An incursion into the computer network or system in issue occurs whenever there is an attempt made to circumvent the defences that are in place. Training and examination are the two basic components that make up the intrusion detection system (IDS) and each one may be analysed separately. During training, a number of distinct models are built, each of which is able to distinguish between normal and abnormal behaviours that are included within the dataset. This article proposes a combination of ant colony optimization (ACO) and the firefly approach for feature selection. The final outcome of giving careful thought to the selection of features will eventually result in greater accuracy of categorisation. When classifying various sorts of features, we make use of a wide variety of machine learning (ML) algorithms, including AdaBoost, gradient boost, and Bayesian network (BN), amongst others. The tests and assessments made use of data obtained from three distinct datasets, namely NSL-KDD, UNSW-NB15, and CICIDS 2017. The degree of performance of an individual may be broken down into its component parts, which include the F1 score, accuracy, precision, and recall. Gradient boost performs far better when it comes to recognising and classifying incursions.
An incursion into the computer network or system in issue occurs whenever there is an attempt made to circumvent the defences that are in place. Training and examination are the two basic components that make up the intrusion detection system (IDS) and each one may be analysed separately. During training, a number of distinct models are built, each of which is able to distinguish between normal and abnormal behaviours that are included within the dataset. This article proposes a combination of ant colony optimization (ACO) and the firefly approach for feature selection. The final outcome of giving careful thought to the selection of features will eventually result in greater accuracy of categorisation. When classifying various sorts of features, we make use of a wide variety of machine learning (ML) algorithms, including AdaBoost, gradient boost, and Bayesian network (BN), amongst others. The tests and assessments made use of data obtained from three distinct datasets, namely NSL-KDD, UNSW-NB15, and CICIDS 2017. The degree of performance of an individual may be broken down into its component parts, which include the F1 score, accuracy, precision, and recall. Gradient boost performs far better when it comes to recognising and classifying incursions.
An IoT system is a smart network that connects all items to the Internet and exchanges data using Internet Engineering Task Force established protocols. As a consequence, everything is instantly accessible from any place and at any time. The Internet of Things (IoT) network is built on the backbone of tiny sensors embedded in common objects. There is no need for human intervention in the interactions of IoT devices. The Internet of Things (IoT) security risk cannot be ignored. Untrusted networks, such as the Internet, are utilized to provide remote access to IoT devices. As a result, IoT systems are susceptible to a broad range of harmful activities, including cyberattacks. If security problems are not addressed, critical information may be hacked at any time. This article describes a feature selection and machine learning-based paradigm for improving security in the Internet of Things. Because network data are inherently abundant, it must be reduced in size before processing. Dimension reduction is the process of constructing a subset of an original data collection that removes superfluous content from the essential data set. Dimension reduction is a data mining approach. To minimize the number of dimensions in a dataset, linear discriminant analysis (LDA) is used. Following that, the data set with fewer dimensions is put into machine learning predictors as a training set. The effectiveness of machine learning approaches has been assessed using a range of criteria.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.