Research on the Classification and Recognition Algorithm of Intrusion Events Leveraging Machine Learning Methodologies
Fiber optic perimeter security systems have emerged as an effective means for protecting critical infrastructure and sensitive areas, owing to their high sensitivity, resistance to electromagnetic interference, and capability for longdistance monitoring. However, challenges such as false alarms, mis...
Saved in:
| Published in: | 2025 International Conference on Communication Networks and Smart Systems Engineering (ICCNSE) pp. 224 - 229 |
|---|---|
| Main Authors: | , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.08.2025
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Fiber optic perimeter security systems have emerged as an effective means for protecting critical infrastructure and sensitive areas, owing to their high sensitivity, resistance to electromagnetic interference, and capability for longdistance monitoring. However, challenges such as false alarms, missed detections, and performance degradation in complex environments necessitate the development of intelligent intrusion detection algorithms. The Support Vector Machine (SVM) algorithm is a powerful classifier. It trains the model by finding the hyperplane that distinguishes between two classes and maximizing the margin. It is applicable to the processing of small and mediumsized datasets and nonlinear problems. However, it has high computational costs, is sensitive to parameters, and is difficult to interpret the model. As a result, its application is limited in the scenarios of optical fiber perimeter security intrusion recognition that involve processing large-scale data and have high requirements for real-time performance. This study proposes designing an intrusion detection algorithm for fiber optic security systems to enhance event recognition accuracy. Using deep learning techniques, particularly convolutional neural networks (CNNs), the paper classifies and recognizes fiber optic vibration signals. Key research activities include data preprocessing, network architecture design, and the training and evaluation of the deep learning model. Experimental results demonstrate the algorithm's effectiveness in identifying various intrusion events, it has effectively solved the problem of insufficient accuracy in identifying intrusion events caused by false alarms, missed alarms and performance fluctuations in complex environments in the practical application of fiber optic perimeter security systems, and improved the system's precise discrimination ability for different intrusion behaviors. |
|---|---|
| AbstractList | Fiber optic perimeter security systems have emerged as an effective means for protecting critical infrastructure and sensitive areas, owing to their high sensitivity, resistance to electromagnetic interference, and capability for longdistance monitoring. However, challenges such as false alarms, missed detections, and performance degradation in complex environments necessitate the development of intelligent intrusion detection algorithms. The Support Vector Machine (SVM) algorithm is a powerful classifier. It trains the model by finding the hyperplane that distinguishes between two classes and maximizing the margin. It is applicable to the processing of small and mediumsized datasets and nonlinear problems. However, it has high computational costs, is sensitive to parameters, and is difficult to interpret the model. As a result, its application is limited in the scenarios of optical fiber perimeter security intrusion recognition that involve processing large-scale data and have high requirements for real-time performance. This study proposes designing an intrusion detection algorithm for fiber optic security systems to enhance event recognition accuracy. Using deep learning techniques, particularly convolutional neural networks (CNNs), the paper classifies and recognizes fiber optic vibration signals. Key research activities include data preprocessing, network architecture design, and the training and evaluation of the deep learning model. Experimental results demonstrate the algorithm's effectiveness in identifying various intrusion events, it has effectively solved the problem of insufficient accuracy in identifying intrusion events caused by false alarms, missed alarms and performance fluctuations in complex environments in the practical application of fiber optic perimeter security systems, and improved the system's precise discrimination ability for different intrusion behaviors. |
| Author | Chen, Xi Liu, Chengxin Liu, Wei Ma, Yushu |
| Author_xml | – sequence: 1 givenname: Yushu surname: Ma fullname: Ma, Yushu email: mayushu@sylu.edu.cn organization: Ligong University,School of Information Science and Engineering Shenyang,Shenyang,China – sequence: 2 givenname: Xi surname: Chen fullname: Chen, Xi email: 18158897582@163.com organization: Ligong University,School of Information Science and Engineering Shenyang,Shenyang,China – sequence: 3 givenname: Chengxin surname: Liu fullname: Liu, Chengxin email: lcccx2002@163.com organization: Ligong University,School of Information Science and Engineering Shenyang,Shenyang,China – sequence: 4 givenname: Wei surname: Liu fullname: Liu, Wei email: Liuweizzsy@sylu.edu.cn organization: Ligong University,School of Information Science and Engineering Shenyang,Shenyang,China |
| BookMark | eNo10MFOAyEYBGBM9KC1b-ABH6AVCuz-HJtN1U2qJq33hrI_uyRbMIBNfHtr1dNkvsMc5oZchhiQkHvO5pwz_dA2zet2VVWSyfmCLdRJuZS81hdkqmsNQjGhBQO4JscNZjTJDjQGWgakzWhy9s5bU_yJTOjoBm3sgz_35djH5MtwoNHRNpT0mX94dcRQMl3jEZPpfejpi7GDD3gik8IZsAyxi2PsPeZbcuXMmHH6lxOyfVy9N8-z9dtT2yzXM69FmXWag7SV03IPAEoBYAcWrAHj6k4bxp0FY5VAJx2rq71iChbQKVEzAVZMyN3vqkfE3UfyB5O-dv9niG_vuFye |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICCNSE66404.2025.11144179 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350393088 |
| EndPage | 229 |
| ExternalDocumentID | 11144179 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i93t-d9184c6f94b8885588ed8c8ca8af7d9a01fc8ac53ef4f076b505828d537038c3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Sep 10 07:40:45 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i93t-d9184c6f94b8885588ed8c8ca8af7d9a01fc8ac53ef4f076b505828d537038c3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_11144179 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-Aug.-1 |
| PublicationDateYYYYMMDD | 2025-08-01 |
| PublicationDate_xml | – month: 08 year: 2025 text: 2025-Aug.-1 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | 2025 International Conference on Communication Networks and Smart Systems Engineering (ICCNSE) |
| PublicationTitleAbbrev | ICCNSE |
| PublicationYear | 2025 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.9167757 |
| Snippet | Fiber optic perimeter security systems have emerged as an effective means for protecting critical infrastructure and sensitive areas, owing to their high... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 224 |
| SubjectTerms | Accuracy Classification algorithms Convolutional neural networks Convolutional neural networks (CNNs) Data models Deep learning Fiber optic security systems Intrusion detection Intrusion detection algorithm Optical fibers Security Training Vibrations |
| Title | Research on the Classification and Recognition Algorithm of Intrusion Events Leveraging Machine Learning Methodologies |
| URI | https://ieeexplore.ieee.org/document/11144179 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEF1sEfGkYsVvVvCaNm328yilxUItxXrorWx2Z7Wgidja3-_sNlE8ePCWDCEhs5ndmc178wi5zTxzaQ5pwlUPEmYx0nMhTOKUZtIwhRlJbJk_lpOJms_1tCKrRy4MAETwGbTDYfyX70r7GbbKOhiXUTGrQRpSii1Za4_cVH0zO6N-fzIbCMHSsFnS4-36-l_KKXHhGB7885GHpPVDwaPT78XliOxAcUw2NU6OlgXFzI1GScsA9on-paZw9LFGBOH53etzicX_yxstPR0VgV8RzIOAcVzRMeBnHEWK6EOEVAKtuq2iIQpLx4kRVi0yGw6e-vdJJZyQLHW2TpzGss0Kr1mO9S3nSoFTVlmjjJdOm7TrrTKWZ-CZT6XIMQvCwsvxDMNf2eyENIuygFNCFe_xzLtM4P1wRpVaMwbQVdqBxWDPz0gruGzxvu2Msai9df6H_YLsh4HZAuguSRPfG67Irt2sl6uP6zieXzOHpE4 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8MwDI1gIOAEiCG-CRLXbt2atMkRTZs20VUT22G3qU0cmAQtomO_HydrQRw4cGssNZWc2rGTZz9C7gPDtJ-B73HRBY8ptPQsDFNPC8milAmMSFzL_DhKEjGfy0lVrO5qYQDAgc-gZR_dXb4u1Kc9KmujXTrGrG2ywxkmPptyrT1yV3XObI96vWTaD0Pm2-OSLm_Vb_ziTnFbx-Dwnx89Is2fIjw6-d5ejskW5CdkXSPlaJFTjN2oI7W0cB-nYZrmmj7VmCAcP7w-F5j-v7zRwtBRbissrLhvUY4ljQF_ZEdTRMcOVAm06reKAkct7VwjlE0yHfRnvaFXUSd4SxmsPC0xcVOhkSzDDJdzIUALJVQqUhNpmfodo0SqeACGGT8KM4yDMPXSPEAHIFRwShp5kcMZoYJ3eWB0EOJ86FMjKRkD6AipQaG5Z-ekaVW2eN_0xljU2rr4Q35L9oezcbyIR8njJTmwi7SB012RBuoArsmuWq-W5ceNW9sv6denlQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2025+International+Conference+on+Communication+Networks+and+Smart+Systems+Engineering+%28ICCNSE%29&rft.atitle=Research+on+the+Classification+and+Recognition+Algorithm+of+Intrusion+Events+Leveraging+Machine+Learning+Methodologies&rft.au=Ma%2C+Yushu&rft.au=Chen%2C+Xi&rft.au=Liu%2C+Chengxin&rft.au=Liu%2C+Wei&rft.date=2025-08-01&rft.pub=IEEE&rft.spage=224&rft.epage=229&rft_id=info:doi/10.1109%2FICCNSE66404.2025.11144179&rft.externalDocID=11144179 |