期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion in Various Datasets 被引量:1
1
作者 Ouail Mjahed Salah El Hadaj +1 位作者 El Mahdi El Guarmah Soukaina Mjahed 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期265-298,共34页
Due to the increasing number of cyber-attacks,the necessity to develop efficient intrusion detection systems(IDS)is more imperative than ever.In IDS research,the most effectively used methodology is based on supervise... Due to the increasing number of cyber-attacks,the necessity to develop efficient intrusion detection systems(IDS)is more imperative than ever.In IDS research,the most effectively used methodology is based on supervised Neural Networks(NN)and unsupervised clustering,but there are few works dedicated to their hybridization with metaheuristic algorithms.As intrusion detection data usually contains several features,it is essential to select the best ones appropriately.Linear Discriminant Analysis(LDA)and t-statistic are considered as efficient conventional techniques to select the best features,but they have been little exploited in IDS design.Thus,the research proposed in this paper can be summarized as follows.a)The proposed approach aims to use hybridized unsupervised and hybridized supervised detection processes of all the attack categories in the CICIDS2017 Dataset.Nevertheless,owing to the large size of the CICIDS2017 Dataset,only 25%of the data was used.b)As a feature selection method,the LDAperformancemeasure is chosen and combinedwith the t-statistic.c)For intrusion detection,unsupervised Fuzzy C-means(FCM)clustering and supervised Back-propagation NN are adopted.d)In addition and in order to enhance the suggested classifiers,FCM and NN are hybridized with the seven most known metaheuristic algorithms,including Genetic Algorithm(GA),Particle Swarm Optimization(PSO),Differential Evolution(DE),Cultural Algorithm(CA),Harmony Search(HS),Ant-Lion Optimizer(ALO)and Black Hole(BH)Algorithm.Performance metrics extracted from confusion matrices,such as accuracy,precision,sensitivity and F1-score are exploited.The experimental result for the proposed intrusion detection,based on training and test CICIDS2017 datasets,indicated that PSO,GA and ALO-based NNs can achieve promising results.PSO-NN produces a tested accuracy,global sensitivity and F1-score of 99.97%,99.95%and 99.96%,respectively,outperforming performance concluded in several related works.Furthermore,the best-proposed approaches are valued in the most recent intrusion detection datasets:CSE-CICIDS2018 and LUFlow2020.The evaluation fallouts consolidate the previous results and confirm their correctness. 展开更多
关键词 Classification neural networks Fuzzy C-means metaheuristic algorithm CICIDS2017 intrusion detection system
下载PDF
New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets
2
作者 Ouail Mjahed Salah El Hadaj +1 位作者 El Mahdi El Guarmah Soukaina Mjahed 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期757-775,共19页
Denial of Service(DoS/DDoS)intrusions are damaging cyberattacks,and their identification is of great interest to the Intrusion Detection System(IDS).Existing IDS are mainly based on Machine Learning(ML)methods includi... Denial of Service(DoS/DDoS)intrusions are damaging cyberattacks,and their identification is of great interest to the Intrusion Detection System(IDS).Existing IDS are mainly based on Machine Learning(ML)methods including Deep Neural Networks(DNN),but which are rarely hybridized with other techniques.The intrusion data used are generally imbalanced and contain multiple features.Thus,the proposed approach aims to use a DNN-based method to detect DoS/DDoS attacks using CICIDS2017,CSE-CICIDS2018 and CICDDoS 2019 datasets,according to the following key points.a)Three imbalanced CICIDS2017-2018-2019 datasets,including Benign and DoS/DDoS attack classes,are used.b)A new technique based on K-means is developed to obtain semi-balanced datasets.c)As a feature selectionmethod,LDA(Linear Discriminant Analysis)performance measure is chosen.d)Four metaheuristic algorithms,counting Artificial Immune System(AIS),Firefly Algorithm(FA),Invasive Weeds Optimization(IWO)and Cuckoo Search(CS)are used,for the first time together,to increase the performance of the suggested DNN-based DoS attacks detection.The experimental results,based on semi-balanced training and test datasets,indicated that AIS,FA,IWO and CS-based DNNs can achieve promising results,even when cross-validated.AIS-DNN yields a tested accuracy of 99.97%,99.98%and 99.99%,for the three considered datasets,respectively,outperforming performance established in several related works. 展开更多
关键词 CLASSIFICATION neural networks metaheuristic algorithm intrusion detection system DOS/DDOS
下载PDF
Use of genetic algorithm in new approach to modeling of flood routing 被引量:1
3
作者 EL ALAOUI EL FELS Abdelhafid ALAA Noureddine BACHNOU Ali 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2019年第1期72-78,共7页
The hydrological models and simpli?ed methods of Saint-venant equations are used extensively in hydrological modeling, in particular for the simulation of the ?ood routing. These models require speci?c and extensive d... The hydrological models and simpli?ed methods of Saint-venant equations are used extensively in hydrological modeling, in particular for the simulation of the ?ood routing. These models require speci?c and extensive data that usually makes the study of ?ood propagation an arduous practice. We present in this work a new model, based on a transfer function, this function is a function of parametric probability density, having a physical meaning with respect to the propagation of a hydrological signal. The inversion of the model is carried out by an optimization technique called Genetic Algorithm. It consists of evolving a population of parameters based primarily on genetic recombination operators and natural selection to?nd the minimum of an objective function that measures the distance between observed and simulated data. The precision of the simulations of the proposed model is compared with the response of the Hayami model and the applicability of the model is tested on a real case, the N'Fis basin river, located in the High Atlas Occidental, which presents elements that appear favorable to the study of the propagation. The results obtained are very satisfactory and the simulation of the proposed model is very close to the response of the Hayami model. 展开更多
关键词 GENETIC Algorithm FLOOD ROUTING Hayami model simulation PROPAGATION
下载PDF
Probabilistic Approach to the Asynchronous Iteration
4
作者 A. S. Rasulov M. T. Bakoev D. R. Akabirhodjaeva 《Journal of Applied Mathematics and Physics》 2014年第1期32-40,共9页
In this work we will consider asynchronous iteration algorithms. As is well known in multiprocessor computers the parallel application of iterative methods often shows poor scaling and less optimal parallel efficiency... In this work we will consider asynchronous iteration algorithms. As is well known in multiprocessor computers the parallel application of iterative methods often shows poor scaling and less optimal parallel efficiency. The ordinary iterative asynchronous method often has much better parallel efficiency as they almost never need to wait to communicate between possessors. We will study probabilistic approach in asynchronous iteration algorithms and present a mathematical description of this computational process to the multiprocessor environment. The result of our simple numerical experiments shows a convergence and efficiency of asynchronous iterative processes for considered nonlinear problems. 展开更多
关键词 ASYNCHRONOUS ITERATIONS Linear and Nonlinear Equations MULTIPROCESSOR COMPUTERS ITERATIVE Method with Memory Probabilistic Approach
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部