Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment
نویسندگان
چکیده
Artificial intelligence (AI) techniques play a vital role in the evolving growth and rapid development of smart cities. To develop environment, enhancements to execution, sustainability, security traditional mechanisms become mandatory. Intrusion detection systems (IDS) can be considered an effective solutions achieve environment. This article introduces intrusion using chaotic poor rich optimization with deep learning model (IDCPRO-DLM) for ubiquitous atmospheres. The IDCPRO-DLM follows preprocessing, feature selection, classification stages. At initial stage, Z-score data normalization system is exploited scale input data. Additionally, method designs algorithm-based selection (CPROA-FS) approach selecting subsets. For detection, butterfly algorithm (BOA) sparse autoencoder (DSAE) used. simulation analysis technique studied on benchmark CICIDS dataset comparison results show better performance over recent state-of-the-art approaches maximum accuracy 98.53%.
منابع مشابه
Melanoma detection with a deep learning model
Background: Skin cancer is one of the most common forms of cancer in the world and melanoma is the deadliest type of skin cancer. Both melanoma and melanocytic nevi begin in melanocytes (cells that produce melanin). However, melanocytic nevi are benign whereas melanoma is malignant. This work proposes a deep learning model for classification of these two lesions. Methods: In this analytic s...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملIntrusion Detection for Smart phone using Cloud
Smart phones have recently become increasingly popular because they provide “all-in-one” convenience by integrating traditional mobile phones with handled computing devices. Unfortunately these mobile devices are beginning to face many of the same security threats as desktops. Since smart phones software architecture is similar to the PCs software architecture, they are vulnerable to similar ty...
متن کاملA Hybrid Machine Learning Method for Intrusion Detection
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
متن کاملConcept drift detection in business process logs using deep learning
Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sustainability
سال: 2023
ISSN: ['2071-1050']
DOI: https://doi.org/10.3390/su15086902