Anomaly Detection through Adaptive DASO Optimization Techniques
نویسندگان
چکیده
An intrusion detection systems (IDS) detect and prevent network attacks. Due to the complicated environment, ID system merges a high number of samples into small normal samples, resulting in inadequate identify train maximum false rate. External malicious attacks damage conventional IDS, which affects activity. Adaptive Dolphin Atom Search Optimization overcomes this. Thus, work aims create an adaptive optimization-based that modifies classifier for accurate prediction. The model selects feature detects intrusions. Mutual information further processing selection module. Deep RNNs novel technique trains deep RNN. DASO combines algorithm with concepts. is integration dolphin echolocation (DE) atom search optimization (ASO). intrusions are detected using DASO-based developed approach attains better performance based on several parameters such as specificity, accuracy, sensitivity.
منابع مشابه
Anomaly Detection through Registration
The goal of this research is to perform automatic, fast and accurate registration of volumetric data in 3-D space, as well as anomaly detection based on the registration results and domain knowledge. One important application domain is medical image registration. Anatomical structures vary considerably in appearance across individuals or within one individual over time, and any pathology may ag...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملComparison of Unsupervised Anomaly Detection Techniques
Anomaly Detection is the process of finding outlying record from a given data set. This problem has been of increasing importance due to the increase in the size of data and the need to efficiently extract those outlying records which could indicate unauthorized access of the system, credit card theft or the diagnosis of a disease. The aim of this bachelor thesis is to implement a RapidMiner ex...
متن کاملComparing Anomaly Detection Techniques for HTTP
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been proposed as a response. However, each IDS is developed and tested independently, and direct comparisons are difficult. We describe a framework for testing IDS algorithms, and apply it to several proposed anomaly detec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Artificial intelligence
سال: 2023
ISSN: ['2633-1403']
DOI: https://doi.org/10.5772/intechopen.112421