4.4 Article

Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier

出版社

WILEY
DOI: 10.1002/cpe.7103

关键词

decision tree; enhanced flower pollination algorithm; Internet of Things; network intrusion detection; random forest; support vector machine

向作者/读者索取更多资源

The study introduces a new intrusion detection system based on the enhanced flower pollination algorithm (EFPA) and ensemble classification technique, achieving an accuracy of 99.32% and 99.67% on the UNSW-NB15 and NSL-KDD datasets, respectively, outperforming traditional network intrusion detection models.
In the Internet of Things environment, the intrusion detection involves identification of distributed denial of service attacks in the network traffic which is aimed at improving network security. Recently, several methods have been developed for network anomaly detection which is generally based on the conventional machine learning techniques. The existing methods completely rely on manual traffic features which increases the system complexity and results in a lower detection rate on large traffic datasets. To overcome these issues, a new intrusion detection system is proposed based on the enhanced flower pollination algorithm (EFPA) and ensemble classification technique. First, the optimal set of features is selected from the UNSW-NB15 and NSL-KDD datasets by using EFPA. In the EFPA, a scaling factor is used in the conventional FPA for optimal feature selection and better convergence, and the selected features are fed to the ensemble classifier for network attack detection. The ensemble classifier aims to learn a set of classifiers such as random forest, decision tree (ID3), and support vector machine classifiers and then votes the best results. In the resulting section, the proposed ensemble-based EFPA model attained 99.32% and 99.67% of accuracy on UNSW-NB15 and NSL-KDD datasets, respectively, and these obtained results are more superior compared to the traditional network intrusion detection models. The proposed and the existing models are validated on the anaconda-navigator and Python 3.6 software environment.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Theory & Methods

Hybrid machine learning approach based intrusion detection in cloud: A metaheuristic assisted model

Murali Mohan, R. M. Balajee, Hiren K. Mewada, B. R. Rajakumar, D. Binu

Summary: Cloud computing is a cost-effective service, but its vulnerability to attacks necessitates the development of a new IDS model. This research introduces a new IDS model for the cloud environment, which includes data preprocessing, clustering, feature selection, and attack detection phases.

MULTIAGENT AND GRID SYSTEMS (2022)

Article Computer Science, Interdisciplinary Applications

Optimized GAN for Text-to-Image Synthesis: Hybrid Whale Optimization Algorithm and Dragonfly Algorithm

Vamsidhar Talasila, M. R. Narasingarao, V. Murali Mohan

Summary: Text-to-image synthesis is a motivating and valuable task. This research aims to develop a new method that combines text encoding and optimized GAN to generate images from text. The GAN will be trained using the Dragon Customized Whale Optimization (DC-WO) model, and the superiority of the approach will be evaluated by comparing it to existing techniques.

ADVANCES IN ENGINEERING SOFTWARE (2022)

Article Computer Science, Cybernetics

Optimized Deep Ensemble Technique for Malicious Behavior Classification in Cloud

V. Murali Mohan, Sukhvinder Singh, Pramod Pandurang Jadhav

Summary: This study proposes an ensemble learning approach for network intrusion detection and classification in cloud computing. By preprocessing and feature extraction, models such as neural network, support vector machine, random forest, and optimized deep belief network are used for the final detection. The algorithm and classifier are evaluated by comparing the proposed method with conventional approaches.

CYBERNETICS AND SYSTEMS (2023)

Article Computer Science, Cybernetics

Handover Approach for Heterogeneous Networks with Improved K-Partite Graph

Jyothi Puligadda, Venkata Rama Rao Kolipaka, V. Murali Mohan, Vamsidhar Talasila

Summary: This article presents a VH method using graph theory to address the complexities of network modeling in vertical handovers. It utilizes an improved k-partite graph to model the VH issues in HetNets and applies an improved Dijkstra's algorithm for path selection. The analytic hierarchy process is used to estimate adaptive weights among nodes, and a hybridized model named grey wolf upgraded CSO is used for optimal weight selection in Dijkstra's algorithm. Results show that the proposed strategy is efficient based on metrics such as throughput, packet jitter, delay, and packet losses.

CYBERNETICS AND SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Modified GAN with Proposed Feature Set for Text-to-Image Synthesis

Vamsidhar Talasila, M. R. Narasingarao, V. Murali Mohan

Summary: This research aims to develop a new model for text-to-image synthesis, which involves three important phases: feature extraction, text encoding, and optimal image synthesis. The model utilizes improved TF-IDF, bag of words, and N-gram for text feature extraction and Bi-LSTM for training. The image encoding is done through cross-modal feature grouping, and image synthesis is performed using a modified GAN with a new loss function. The proposed model's superiority is examined through evaluation against existing schemes.

INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE (2023)

Article Telecommunications

Intrusion Attack Detection Using Firefly Optimization Algorithm and Ensemble Classification Model

Rekha Gangula, Murali Mohan Vutukuru, M. Ranjeeth Kumar

Summary: In this research article, a new ID system is implemented to detect network intrusions more efficiently. Data denoising and optimization algorithms are used to address the imbalancing problems, and an ensemble classifier is employed to classify the normal and attack labels. Experimental results show that the proposed method achieves a detection rate of 98.89% and 98.41% on the UNSW-NB15 and NSL KDD datasets, respectively.

WIRELESS PERSONAL COMMUNICATIONS (2023)

Article Computer Science, Theory & Methods

A Novel Health Model Using NuSVC to Predict Severity of Asthma on The basis Of Cough Audio Signal

N. M. Jyothi, S. Madhusudhanan, V Muralimohan

Summary: This research aims to assess cough events using sound processing tools in order to classify and predict the severity of Asthma. Parameters of the cough audio signal are analyzed and the Nu Support Vector Classifier is chosen as the predictor. The trained model achieves a 94% accuracy in predicting the severity of Asthma patients compared to previous work.

INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

Procedural Impact of Negotiations and Its Variations on Utilization of Resources in Cloud Environment

M. N. Kiranbabu, Yugandhar Garapati, Velagapudi Sreenivas, V. Murali Mohan

Summary: Monitoring services on cloud computing enabled devices requires a variety of tools to fit different applications and provide performance characteristics for specific software. We address the negotiation problem between SAAS resource users and propose an optimized algorithm.

PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021) (2022)

Proceedings Paper Computer Science, Information Systems

Web Design Focusing on Users Viewing Experience with Respect to Static and Dynamic Nature of Web Sites

R. M. Balajee, M. K. Jayanthi Kannan, V. Murali Mohan

Summary: Web design is currently focused on device screen size and user experience, utilizing predefined style sheets and responsive HTML. Customization options are limited, but product recommendations based on purchase history and gender are being implemented. Personal decision styles, geographic location, and culture also play a role in influencing shopping choices and website design.

INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021 (2022)

Proceedings Paper Computer Science, Information Systems

Image-Based Authentication Security Improvement by Randomized Selection Approach

R. M. Balajee, M. K. Jayanthi Kannan, V. Murali Mohan

Summary: The value of stored data is increasing, leading to higher risks of data hacking. To enhance data security, physical and electronic security measures should be improved. This study aims to reduce the burden of remembering input during authentication process.

INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021 (2022)

Proceedings Paper Computer Science, Information Systems

Automatic Content Creation Mechanism and Rearranging Technique to Improve Cloud Storage Space

R. M. Balajee, M. K. Jayanthi Kannan, V. Murali Mohan

Summary: The storage and demand for electronic data is a major problem in today's society. Data is becoming more centralized and accessible through cloud storage, but the increasing versatility of data poses a management challenge. Current research focuses on efficient searching algorithms, neglecting the combined technique of data prioritization, deletion, and rearrangement. The proposed automatic content creation-mechanism system aims to improve data management efficiency by creating new documents through the deletion of unwanted content and merging existing documents based on top keywords.

INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021 (2022)

暂无数据