期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems
1
作者 Reem Alkanhel Doaa Sami Khafaga +5 位作者 El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den 《Computers, Materials & Continua》 SCIE EI 2023年第2期2695-2709,共15页
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices remotely.Due to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy... The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices remotely.Due to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing attacks.That’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT networks.The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks.Therefore,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization algorithms.To prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE balancing.Experimental results showed that the proposed approach outperforms the other approaches and could boost the detection accuracy.In addition,a statistical analysis is performed to study the significance and stability of the proposed approach.The conducted experiments include seven different types of attack cases in the RPL-NIDS17 dataset.Based on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%). 展开更多
关键词 Metaheuristics grey wolf optimization dipper throated optimization dataset balancing locality sensitive hashing SMOTE
下载PDF
Benefiting from providing multi-dimensional view of peers in overlay of P2P streaming system
2
作者 苏杭 Wang Jinlin You Jiali 《High Technology Letters》 EI CAS 2013年第2期214-220,共7页
Most overlay of existing P2P streaming systems just focus on the view point of video content data.An multi-dimensional overlay for the P2P streaming system(MDOPS) is proposed for providing multi-dimensional view inclu... Most overlay of existing P2P streaming systems just focus on the view point of video content data.An multi-dimensional overlay for the P2P streaming system(MDOPS) is proposed for providing multi-dimensional view including video data,peers' service capability and online stability based on locality sensitive hashing.MDOPS organizes all Live/VoD peers and the above multi-dimensional information in a one-dimensinal DHT,uses range resource information publish/search and introduces multiple load balancing methods.MDOPS maintains an additional candidate coordinating peer list with high qualified peers who own the video data the peer would possibly access currently and in future.This list could speed up the process of searching peers for data scheduling layer.Simulation experiment based on trace of real streaming system has testified that MDOPS can effectively improve the quality of search results and smooth load distribution among peers without increasing the cost of resource publish/search. 展开更多
关键词 Peer-to-Peer (P'2P) STREAMING OVERLAY locality sensitive hashing rangesearch load balance
下载PDF
Image Betrayal Checking Based on the Digital Fingerprint of Images on the Internet
3
作者 余永升 陈晓苏 《Journal of Southwest Jiaotong University(English Edition)》 2010年第2期149-159,共11页
In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some... In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some private files have been leaked. In this paper, we put forward a scheme for active image betrayal checking on the Intemet based on the digital fingerprint, which embeds fingerprints into privacy documents, extracts codes from the Intemet images, and then fmds out the divulged files by matching two groups of codes. Due to so many documents on the Internet, the number of times of code comparison is huge, which leads to a large running time. To overcome the deficiency in practical application, we optimized the process by accurate matching methods and approximate matching method. Then a method was proposed to group objects by locality sensitive hashing (LSH) process before code comparison, in order to eliminate the vast majority of unrelated pairs. Experiments prove that this method could operate with less running time and less memory. 展开更多
关键词 Betrayal checking Digital watermarking Digital fingerprint Locality sensitive hashing (LSH)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部