Voting Classifier and Metaheuristic Optimization for Network Intrusion燚etection

نویسندگان

چکیده

Managing physical objects in the network’s periphery is made possible by Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are with these IoT devices, which exchange data to enable remote access. These often detected using intrusion detection methodologies, although systems’ effectiveness accuracy subpar. This paper proposes a new voting classifier composed an ensemble machine learning models trained optimized metaheuristic optimization. The employed optimizer version whale optimization algorithm (WOA), guided dipper throated (DTO) improve exploration process ofthe traditional WOA optimizer. proposed categorizes network intrusions robustly efficiently. To assess approach, dataset created from devices record efficiency for binary attack categorization. records balanced locality-sensitive hashing (LSH) Synthetic Minority Oversampling Technique (SMOTE). evaluation achieved results performed terms statistical analysis visual plots prove approach’s effectiveness, stability, significance. confirmed superiority task detection.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classifier Model for Intrusion Detection Using Bio-inspired Metaheuristic Approach

In machine learning and statistics, feature selection is the technique of selecting a subset of relevant features for building robust learning models. In this paper we propose a bio-inspired BAT algorithm as feature selection method to find the optimal features from the KDDCup’99 intrusion detection dataset obtained from UCI Machine Learning repository. Neural Networks (NN) as a classifier coll...

متن کامل

Improving Network Intrusion Detection Through Classifier Combination

Network intrusion detection is a problem that’s hardly being solved completely. Firewalls and other existing solutions do provide some resistance to the wide variety of attack types that can occur, but they suffer the drawback of not being able to generalize well into unseen attack types. Through this report, we propose a framework for addressing the problem of network intrusion by extracting i...

متن کامل

Biological Network Alignment Through Multiobjective Metaheuristic Optimization

As biological inquiry produces ever more network data, such as protein-protein interaction networks, gene regulatory networks, and metabolic networks, many algorithms have been proposed for the purpose of pairwise network alignment– finding a mapping from the nodes of one network to the nodes of another in such a way that the mapped nodes can be considered to correspond with respect to both the...

متن کامل

Ensemble Voting System for Anomaly Based Network Intrusion Detection

The growing dependence of modern society on telecommunication and information networks has become inevitable. Therefore, the security aspects of such networks play a strategic role in ensuring protection of data against misuse. Intrusion Detection systems (IDS) are meant to detect intruders who elude the “first line” protection. Data mining techniques are being used for building effective IDS. ...

متن کامل

Network Intrusion Detection using Machine Learning and Voting techniques

As the result of recent advent and rapid growth of the Internet, there have been an increasing number of corporations relying on computers and networks for communications and critical business transactions. Because of the network complexity and advanced hacking techniques, such reliance on computer networks often presents unanticipated risks and vulnerabilities. A huge volume of attacks on majo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2023

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2023.033513