/ICACCS51430.2021.9441895
Sharma, D. K., Singh, B., Herman, E., Regine, R., Rajest, S. S., & Mishra, V. P. (2021). Maximum information measure policies in reinforcement learning with deep energy-based model. In 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 19–24). https://doi.org/10.1109/ICCIKE51210.2021.9410756
Metwaly, A. F., Rashad, M. Z., Omara, F. A., & Megahed, A. A. (2014). Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption. The European Physical Journal Special Topics, 223(8), 1711–1728.
Farouk, A., Zakaria, M., Megahed, A., & Omara, F. A. (2015). A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Scientific Reports, 5(1), 1–17.
Naseri, M., Raji, M. A., Hantehzadeh, M. R., Farouk, A., Boochani, A., & Solaymani, S. (2015). A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation. Quantum Information Processing, 14(11), 4279–4295.
Wang, M. M., Wang, W., Chen, J. G., & Farouk, A. (2015). Secret sharing of a known arbitrary quantum state with noisy environment. Quantum Information Processing, 14(11), 4211–4224.
Zhou, N. R., Liang, X. R., Zhou, Z. H., & Farouk, A. (2016). Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise. Security and Communication Networks, 9(11), 1398–1404.
Supritha, R., Chakravarthi, M. K., & Ali, S. R. (2016). An embedded visually impaired reconfigurable author assistance system using LabVIEW. In Microelectronics, electromagnetics and telecommunications (pp. 429–435). Springer.
Ganesh, D., Naveed, S. M. S., & Chakravarthi, M. K. (2016). Design and implementation of robust controllers for an intelligent incubation Pisciculture system. Indonesian Journal of Electrical Engineering and Computer Science, 1(1), 101–108.
Chakravarthi, M. K., Gupta, K., Malik, J., & Venkatesan, N. (2015, December). Linearized PI controller for real-time delay dominant second order nonlinear systems. In 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 236–240). IEEE.
Yousaf, A., Umer, M., Sadiq, S., Ullah, S., Mirjalili, S., Rupapara, V., & Nappi, M. (2021b). Emotion recognition by textual tweets classification using voting classifier (LR-SGD). IEEE Access, 9, 6286–6295. https://doi.org/10.1109/access.2020.3047831
Sadiq, S., Umer, M., Ullah, S., Mirjalili, S., Rupapara, V., & Nappi, M. (2021). Discrepancy detection between actual user reviews and numeric ratings of Google App store using deep learning. Expert Systems with Applications, 181, 115111. https://doi.org/10.1016/j.eswa.2021.115111
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ramirez-Asis, E.H., Zapata, M.A.S., Sivakumaran, A.R., Phasinam, K., Chaturvedi, A., Regin, R. (2023). Data Detection in Wireless Sensor Network Based on Convex Hull and Naïve Bayes Algorithm. In: Pandey, S., Shanker, U., Saravanan, V., Ramalingam, R. (eds) Role of Data-Intensive Distributed Computing Systems in Designing Data Solutions. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-15542-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-15542-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-15541-3
Online ISBN: 978-3-031-15542-0
eBook Packages: EngineeringEngineering (R0)