Javascript must be enabled to continue!
Network intrusion detection method based on IEHO-SVM
View through CrossRef
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intrusion detection method are proposed to address the difficulties and low detection accuracy of the detection. This method first uses an optimized elephant swarm optimization algorithm to select features from the intrusion data and then uses the elephant swarm optimization method to optimize the parameters of the support vector machine algorithm. Finally, a detection model is constructed based on support vector machines. The main contribution of the research is the proposal of a network intrusion detection method based on improved swarm optimization algorithm and support vector machine. By using an improved swarm optimization algorithm to optimize the parameters of the support vector machine classification algorithm, this method significantly improves the accuracy and stability of detection when dealing with the classification task of network intrusion detection. The experimental results show that the detection model has a stable average accuracy of around 94% in detecting four types of intrusion data, surpassing the performance of other commonly used algorithms. The results validate the effectiveness of introducing the improved elephant swarm optimization algorithm and demonstrate its superiority in intrusion detection tasks.
Title: Network intrusion detection method based on IEHO-SVM
Description:
As the growth of network technology, the network intrusion has become increasingly serious.
An elephant herding optimization algorithm and support vector machine-based network intrusion detection method are proposed to address the difficulties and low detection accuracy of the detection.
This method first uses an optimized elephant swarm optimization algorithm to select features from the intrusion data and then uses the elephant swarm optimization method to optimize the parameters of the support vector machine algorithm.
Finally, a detection model is constructed based on support vector machines.
The main contribution of the research is the proposal of a network intrusion detection method based on improved swarm optimization algorithm and support vector machine.
By using an improved swarm optimization algorithm to optimize the parameters of the support vector machine classification algorithm, this method significantly improves the accuracy and stability of detection when dealing with the classification task of network intrusion detection.
The experimental results show that the detection model has a stable average accuracy of around 94% in detecting four types of intrusion data, surpassing the performance of other commonly used algorithms.
The results validate the effectiveness of introducing the improved elephant swarm optimization algorithm and demonstrate its superiority in intrusion detection tasks.
Related Results
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
Soil Moisture Content Prediction Model for Tea Plantations Based on a Wireless Sensor Network
Soil Moisture Content Prediction Model for Tea Plantations Based on a Wireless Sensor Network
<p>Suitable soil moisture content (SMC) can not only increase the ability of tea tree roots to absorb and utilize nutrients but also improve the utilization rate of soil nutr...
Acoustic event detection and classification
Acoustic event detection and classification
L'activitat humana que té lloc en sales de reunions o aules d'ensenyament es veu reflectida en una rica varietat d'events acústics, ja siguin produïts pel cos humà o per objectes q...
Accuracy and Value of Time-resolved MRA for Spinal Vascular Malformations
Accuracy and Value of Time-resolved MRA for Spinal Vascular Malformations
Study Design.
Retrospective.
Objective.
To explore the value of time-resolved CE-MRA in evaluating and locating the SVM be...
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
Advancements of cloud computing called for the storage of big data through the use of clouds but this came with a lot of risk. Thus, this thesis is aimed to manage these risks by p...
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
AbstractThe continuous progress of society has created conditions for the widespread use of information technology. People rely more and more on information technology and the Inte...
Network Intrusion Detection Utilizing Autoencoder Neural Networks
Network Intrusion Detection Utilizing Autoencoder Neural Networks
In today's interconnected digital landscape, protecting computer networks from unauthorized access and cyber threats is critically important. Network Intrusion Detection Systems (N...

