2023
DOI: 10.32604/cmc.2023.033513
|View full text |Cite
|
Sign up to set email alerts
|

Voting Classifier and Metaheuristic Optimization for Network Intrusion燚etection

Abstract: Managing physical objects in the network's periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems' effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metah… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 39 publications
0
0
0
Order By: Relevance
“…Recent advancements include hybrid models, as exemplified by Talukder et al [27], who propose a dependable hybrid machine learning model tailored for intrusion detection. Moreover, Khafaga et al [28] explore the synergy between ensemble classifiers and metaheuristic optimization, presenting a robust approach for network intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent advancements include hybrid models, as exemplified by Talukder et al [27], who propose a dependable hybrid machine learning model tailored for intrusion detection. Moreover, Khafaga et al [28] explore the synergy between ensemble classifiers and metaheuristic optimization, presenting a robust approach for network intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…Other studies explore deep learning approaches for intrusion detection [16][17][18][19][20][21][22], emphasizing their potential for enhancing network security [23]. Several contributions to the discourse include surveys, systematic studies, and comparative analyses, providing valuable perspectives on the strengths and limitations of various intrusion detection techniques [24][25][26][27][28]. These limitations underscore the need for innovative approaches that can address the shortcomings of existing methodologies and provide scalable, efficient, and robust solutions for network intrusion detection.…”
Section: Introductionmentioning
confidence: 99%