2022
DOI: 10.1109/access.2022.3192472
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks

Abstract: The staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more dependable protection systems, including effective intrusion detection system (IDS) mechanisms which are equipped for boosting accurately detected threats and limiting erroneously detected threats simultaneously. Nonetheless, the proficiency of the IDS framework depends essentially on extracted features from network traffic and an effective classifier of the tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(9 citation statements)
references
References 59 publications
0
9
0
Order By: Relevance
“…The goal of such a FF should be similar to its value in enhancing calculations. Other than that, its objective is to reduce general error, similar to studying methods demonstrated by previous exams [42]- [43]. Therefore, the FF stated before might apply any of the MLP error estimation equations or derive another wellness metric from the recipes.…”
Section: The Classification Phasementioning
confidence: 98%
See 1 more Smart Citation
“…The goal of such a FF should be similar to its value in enhancing calculations. Other than that, its objective is to reduce general error, similar to studying methods demonstrated by previous exams [42]- [43]. Therefore, the FF stated before might apply any of the MLP error estimation equations or derive another wellness metric from the recipes.…”
Section: The Classification Phasementioning
confidence: 98%
“…Figure 7 shows the forward pass calculation measure. The fitness function was calculated in this work using a methodology that has been employed in a number of studies [42]- [43]. The output of the i th hidden node is determined as follows: If the number of input nodes is N, the number of hidden nodes is H, and the number of output nodes is O.…”
Section: The Classification Phasementioning
confidence: 99%
“…Motivation for the BAT algorithm originates from bat colonies that use echolocation to predate. The process and characteristics of bat echolocation are illustrated in Ghanem et al [17]. Bats use echolocation to gauge distance and to unveil the differences between barriers and prey.…”
Section: Bat Algorithmmentioning
confidence: 99%
“…During this process, it is considered that bats are present based on the pixel values in the area [17]. Each bat represents a range of values from 0 to b, and there are c potential values for the cluster centers.…”
Section: Bat Populationmentioning
confidence: 99%
“…This continues until max features or model performances are met. The majority of synthesized datasets had imbalanced data; hence, this study used stratified cross-validation [18,19]. This paper contains the following notable characteristics and contributions:…”
Section: Forward Feature Selectionmentioning
confidence: 99%