Research on the Classification and Recognition Algorithm of Intrusion Events Leveraging Machine Learning Methodologies

Fiber optic perimeter security systems have emerged as an effective means for protecting critical infrastructure and sensitive areas, owing to their high sensitivity, resistance to electromagnetic interference, and capability for longdistance monitoring. However, challenges such as false alarms, mis...

Full description

Saved in:
Bibliographic Details
Published in:2025 International Conference on Communication Networks and Smart Systems Engineering (ICCNSE) pp. 224 - 229
Main Authors: Ma, Yushu, Chen, Xi, Liu, Chengxin, Liu, Wei
Format: Conference Proceeding
Language:English
Published: IEEE 01.08.2025
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Fiber optic perimeter security systems have emerged as an effective means for protecting critical infrastructure and sensitive areas, owing to their high sensitivity, resistance to electromagnetic interference, and capability for longdistance monitoring. However, challenges such as false alarms, missed detections, and performance degradation in complex environments necessitate the development of intelligent intrusion detection algorithms. The Support Vector Machine (SVM) algorithm is a powerful classifier. It trains the model by finding the hyperplane that distinguishes between two classes and maximizing the margin. It is applicable to the processing of small and mediumsized datasets and nonlinear problems. However, it has high computational costs, is sensitive to parameters, and is difficult to interpret the model. As a result, its application is limited in the scenarios of optical fiber perimeter security intrusion recognition that involve processing large-scale data and have high requirements for real-time performance. This study proposes designing an intrusion detection algorithm for fiber optic security systems to enhance event recognition accuracy. Using deep learning techniques, particularly convolutional neural networks (CNNs), the paper classifies and recognizes fiber optic vibration signals. Key research activities include data preprocessing, network architecture design, and the training and evaluation of the deep learning model. Experimental results demonstrate the algorithm's effectiveness in identifying various intrusion events, it has effectively solved the problem of insufficient accuracy in identifying intrusion events caused by false alarms, missed alarms and performance fluctuations in complex environments in the practical application of fiber optic perimeter security systems, and improved the system's precise discrimination ability for different intrusion behaviors.
AbstractList Fiber optic perimeter security systems have emerged as an effective means for protecting critical infrastructure and sensitive areas, owing to their high sensitivity, resistance to electromagnetic interference, and capability for longdistance monitoring. However, challenges such as false alarms, missed detections, and performance degradation in complex environments necessitate the development of intelligent intrusion detection algorithms. The Support Vector Machine (SVM) algorithm is a powerful classifier. It trains the model by finding the hyperplane that distinguishes between two classes and maximizing the margin. It is applicable to the processing of small and mediumsized datasets and nonlinear problems. However, it has high computational costs, is sensitive to parameters, and is difficult to interpret the model. As a result, its application is limited in the scenarios of optical fiber perimeter security intrusion recognition that involve processing large-scale data and have high requirements for real-time performance. This study proposes designing an intrusion detection algorithm for fiber optic security systems to enhance event recognition accuracy. Using deep learning techniques, particularly convolutional neural networks (CNNs), the paper classifies and recognizes fiber optic vibration signals. Key research activities include data preprocessing, network architecture design, and the training and evaluation of the deep learning model. Experimental results demonstrate the algorithm's effectiveness in identifying various intrusion events, it has effectively solved the problem of insufficient accuracy in identifying intrusion events caused by false alarms, missed alarms and performance fluctuations in complex environments in the practical application of fiber optic perimeter security systems, and improved the system's precise discrimination ability for different intrusion behaviors.
Author Chen, Xi
Liu, Chengxin
Liu, Wei
Ma, Yushu
Author_xml – sequence: 1
  givenname: Yushu
  surname: Ma
  fullname: Ma, Yushu
  email: mayushu@sylu.edu.cn
  organization: Ligong University,School of Information Science and Engineering Shenyang,Shenyang,China
– sequence: 2
  givenname: Xi
  surname: Chen
  fullname: Chen, Xi
  email: 18158897582@163.com
  organization: Ligong University,School of Information Science and Engineering Shenyang,Shenyang,China
– sequence: 3
  givenname: Chengxin
  surname: Liu
  fullname: Liu, Chengxin
  email: lcccx2002@163.com
  organization: Ligong University,School of Information Science and Engineering Shenyang,Shenyang,China
– sequence: 4
  givenname: Wei
  surname: Liu
  fullname: Liu, Wei
  email: Liuweizzsy@sylu.edu.cn
  organization: Ligong University,School of Information Science and Engineering Shenyang,Shenyang,China
BookMark eNo10MFOAyEYBGBM9KC1b-ABH6AVCuz-HJtN1U2qJq33hrI_uyRbMIBNfHtr1dNkvsMc5oZchhiQkHvO5pwz_dA2zet2VVWSyfmCLdRJuZS81hdkqmsNQjGhBQO4JscNZjTJDjQGWgakzWhy9s5bU_yJTOjoBm3sgz_35djH5MtwoNHRNpT0mX94dcRQMl3jEZPpfejpi7GDD3gik8IZsAyxi2PsPeZbcuXMmHH6lxOyfVy9N8-z9dtT2yzXM69FmXWag7SV03IPAEoBYAcWrAHj6k4bxp0FY5VAJx2rq71iChbQKVEzAVZMyN3vqkfE3UfyB5O-dv9niG_vuFye
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCNSE66404.2025.11144179
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350393088
EndPage 229
ExternalDocumentID 11144179
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i93t-d9184c6f94b8885588ed8c8ca8af7d9a01fc8ac53ef4f076b505828d537038c3
IEDL.DBID RIE
IngestDate Wed Sep 10 07:40:45 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i93t-d9184c6f94b8885588ed8c8ca8af7d9a01fc8ac53ef4f076b505828d537038c3
PageCount 6
ParticipantIDs ieee_primary_11144179
PublicationCentury 2000
PublicationDate 2025-Aug.-1
PublicationDateYYYYMMDD 2025-08-01
PublicationDate_xml – month: 08
  year: 2025
  text: 2025-Aug.-1
  day: 01
PublicationDecade 2020
PublicationTitle 2025 International Conference on Communication Networks and Smart Systems Engineering (ICCNSE)
PublicationTitleAbbrev ICCNSE
PublicationYear 2025
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.9167757
Snippet Fiber optic perimeter security systems have emerged as an effective means for protecting critical infrastructure and sensitive areas, owing to their high...
SourceID ieee
SourceType Publisher
StartPage 224
SubjectTerms Accuracy
Classification algorithms
Convolutional neural networks
Convolutional neural networks (CNNs)
Data models
Deep learning
Fiber optic security systems
Intrusion detection
Intrusion detection algorithm
Optical fibers
Security
Training
Vibrations
Title Research on the Classification and Recognition Algorithm of Intrusion Events Leveraging Machine Learning Methodologies
URI https://ieeexplore.ieee.org/document/11144179
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEF1sEfGkYsVvVvCaNm328yilxUItxXrorWx2Z7Wgidja3-_sNlE8ePCWDCEhs5ndmc178wi5zTxzaQ5pwlUPEmYx0nMhTOKUZtIwhRlJbJk_lpOJms_1tCKrRy4MAETwGbTDYfyX70r7GbbKOhiXUTGrQRpSii1Za4_cVH0zO6N-fzIbCMHSsFnS4-36-l_KKXHhGB7885GHpPVDwaPT78XliOxAcUw2NU6OlgXFzI1GScsA9on-paZw9LFGBOH53etzicX_yxstPR0VgV8RzIOAcVzRMeBnHEWK6EOEVAKtuq2iIQpLx4kRVi0yGw6e-vdJJZyQLHW2TpzGss0Kr1mO9S3nSoFTVlmjjJdOm7TrrTKWZ-CZT6XIMQvCwsvxDMNf2eyENIuygFNCFe_xzLtM4P1wRpVaMwbQVdqBxWDPz0gruGzxvu2Msai9df6H_YLsh4HZAuguSRPfG67Irt2sl6uP6zieXzOHpE4
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8MwDI1gIOAEiCG-CRLXbt2atMkRTZs20VUT22G3qU0cmAQtomO_HydrQRw4cGssNZWc2rGTZz9C7gPDtJ-B73HRBY8ptPQsDFNPC8milAmMSFzL_DhKEjGfy0lVrO5qYQDAgc-gZR_dXb4u1Kc9KmujXTrGrG2ywxkmPptyrT1yV3XObI96vWTaD0Pm2-OSLm_Vb_ziTnFbx-Dwnx89Is2fIjw6-d5ejskW5CdkXSPlaJFTjN2oI7W0cB-nYZrmmj7VmCAcP7w-F5j-v7zRwtBRbissrLhvUY4ljQF_ZEdTRMcOVAm06reKAkct7VwjlE0yHfRnvaFXUSd4SxmsPC0xcVOhkSzDDJdzIUALJVQqUhNpmfodo0SqeACGGT8KM4yDMPXSPEAHIFRwShp5kcMZoYJ3eWB0EOJ86FMjKRkD6AipQaG5Z-ekaVW2eN_0xljU2rr4Q35L9oezcbyIR8njJTmwi7SB012RBuoArsmuWq-W5ceNW9sv6denlQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2025+International+Conference+on+Communication+Networks+and+Smart+Systems+Engineering+%28ICCNSE%29&rft.atitle=Research+on+the+Classification+and+Recognition+Algorithm+of+Intrusion+Events+Leveraging+Machine+Learning+Methodologies&rft.au=Ma%2C+Yushu&rft.au=Chen%2C+Xi&rft.au=Liu%2C+Chengxin&rft.au=Liu%2C+Wei&rft.date=2025-08-01&rft.pub=IEEE&rft.spage=224&rft.epage=229&rft_id=info:doi/10.1109%2FICCNSE66404.2025.11144179&rft.externalDocID=11144179