Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Network intrusion detection method based on IEHO-SVM

View through CrossRef
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intrusion detection method are proposed to address the difficulties and low detection accuracy of the detection. This method first uses an optimized elephant swarm optimization algorithm to select features from the intrusion data and then uses the elephant swarm optimization method to optimize the parameters of the support vector machine algorithm. Finally, a detection model is constructed based on support vector machines. The main contribution of the research is the proposal of a network intrusion detection method based on improved swarm optimization algorithm and support vector machine. By using an improved swarm optimization algorithm to optimize the parameters of the support vector machine classification algorithm, this method significantly improves the accuracy and stability of detection when dealing with the classification task of network intrusion detection. The experimental results show that the detection model has a stable average accuracy of around 94% in detecting four types of intrusion data, surpassing the performance of other commonly used algorithms. The results validate the effectiveness of introducing the improved elephant swarm optimization algorithm and demonstrate its superiority in intrusion detection tasks.
Title: Network intrusion detection method based on IEHO-SVM
Description:
As the growth of network technology, the network intrusion has become increasingly serious.
An elephant herding optimization algorithm and support vector machine-based network intrusion detection method are proposed to address the difficulties and low detection accuracy of the detection.
This method first uses an optimized elephant swarm optimization algorithm to select features from the intrusion data and then uses the elephant swarm optimization method to optimize the parameters of the support vector machine algorithm.
Finally, a detection model is constructed based on support vector machines.
The main contribution of the research is the proposal of a network intrusion detection method based on improved swarm optimization algorithm and support vector machine.
By using an improved swarm optimization algorithm to optimize the parameters of the support vector machine classification algorithm, this method significantly improves the accuracy and stability of detection when dealing with the classification task of network intrusion detection.
The experimental results show that the detection model has a stable average accuracy of around 94% in detecting four types of intrusion data, surpassing the performance of other commonly used algorithms.
The results validate the effectiveness of introducing the improved elephant swarm optimization algorithm and demonstrate its superiority in intrusion detection tasks.

Related Results

Support vector machine for one-step group analysis of functional MRI of the human brain
Support vector machine for one-step group analysis of functional MRI of the human brain
Introduction Pattern recognition techniques promise improved sensitivity and flexibility for the analysis of functional MRI (fMRI) data (Haynes and Rees 2006). This...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
KLASIFIKASI MASSA PADA CITRA MAMMOGRAM MENGGUNAKAN KOMBINASI SELEKSI FITUR F-SCORE DAN LS-SVM
KLASIFIKASI MASSA PADA CITRA MAMMOGRAM MENGGUNAKAN KOMBINASI SELEKSI FITUR F-SCORE DAN LS-SVM
ABSTRAKKanker payudara adalah penyakit yang paling umum diderita oleh perempuan pada banyak negara. Pemeriksaan kanker payudara dapat dilakukan menggunakan citra Mammogram dengan t...
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Technology and its growth is considerably enormous. This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc netwo...
A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
In order to improve the communication security of wireless mobile network, a collaborative intrusion detection method based on cloud computing is studied. The mobile terminal and t...
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
Network intrusion detection using ensemble weighted voting classifier based honeypot framework
Network intrusion detection using ensemble weighted voting classifier based honeypot framework
<p>The Internet of Things (IoT) is a new model that connects physical objects and the Internet and has become one of the most important technological developments in computin...
Soil Moisture Content Prediction Model for Tea Plantations Based on a Wireless Sensor Network
Soil Moisture Content Prediction Model for Tea Plantations Based on a Wireless Sensor Network
<p>Suitable soil moisture content (SMC) can not only increase the ability of tea tree roots to absorb and utilize nutrients but also improve the utilization rate of soil nutr...

Back to Top