Network Intrusion Detection Method Using Stacked BILSTM Elastic Regression Classifier with Aquila Optimizer Algorithm for Internet of Things (IoT)

نویسندگان

چکیده

Globally, over the past ten years, computer networks and Internet of Things (IoT) have grown significantly due to increasing amount data that has been collected, ranging from zettabytes petabytes. As a result, as network expanded, security problems also emerged. The large sets involved in these types attacks can make detection difficult. developing are being used for multitude sophisticated purposes, such smart homes, cities, grids, gadgets, objects, well e-commerce, e-banking, e-government. result development numerous intrusion systems (IDS), now protected privacy threats. Data confidentiality, integrity, availability will suffer if IDS prevention efforts fail. Complex can't be handled by traditional methods. There growing interest advanced deep learning techniques detecting intrusions identifying abnormal behavior networks. This research aims propose novel namely stacked BiLSTM elastic regression classifier (Stack_BiLSTM-ERC) with Aquila optimizer algorithm feature selection. optimization method computes use cutting-edge transition function enables it transformed into binary form optimizer. A better solution could secured once number possible solutions found diverse regions search space utilizing method. NSL-KDD UNSW-NB15 two datasets enable characteristics raw order detect harmful prerequisites effective framework patterns. proposed Stack_BiLSTM-ERC achieves 98.l3% accuracy, 95.1% precision, 94.3% recall 95.4 F1-score dataset. Moreover, 98.6% 97.2% 98.5 97.5% F1-score.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

A New Method for Intrusion Detection Using Genetic Algorithm and Neural Network

    The article attempts to have neural network and genetic algorithm techniques present a model for classification on dataset. The goal is design model can the subject acted a firewall in network and this model with compound optimized algorithms create reliability and accuracy and reduce error rate couse of this is article use feedback neural network and compared to previous methods increase a...

متن کامل

A New Method for Intrusion Detection Using Genetic Algorithm and Neural Network

    The article attempts to have neural network and genetic algorithm techniques present a model for classification on dataset. The goal is design model can the subject acted a firewall in network and this model with compound optimized algorithms create reliability and accuracy and reduce error rate couse of this is article use feedback neural network and compared to previous methods increase a...

متن کامل

AdaBoost Algorithm with Single Weak Classifier in Network Intrusion Detection

Recently machine learning based intrusion detection system developments have been subjected to extensive researches because they can detect both misuse detection and anomaly detection. In this paper, we propose an AdaBoost based algorithm for network intrusion detection system with single weak classifier. In this algorithm, the classifiers such as Bayes Net, Naïve Bayes and Decision tree are us...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Recent and Innovation Trends in Computing and Communication

سال: 2023

ISSN: ['2321-8169']

DOI: https://doi.org/10.17762/ijritcc.v11i2s.6035