IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 24014 - 24026
Published: Jan. 1, 2024
Network
security
situation
awareness
enables
networks
to
actively
and
effectively
defend
against
network
attacks,
relying
on
the
extraction
of
elements
as
an
initial
decisive
step.
In
existing
studies,
stacked
sparse
autoencoder
(SSAE)
has
been
employed
extract
features
from
unlabeled
flows.
However,
obtaining
optimal
hyperparameter
combination
is
challenging
due
its
numerous
hyperparameters.
To
address
this
issue,
we
propose
a
novel
approach
named
DBO-SSAE
that
leverages
dung
beetle
optimization
(DBO)
select
hyperparameters
for
SSAE
automatically.
Applied
well-known
UNSW-NB15
dataset,
our
model
yields
feature
subset,
which
evaluated
across
various
binary
classifiers
with
different
metrics.
Experimental
results
demonstrate
improves
accuracy
xmlns:xlink="http://www.w3.org/1999/xlink">F
1-
xmlns:xlink="http://www.w3.org/1999/xlink">measure
by
0.2%
1.5%,
while
reducing
xmlns:xlink="http://www.w3.org/1999/xlink">false
negative
rate
(FNR)
positive
(FPR)
0.06%
7%,
surpassing
other
methods
same
classifier
dataset.
Particularly,
in
conjunction
lightweight
bidirectional
long
short-term
memory
(BiLSTM),
achieves
metrics
98.84%
,
98.96%
1.86%
xmlns:xlink="http://www.w3.org/1999/xlink">FNR
0.6%
xmlns:xlink="http://www.w3.org/1999/xlink">FPR
.
This
study
could
provide
insights
into
effective
representation
lay
groundwork
high-efficiency
intrusion
detection
system.
Decision Analytics Journal,
Journal Year:
2024,
Volume and Issue:
11, P. 100470 - 100470
Published: April 24, 2024
Convolutional
Neural
Network
(CNN)
is
a
prevalent
topic
in
deep
learning
(DL)
research
for
their
architectural
advantages.
CNN
relies
heavily
on
hyperparameter
configurations,
and
manually
tuning
these
hyperparameters
can
be
time-consuming
researchers,
therefore
we
need
efficient
optimization
techniques.
In
this
systematic
review,
explore
range
of
well
used
algorithms,
including
metaheuristic,
statistical,
sequential,
numerical
approaches,
to
fine-tune
hyperparameters.
Our
offers
an
exhaustive
categorization
(HPO)
algorithms
investigates
the
fundamental
concepts
CNN,
explaining
role
variants.
Furthermore,
literature
review
HPO
employing
above
mentioned
undertaken.
A
comparative
analysis
conducted
based
strategies,
error
evaluation
accuracy
results
across
various
datasets
assess
efficacy
methods.
addition
addressing
current
challenges
HPO,
our
illuminates
unresolved
issues
field.
By
providing
insightful
evaluations
merits
demerits
objective
assist
researchers
determining
suitable
method
particular
problem
dataset.
highlighting
future
directions
synthesizing
diversified
knowledge,
survey
contributes
significantly
ongoing
development
optimization.
Mathematics,
Journal Year:
2024,
Volume and Issue:
12(4), P. 571 - 571
Published: Feb. 14, 2024
In
the
evolving
landscape
of
Internet
Things
(IoT)
and
Industrial
IoT
(IIoT)
security,
novel
efficient
intrusion
detection
systems
(IDSs)
are
paramount.
this
article,
we
present
a
groundbreaking
approach
to
for
IoT-based
electric
vehicle
charging
stations
(EVCS),
integrating
robust
capabilities
convolutional
neural
network
(CNN),
long
short-term
memory
(LSTM),
gated
recurrent
unit
(GRU)
models.
The
proposed
framework
leverages
comprehensive
real-world
cybersecurity
dataset,
specifically
tailored
IIoT
applications,
address
intricate
challenges
faced
by
EVCS.
We
conducted
extensive
testing
in
both
binary
multiclass
scenarios.
results
remarkable,
demonstrating
perfect
100%
accuracy
classification,
an
impressive
97.44%
six-class
96.90%
fifteen-class
setting
new
benchmarks
field.
These
achievements
underscore
efficacy
CNN-LSTM-GRU
ensemble
architecture
creating
resilient
adaptive
IDS
infrastructures.
algorithm,
accessible
via
GitHub,
represents
significant
stride
fortifying
EVCS
against
diverse
array
threats.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 39614 - 39627
Published: Jan. 1, 2024
Modern
networks
are
crucial
for
seamless
connectivity
but
face
various
threats,
including
disruptive
network
attacks,
which
can
result
in
significant
financial
and
reputational
risks.
To
counter
these
challenges,
AI-based
techniques
being
explored
protection,
requiring
high-quality
datasets
training.
In
this
study,
we
present
a
novel
methodology
utilizing
Ubuntu
Base
Server
to
simulate
virtual
environment
real-time
collection
of
attack
datasets.
By
employing
Kali
Linux
as
the
attacker
machine
Wireshark
data
capture,
compile
Server-based
Network
Attack
(SNA)
dataset,
showcasing
UDP,
SYN,
HTTP
flood
attacks.
Our
primary
goal
is
provide
publicly
accessible,
server-focused
dataset
tailored
research.
Additionally,
leverage
advanced
AI
methods
detection
proposed
meta-RF-GNB
(MRG)
model
combines
Gaussian
Naive
Bayes
Random
Forest
predictions,
achieving
an
impressive
accuracy
score
99.99%.
We
validate
efficiency
MRG
using
cross-validation,
obtaining
notable
mean
99.94%
with
minimal
standard
deviation
0.00002.
Furthermore,
conducted
statistical
t-test
evaluate
significance
compared
other
top-performing
models.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 9483 - 9496
Published: Jan. 1, 2024
With
the
rapid
development
of
information
communication
and
mobile
device
technologies,
smart
devices
have
become
increasingly
popular,
providing
convenience
to
households
enhancing
level
intelligence
in
daily
life.
This
trend
is
also
driving
innovation
progress
various
fields,
including
healthcare,
transportation,
industry.
However,
as
technology
continues
proliferate,
network
security
concerns
prominent,
making
protection
digital
life
data
an
urgent
priority.
Intrusion
detection
has
always
played
important
role
field
security.
Traditional
intrusion
systems
predominantly
rely
on
anomaly
identify
potential
intrusions
by
detecting
abnormal
patterns
traffic.
technological
advancements,
machine
learning-based
methods
emerged
cornerstone
modern
detection,
enabling
more
precise
identification
behaviors
learning
normal
In
response
these
challenges,
this
paper
introduces
innovative
model
that
amalgamates
Attention-CNN-BiLSTM
(ACBL)
Temporal
Convolutional
Network
(TCN)
architectures.
The
ACBL
TCN
models
excel
processing
spatial
temporal
features
within
traffic
data,
respectively.
integration
harnesses
diverse
neural
structures
elevate
overall
performance
accuracy.
Furthermore,
a
unique
approach
inspired
dung
beetles'
natural
behavior,
incorporating
Tent
mapping-enhanced
Dung
Beetle
Optimization
Algorithm
(TDBO),
leveraged
for
both
optimizing
feature
selection
parameters
searching
optimal
hyperparameters.
obtained
from
TDBO
are
then
combined
with
importance
ranking
Random
Forest
algorithm,
ensuring
can
be
better
selected
enhance
performance.
novel
model,
TDBO-ACBLT
validates
its
using
UNSW-NW15
dataset.
excels
compared
common
algorithms
achieves
superior
parameter
optimization
accuracy
over
Harris's
Hawk
(HHO),
Particle
Swarm
(PSO),
(DBO).
proposed
higher
than
prevalent
models.