2023
DOI: 10.32604/cmc.2023.033273
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization

Abstract: Applications of internet-of-things (IoT) are increasingly being used in many facets of our daily life, which results in an enormous volume of data. Cloud computing and fog computing, two of the most common technologies used in IoT applications, have led to major security concerns. Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient. Several artificial intelligence (AI) based security solutions, such as intrusion detection systems (IDS), h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 51 publications
0
7
0
Order By: Relevance
“…Feature selection in IDS using a hybrid optimization approach was proposed by Alkanhel et al [26]. The suggested approach, known as GWDTO, is inspired by the grey wolf (GW) and dipper throated optimization (DTO) algorithms.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Feature selection in IDS using a hybrid optimization approach was proposed by Alkanhel et al [26]. The suggested approach, known as GWDTO, is inspired by the grey wolf (GW) and dipper throated optimization (DTO) algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Following training, the network is tested on an independent dataset to gauge its ability to detect outliers. Improve the CNN's ability to spot network abnormalities by expanding the size and diversity of the training dataset, tweaking hyperparameters like learning rate and regularization, and using data augmentation techniques to add variety to the training data [26,27].…”
Section: Convolutional Neural Networkmentioning
confidence: 99%
“…Considering these threats, intrusion detection has emerged as a critical task in network security. Traditional intrusion detection techniques primarily relies on rules and feature engineering [4][5][6][7][8]. These methods can be effective in certain scenarios, while exhibiting certain limitations.…”
Section: Introductionmentioning
confidence: 99%
“…These algorithms are search-based optimization techniques inspired by natural processes such as evolution, swarm behavior, and genetics [3]. [4] have proposed the use of grey wolf and dipper throat optimization for feature selection for IDS. Their results show an increase in classification accuracy between the different types of attacks, which would be beneficial for IoT systems.…”
Section: Introductionmentioning
confidence: 99%