3 research outputs found

    Zero-day Network Intrusion Detection using Machine Learning Approach

    Get PDF
    Zero-day network attacks are a growing global cybersecurity concern. Hackers exploit vulnerabilities in network systems, making network traffic analysis crucial in detecting and mitigating unauthorized attacks. However, inadequate and ineffective network traffic analysis can lead to prolonged network compromises. To address this, machine learning-based zero-day network intrusion detection systems (ZDNIDS) rely on monitoring and collecting relevant information from network traffic data. The selection of pertinent features is essential for optimal ZDNIDS performance given the voluminous nature of network traffic data, characterized by attributes. Unfortunately, current machine learning models utilized in this field exhibit inefficiency in detecting zero-day network attacks, resulting in a high false alarm rate and overall performance degradation. To overcome these limitations, this paper introduces a novel approach combining the anomaly-based extended isolation forest algorithm with the BAT algorithm and Nevergrad. Furthermore, the proposed model was evaluated using 5G network traffic, showcasing its effectiveness in efficiently detecting both known and unknown attacks, thereby reducing false alarms when compared to existing systems. This advancement contributes to improved internet security

    A systematic review of bio-inspired service concretization

    Get PDF
    In service oriented computing, Web service selection is an important part of Web service composition. The Web service composition is achieved by solving the Web service concretization problem. The literature presents two types of Web service concretization approaches: local optimization approaches and global optimization approaches. There are three types of algorithmic methods in the global optimization approaches: optimal methods, sub-optimal methods, and soft constraints-based methods. The bio-inspired algorithms are sub-optimal methods. This paper will firstly present a hierarchical taxonomy of Web service concretization approaches. Then we conduct a systematic review on the current research of Web service concretization based on three bio-inspired algorithms, namely, ant colony optimization algorithms, genetic algorithms, and particle swarm optimization algorithms. Based on the findings from the systematic review, this paper also discusses the underlying applications of bio-inspired algorithms to the data-intensive service concretization problems

    A Systematic Review of Bio-Inspired Service Concretization

    No full text
    corecore