2022
DOI: 10.4018/ijswis.308469
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System Based on Normalized Mutual Information Antibodies Feature Selection and Adaptive Quantum Artificial Immune System

Abstract: The intrusion detection system (IDS) has lower speed, less adaptability and lower detection accuracy especially for small samples sets. This paper presents a detection model based on normalized mutual antibodies information feature selection and adaptive quantum artificial immune with cooperative evolution of multiple operators (NMAIFS MOP-AQAI). First, for a high intrusion speed, the NMAIFS is used to achieve an effective reduction for high-dimensional features. Then, the best feature vectors are sent to the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…The existing trust management schemes [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]44,45,51,52 failed to fulfill the most fundamental requirement for industrial WSN (ICN). Finally, after sincerely analyzing existing work, we can say that without considering indirect (feedback or reputation) trust, frequency of misbehavior, current, and past misbehavior, a malicious node might disguise the network to ruin its reputation 38 and remain not detected as well as trustworthy [46][47][48][49][50] . The survival of ICNs is highly dependent on the successful cooperation of tamper-resistant SNs 3 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…The existing trust management schemes [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]44,45,51,52 failed to fulfill the most fundamental requirement for industrial WSN (ICN). Finally, after sincerely analyzing existing work, we can say that without considering indirect (feedback or reputation) trust, frequency of misbehavior, current, and past misbehavior, a malicious node might disguise the network to ruin its reputation 38 and remain not detected as well as trustworthy [46][47][48][49][50] . The survival of ICNs is highly dependent on the successful cooperation of tamper-resistant SNs 3 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…No IoTbased dataset was used for model training. (Ling & Hao, 2022) present an algorithm for feature selection based on artificial immune with cooperative evolution of multiple operators. Authors evaluate their work using KDD99 and UNSW-NB15 datasets, which are not oriented for evaluating the performance of an IDS in IoT networks (Thakkar & Lohiya, 2021).…”
Section: Related Workmentioning
confidence: 99%
“…This communication process can potentially introduce latency and consume bandwidth, particularly in IoT networks with limited resources. Zhang Ling et al 35 36 introduced two approaches, namely NMAIFS MOP‐AQAI and NMIFS MOP‐AQGA, to tackle the challenges related to detection rate and accuracy. The experiments were conducted using the KDD99 and UNSW‐NB15 datasets.…”
Section: Literature Surveymentioning
confidence: 99%