Intrusion Detection Network Attacks Based on Whale Optimization Algorithm

نویسندگان

چکیده

Network intrusion detection is a significant issue faced by the Information technology industry. Hacker's attacks set of techniques cause confusion network and computer systems, therefore, need for penetration process became urgent. This paper proposed an optimization method to detect potential on packets effectively defining unfamiliar patterns in massive volume traffic. Initially, packet characteristics are defined as normal dispersal attributes from data packet. algorithm used bio-inspired meta-heuristic technique named whale (WOA) systems against attackers. The (DMWO) applied calculate standard deviation distribution judge anomaly simulation performed OPNET Matlab-2015a main factors DMGO classify input check whether any attack present or not. Finally, performance this better flexibility result compared with other algorithms DMCM IHMM.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Intrusion Detection based on GMKL Algorithm

According to the 31th statistical reports of China Internet network information center (CNNIC), by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing t...

متن کامل

Research on Intrusion Detection Algorithm Based on BP Neural Network

In recent years, the problem of network security has been more and more people's attention, as one of the most important technology of network security, intrusion detection technology has gone through nearly thirty years of development, but it still exists some deficiency factors. Aiming at the defects of the traditional BP neural network intrusion detection model in the detection rate and the ...

متن کامل

Network Intrusion Detection System Based on Optimized Fuzzy Rules Algorithm

As computer networks and distributed applications more complex, diverse and intelligent, network behavior anomaly detection has gradually become the effective monitoring and system controlling technology. The paper established a network intrusion detection system and to investigate the data rules, sensors and abnormal behavior automatic identification in this system, a kind of algorithm based o...

متن کامل

A Novel Hybrid Whale Optimization Algorithm to Solve a Production-Distribution Network Problem Considering Carbon Emissions

Nowadays, there is a great deal of attention for regulations of carbon emissions to enforce the decision-makers of production and distribution networks to redesign their systems satisfactorily. The literature has seen a rapid interest in developing novel metaheuristics to solve this problem as a complicated optimization problem. Such difficulties motivate us to address a production-distribution...

متن کامل

Network Intrusion Detection Based on PSO-SVM

In order to improve network intrusion detection precision, this paper proposed a network intrusion detection model based on simultaneous selecting features and parameters of support vector machine (SVM) by particle swarm optimization (PSO) algorithm. Firstly, the features and parameters of SVM are coded to particle, and then the PSO is used to find the optimal features and SVM parameters by col...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ingénierie Des Systèmes D'information

سال: 2022

ISSN: ['1633-1311', '2116-7125']

DOI: https://doi.org/10.18280/isi.270310