92 research outputs found
A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDoS attacks
Cyberattacks have grown steadily over the last few years. The distributed reflection denial of service (DRDoS) attack has been rising, a new variant of distributed denial of service (DDoS) attack. DRDoS attacks are more difficult to mitigate due to the dynamics and the attack strategy of this type of attack. The number of features influences the performance of the intrusion detection system by investigating the behavior of traffic. Therefore, the feature selection model improves the accuracy of the detection mechanism also reduces the time of detection by reducing the number of features. The proposed model aims to detect DRDoS attacks based on the feature selection model, and this model is called a proactive feature selection model proactive feature selection (PFS). This model uses a nature-inspired optimization algorithm for the feature subset selection. Three machine learning algorithms, i.e., k-nearest neighbor (KNN), random forest (RF), and support vector machine (SVM), were evaluated as the potential classifier for evaluating the selected features. We have used the CICDDoS2019 dataset for evaluation purposes. The performance of each classifier is compared to previous models. The results indicate that the suggested model works better than the current approaches providing a higher detection rate (DR), a low false-positive rate (FPR), and increased accuracy detection (DA). The PFS model shows better accuracy to detect DRDoS attacks with 89.59%
Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks
Intelligent classification systems proved their merits in different fields including cybersecurity. However, most cybercrime issues are characterized of being dynamic and not static classification problems where the set of discriminative features keep changing with time. This indeed requires revising the cybercrime classification system and pick a group of features that preserve or enhance its performance. Not only this but also the system compactness is regarded as an important factor to judge on the capability of any classification system where cybercrime classification systems are not an exception. The current research proposes an improved feature selection algorithm that is inspired from the well-known multi-verse optimizer (MVO) algorithm. Such an algorithm is then applied to 3 different cybercrime classification problems namely phishing websites, spam, and denial of service attacks. MVO is a population-based approach which stimulates a well-known theory in physics namely multi-verse theory. MVO uses the black and white holes principles for exploration, and wormholes principle for exploitation. A roulette selection schema is used for scientifically modeling the principles of white hole and black hole in exploration phase, which bias to the good solutions, in this case the solutions will be moved toward the best solution and probably to lose the diversity, other solutions may contain important information but didn’t get chance to be improved. Thus, this research will improve the exploration of the MVO by introducing the adaptive neighborhood search operations in updating the MVO solutions. The classification phase has been done using a classifier to evaluate the results and to validate the selected features. Empirical outcomes confirmed that the improved MVO (IMVO) algorithm is capable to enhance the search capability of MVO, and outperform other algorithm involved in comparison
Studi Perbandingan Deteksi Intrusi Jaringan Menggunakan Machine Learning: (Metode SVM dan ANN)
Machine Learning berkaitan dengan penggunaan algoritma untuk membuat mesin berfungsi. Algoritma supervised machine learning belajar pada dataset untuk membuat prediksi berdasarkan pengetahuan yang mereka peroleh saat belajar. Machine Learning memiliki dampak signifikan dalam keamanan siber. Sistem deteksi intrusi (IDS), sistem pencegahan intrusi (IPS) dan firewall tradisional membantu mendeteksi intrusi tetapi sayangnya, kebanyakan dari mereka memberi false alarm, dapat memiliki kerentanan dan dapat salah konfigurasi. Penggunaan algoritma machine learning telah terbukti lebih efektif dalam deteksi intrusi. Penelitian ini bertujuan untuk membandingkan efektivitas Algoritma Support Vector Machine (SVM) dan Artificial Neural Network (ANN) untuk intrusi deteksi. Penelitian ini menggunakan metode eksperimen dengan melatih dan menguji SVM dan ANN pada Dataset KDD Cup 99 di Google Colaboratory. Skor akurasi pelatihan dan pengujian, waktu pelatihan dan pengujian, Receiver Operating Characteristic Curve (Kurva ROC) dan kecepatan jaringan adalah parameter untuk perbandingan. Hasil dari eksperimen menunjukkan bahwa; Kedua model bagus untuk mendeteksi intrusi karena SVM dan ANN memiliki skor di atas 90%. SVM lebih efektif daripada ANN dalam deteksi intrusi dengan akurasi pelatihan dan pengujian 99,87% dan 99,81%. Juga AUC untuk SVM adalah 1 untuk semua lima kelas dan mengambil lebih sedikit waktu dalam melatih dataset
Comprehensive Taxonomies of Nature- and Bio-inspired Optimization: Inspiration versus Algorithmic Behavior, Critical Analysis and Recommendations
In recent years, a great variety of nature- and bio-inspired algorithms has
been reported in the literature. This algorithmic family simulates different
biological processes observed in Nature in order to efficiently address complex
optimization problems. In the last years the number of bio-inspired
optimization approaches in literature has grown considerably, reaching
unprecedented levels that dark the future prospects of this field of research.
This paper addresses this problem by proposing two comprehensive,
principle-based taxonomies that allow researchers to organize existing and
future algorithmic developments into well-defined categories, considering two
different criteria: the source of inspiration and the behavior of each
algorithm. Using these taxonomies we review more than three hundred
publications dealing with nature-inspired and bio-inspired algorithms, and
proposals falling within each of these categories are examined, leading to a
critical summary of design trends and similarities between them, and the
identification of the most similar classical algorithm for each reviewed paper.
From our analysis we conclude that a poor relationship is often found between
the natural inspiration of an algorithm and its behavior. Furthermore,
similarities in terms of behavior between different algorithms are greater than
what is claimed in their public disclosure: specifically, we show that more
than one-third of the reviewed bio-inspired solvers are versions of classical
algorithms. Grounded on the conclusions of our critical analysis, we give
several recommendations and points of improvement for better methodological
practices in this active and growing research field.Comment: 76 pages, 6 figure
Internet of Underwater Things and Big Marine Data Analytics -- A Comprehensive Survey
The Internet of Underwater Things (IoUT) is an emerging communication
ecosystem developed for connecting underwater objects in maritime and
underwater environments. The IoUT technology is intricately linked with
intelligent boats and ships, smart shores and oceans, automatic marine
transportations, positioning and navigation, underwater exploration, disaster
prediction and prevention, as well as with intelligent monitoring and security.
The IoUT has an influence at various scales ranging from a small scientific
observatory, to a midsized harbor, and to covering global oceanic trade. The
network architecture of IoUT is intrinsically heterogeneous and should be
sufficiently resilient to operate in harsh environments. This creates major
challenges in terms of underwater communications, whilst relying on limited
energy resources. Additionally, the volume, velocity, and variety of data
produced by sensors, hydrophones, and cameras in IoUT is enormous, giving rise
to the concept of Big Marine Data (BMD), which has its own processing
challenges. Hence, conventional data processing techniques will falter, and
bespoke Machine Learning (ML) solutions have to be employed for automatically
learning the specific BMD behavior and features facilitating knowledge
extraction and decision support. The motivation of this paper is to
comprehensively survey the IoUT, BMD, and their synthesis. It also aims for
exploring the nexus of BMD with ML. We set out from underwater data collection
and then discuss the family of IoUT data communication techniques with an
emphasis on the state-of-the-art research challenges. We then review the suite
of ML solutions suitable for BMD handling and analytics. We treat the subject
deductively from an educational perspective, critically appraising the material
surveyed.Comment: 54 pages, 11 figures, 19 tables, IEEE Communications Surveys &
Tutorials, peer-reviewed academic journa
Energy Harvesting and Energy Storage Systems
This book discuss the recent developments in energy harvesting and energy storage systems. Sustainable development systems are based on three pillars: economic development, environmental stewardship, and social equity. One of the guiding principles for finding the balance between these pillars is to limit the use of non-renewable energy sources
The 1st International Conference on Computational Engineering and Intelligent Systems
Computational engineering, artificial intelligence and smart systems constitute a hot multidisciplinary topic contrasting computer science, engineering and applied mathematics that created a variety of fascinating intelligent systems. Computational engineering encloses fundamental engineering and science blended with the advanced knowledge of mathematics, algorithms and computer languages. It is concerned with the modeling and simulation of complex systems and data processing methods. Computing and artificial intelligence lead to smart systems that are advanced machines designed to fulfill certain specifications. This proceedings book is a collection of papers presented at the first International Conference on Computational Engineering and Intelligent Systems (ICCEIS2021), held online in the period December 10-12, 2021. The collection offers a wide scope of engineering topics, including smart grids, intelligent control, artificial intelligence, optimization, microelectronics and telecommunication systems. The contributions included in this book are of high quality, present details concerning the topics in a succinct way, and can be used as excellent reference and support for readers regarding the field of computational engineering, artificial intelligence and smart system
Mobile Ad-Hoc Networks
Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
- …