Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection  

在线阅读下载全文

作  者:Doaa Sami Khafaga Faten Khalid Karim Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim 

机构地区:[1]Department of Computer Sciences,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,P.O.Box 84428,Riyadh,11671,Saudi Arabia [2]Department of Computer Science,Faculty of Computer and Information Sciences,Ain Shams University,Cairo,11566,Egypt [3]Department of Computer Science,College of Computing and Information Technology,Shaqra University,11961,Saudi Arabia [4]Department of Communications and Electronics,Delta Higher Institute of Engineering and Technology,Mansoura,35111,Egypt [5]The Department of Civil and Environmental Engineering,Florida International University,Miami,FL,USA [6]Department of Information Technology,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia [7]Computer Engineering and Control Systems Department,Faculty of Engineering,Mansoura University,Mansoura,35516,Egypt

出  处:《Computers, Materials & Continua》2023年第2期3183-3198,共16页计算机、材料和连续体(英文)

基  金:Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R300),PrincessNourah bint Abdulrahman University,Riyadh,Saudi Arabia.

摘  要:Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human life.Open attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote access.These attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are subpar.This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization.The employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA optimizer.The proposed voting classifier categorizes the network intrusions robustly and efficiently.To assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack categorization.The dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and significance.The achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.

关 键 词:Voting classifier whale optimization algorithm dipper throated optimization intrusion detection internet-of-things 

分 类 号:TP183[自动化与计算机技术—控制理论与控制工程] TP393.08[自动化与计算机技术—控制科学与工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象