Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment

نویسندگان

چکیده

Artificial intelligence (AI) techniques play a vital role in the evolving growth and rapid development of smart cities. To develop environment, enhancements to execution, sustainability, security traditional mechanisms become mandatory. Intrusion detection systems (IDS) can be considered an effective solutions achieve environment. This article introduces intrusion using chaotic poor rich optimization with deep learning model (IDCPRO-DLM) for ubiquitous atmospheres. The IDCPRO-DLM follows preprocessing, feature selection, classification stages. At initial stage, Z-score data normalization system is exploited scale input data. Additionally, method designs algorithm-based selection (CPROA-FS) approach selecting subsets. For detection, butterfly algorithm (BOA) sparse autoencoder (DSAE) used. simulation analysis technique studied on benchmark CICIDS dataset comparison results show better performance over recent state-of-the-art approaches maximum accuracy 98.53%.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Melanoma detection with a deep learning model

Background: Skin cancer is one of the most common forms of cancer in the world and melanoma is the deadliest type of skin cancer. Both melanoma and melanocytic nevi begin in melanocytes (cells that produce melanin). However, melanocytic nevi are benign whereas melanoma is malignant. This work proposes a deep learning model for classification of these two lesions.    Methods: In this analytic s...

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

Intrusion Detection for Smart phone using Cloud

Smart phones have recently become increasingly popular because they provide “all-in-one” convenience by integrating traditional mobile phones with handled computing devices. Unfortunately these mobile devices are beginning to face many of the same security threats as desktops. Since smart phones software architecture is similar to the PCs software architecture, they are vulnerable to similar ty...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Concept drift detection in business process logs using deep learning

Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sustainability

سال: 2023

ISSN: ['2071-1050']

DOI: https://doi.org/10.3390/su15086902