检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Doaa Sami Khafaga Faten Khalid Karim Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim
机构地区:[1]Department of Computer Sciences,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,P.O.Box 84428,Riyadh,11671,Saudi Arabia [2]Department of Computer Science,Faculty of Computer and Information Sciences,Ain Shams University,Cairo,11566,Egypt [3]Department of Computer Science,College of Computing and Information Technology,Shaqra University,11961,Saudi Arabia [4]Department of Communications and Electronics,Delta Higher Institute of Engineering and Technology,Mansoura,35111,Egypt [5]The Department of Civil and Environmental Engineering,Florida International University,Miami,FL,USA [6]Department of Information Technology,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia [7]Computer Engineering and Control Systems Department,Faculty of Engineering,Mansoura University,Mansoura,35516,Egypt
出 处:《Computers, Materials & Continua》2023年第2期3183-3198,共16页计算机、材料和连续体(英文)
基 金:Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R300),PrincessNourah bint Abdulrahman University,Riyadh,Saudi Arabia.
摘 要:Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human life.Open attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote access.These attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are subpar.This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization.The employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA optimizer.The proposed voting classifier categorizes the network intrusions robustly and efficiently.To assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack categorization.The dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and significance.The achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
关 键 词:Voting classifier whale optimization algorithm dipper throated optimization intrusion detection internet-of-things
分 类 号:TP183[自动化与计算机技术—控制理论与控制工程] TP393.08[自动化与计算机技术—控制科学与工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49