Design of Clustering Enabled Intrusion Detection with Blockchain Technology

نویسندگان

چکیده

Recent advancements in hardware and networking technologies have resulted a large growth the number of Internet Things (IoT) devices connected to Internet, which is likely continue growing coming years. Traditional security solutions are insufficiently suited IoT context due restrictions diversity resources available objects. Security techniques such as intrusion detection authentication considered be effective. Additionally, decentralised distributed nature Blockchain technology makes it an excellent solution for overcoming issue. This paper proposes chaotic bird swarm algorithm (CBSA)-based clustering technique based on optimum deep belief network (ODBN) secure setting. The CBSA-ODBN creates that utilises CBSA pick cluster heads (CHs). ODBN model then utilised identify network, learning rate Deep Belief Network (DBN) optimally adjusted using flower pollination (FPA). suggested concept layered paradigm blockchain technology. Numerous simulations run, with outcomes analysed variety measures, including rate, packet delivery ratio, energy usage, end-to-end latency, processing cost. A careful comparison model's performance recently developed methodologies demonstrated proposed superior performance.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Market Design for Trading with Blockchain Technology

An intrinsic feature of blockchain technology is the so-called distributed ledger, which involves maintaining a decentralized record of all transactions for a security. A distributed ledger allows anyone with access to it to identify asset holdings by (anonymous) identifiers. In this paper, we argue that the mapping between identifiers and end-investors should be a market design choice. We capt...

متن کامل

Intrusion detection using clustering

In increasing trends of network environment every one gets connected to the system. So there is need of securing information, because there are lots of security threats are present in network environment. A number of techniques are available for intrusion detection. Data mining is the one of the efficient techniques available for intrusion detection. Data mining techniques may be supervised or ...

متن کامل

Intrusion Detection Technology

Intrusion Detection (ID) is the process of monitoring events occurring in a system and signalling responsible parties when interesting (suspicious) activity occurs. Intrusion Detection Systems (IDSs) consist of 1) an agent that collects the information on the stream of monitored events, 2) an analysis engine that detects signs of intrusion, and 3) a response module that generates responses base...

متن کامل

Clustering-based Network Intrusion Detection

Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection—a challenging task in network security. Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Classification-based data mining models for intrusion detection are often ineffective in dealing with dynamic changes in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Intelligent Automation and Soft Computing

سال: 2022

ISSN: ['2326-005X', '1079-8587']

DOI: https://doi.org/10.32604/iasc.2022.025219