Elevating IDS Capabilities: The Convergence of SVM, Deep Learning, and RFECV in Network Security DOI
G. Aditya Kumar,

Aditi Katiyar,

Kathiravan Srinivasan

и другие.

Опубликована: Фев. 22, 2024

By presenting an improved Intrusion Detection System (IDS) that combines deep learning with support vector machines (SVM), this research increases network security. The main goal is to increase the accuracy of SVM detection by using a methodical feature selection and optimization technique tailored complexity intrusions. 35 out 42 features were chosen for RFECV, algorithmic in machine learning. To ensure preserved are those contribute most model's predictive capacity redundant deleted, techniques such as RFECV priority ranking ExtraTreesClassifier take performance into account during process. improve classifier performance, strategies hyperparameter tuning used, focusing on important data cutting down redundancies. several kernel functions, including linear, polynomial, RBF, sigmoid, compared study. Linear model combined was shown perform best. Our outperforms current IDS frameworks, demonstrated comparative analysis, confirming efficacy integrating SVMs real-time threat detection. KDD Cup 99 dataset, which has been widely used benchmark assessing different models, work. It offers consistent, varied, large dataset so researchers may evaluate contrast their methods. Researchers can experiment reduction enhance because dataset's broad set features.

Язык: Английский

Application of hybrid PSO-KNN algorithm for early prediction and classification of fundus images in diabetic retinopathy DOI
Likith Reddy, Sreenivasulu Gogula,

Udanth Reddy Lakkireddy

и другие.

AIP conference proceedings, Год журнала: 2025, Номер 3157, С. 070004 - 070004

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Energy efficient fault diagnosis protocol for IoT DOI

Srinivas Jhade,

Bhukya Madhu,

Channa Madhavuni Shruthi

и другие.

AIP conference proceedings, Год журнала: 2025, Номер 3157, С. 070009 - 070009

Опубликована: Янв. 1, 2025

Процитировано

0

A new method for optimizing sine cosine with stacked long short-term memory for stock price prediction DOI

Bhukya Madhu,

Aditya Ramesh,

Riyaz Mahomad

и другие.

AIP conference proceedings, Год журнала: 2025, Номер 3157, С. 070002 - 070002

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

A diverse offering of IoT-enabled gadgets to enhance the standard of living for indian farmers DOI

D. V. Surya Prakash,

Doma Shivaprasad,

Samreen Samreen

и другие.

AIP conference proceedings, Год журнала: 2025, Номер 3157, С. 070001 - 070001

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

The software failure prediction field’s performance of machine learning classifiers compared to ensemble classifiers DOI
Mohammed Ahmed Mohiuddin, Harikrishna Bommala,

Mani Deep Karumanchi

и другие.

AIP conference proceedings, Год журнала: 2025, Номер 3157, С. 080019 - 080019

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Model for the authentication and management of keys DOI

Adidela Rajya Lakshmi,

Laxman Bodhan,

Arjun Lakshman

и другие.

AIP conference proceedings, Год журнала: 2025, Номер 3157, С. 100004 - 100004

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

A HYBRID CNN-LSTM AND ADABOOST MODEL FOR CLASSIFYING INTRUSION IN IoT NETWORKS DOI
Victor Osasu Eguavoen, Babatunde Seyi Olanrewaju,

Christian Nnamdi Okafor

и другие.

FUDMA Journal of Sciences, Год журнала: 2025, Номер 9(5), С. 204 - 212

Опубликована: Май 31, 2025

The rapid expansion of the Internet Things (IoT) has vastly increased device connectivity but also expanded attack surface. Resource constraints and heterogeneous protocols make traditional intrusion detection systems (IDS) inadequate: signature-based methods miss novel threats, anomaly detectors yield high false positive rates. We propose a hybrid model integrating CNN, LSTM, AdaBoost for robust IoT detection. Our two-stage pipeline begins with CNN-LSTM that automatically extracts spatial temporal features from preprocessed network traffic. CNN branch captures local patterns, while LSTM models sequential traffic dependencies. train on combined UNSW-NB15 RT-IoT2022 dataset 205,449 instances 127 initial features. Rigorous preprocessing (missing-value imputation, one-hot encoding, Z-score normalization, correlation-based elimination) reduces inputs to 20-feature subset. In second stage, we extract deep representations CNN-LSTM’s penultimate layer input them an classifier decision-stump base learners. This ensemble adaptively weights boost accuracy controlling computation. Experimental results show improved test performance: 99.70% accuracy, 99.90% precision, 99.78% recall, 99.84% F1-score, 2.43% rate. These metrics outperform conventional IDS (e.g., [Churcher et al., 2021: 98.2% accuracy; Kumar 98.5% F1-score]). model’s computational efficiency during training (64 steps/sec) suggests potential scalability, though real-world deployment validation remains future work.

Язык: Английский

Процитировано

0

Progressive Collaborative Method for Protecting Users Privacy in Location-Based Services DOI Creative Commons

K. Ramakrishna Reddy,

Vineet Sharma, M. Anusha

и другие.

MATEC Web of Conferences, Год журнала: 2024, Номер 392, С. 01089 - 01089

Опубликована: Янв. 1, 2024

The development of new mobile communication and information service technologies has opened up exciting possibilities for location-based services. Users services (LBS) can access vital data from their providers by utilizing location data. Maps navigation, services, tourist social networking, many more popular applications are available. A user's other personal details must be submitted to the in order them work. For example, about one's whereabouts identity. By "location privacy," we mean idea that third parties shouldn't able track a precise whereabouts. It is important users' sensitive hidden unauthorized individuals when communicating. Most difficult LBS concerns communications Each peer does duty reciprocally collaborative method, which completely distributed technique. most secure private (LBS), it employs cryptographic methods. number people using growing at rapid pace these days. At this time, there isn't single method available scalability capabilities. Building realistic computationally efficient solution offers high privacy while decreasing processing overhead improving challenging task. suggested cost-effective, supports scaling, highly resilient against security assaults, ensures privacy.

Язык: Английский

Процитировано

2

Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review DOI

Nouf Majid Sultan Eid Saeed,

Amer Ibrahim,

Liaqat Ali

и другие.

Опубликована: Фев. 26, 2024

The dynamic nature of cyber threats offers a continual problem in the field cybersecurity context expanding internet environment. This study provides an in-depth assessment literature on machine learning (ML) and deep (DL) methodologies for network analysis intrusion detection. review curates, assesses, distils method-specific findings while considering temporal or thermal correlations. It recognition importance data ML DL approaches, comprehensive overview frequently used datasets ML/DL applications, as well inherent challenges adopting field. concludes with well-informed recommendations future areas research this critical domine.

Язык: Английский

Процитировано

1

CNN-based Network Intrusion Detection and Classification Model for Cyber-Attacks DOI Open Access

Uwadia Anthony. O

International Journal of Innovative Science and Research Technology (IJISRT), Год журнала: 2024, Номер unknown, С. 1839 - 1847

Опубликована: Авг. 5, 2024

A Convolution Neural Network (CNN)-based Intrusion Detection Model for Cyber-attacks is of great value in identifying and classifying attacks on any network. The Knowledge Discovery Database Cup '99 dataset containing approximately 4,900,000 single connection vectors was divided into two phases; 75% the total used during learning process machine technique, while 25% a fully trained model to validate evaluate its performance. model's performance indicated that it can detect classify different classes with an accuracy 98% 20 epochs at 0.001 rate using learning. loss training validation 7.48% 7.98%, respectively, over epochs, which implies performed better dataset. This study demonstrated convolutional network-based classification shows high detection low false negative rates. CNN offers fidelity unknown attacks, i.e., differentiate between already-seen new zero-day attacks. At end experiment, proposed approach suitable modeling network IDS detecting intrusion computer networks thereby enabling secured environment proper functioning system

Язык: Английский

Процитировано

1