Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Network intrusion detection using ensemble weighted voting classifier based honeypot framework

View through CrossRef
<p>The Internet of Things (IoT) is a new model that connects physical objects and the Internet and has become one of the most important technological developments in computing. It is estimated that by 2022, one trillion physical objects will be connected to the Internet. The poor accessibility and lack of interoperability of many of these devices in a vast heterogeneous landscape make it difficult to design specific security measures and implement specific defences mechanism in addition, IoT networks are still open and vulnerable to network disruption attacks. Therefore, there is a need for additional security tools related to IoT. Intrusion Detection System could serve this purpose. Intrusion detection is the process of monitoring and analyzing network traffic in order to detect potential security breaches and unauthorized access to a IOT network. It involves the use of various technologies and techniques to identify and respond to potential threats in real-time. Network intrusion detection helps organizations protect their valuable assets, including sensitive data, intellectual property, and financial resources, from cyberattacks. By detecting and responding to potential security breaches in a timely manner, network intrusion detection systems can help organizations prevent or mitigate the impact of security incidents, minimize downtime and financial losses, and maintain the integrity of their operations and reputation. Weighted soft voting is a technique used in network intrusion detection to improve the accuracy and reliability of the detection process. It involves combining the results of multiple intrusion detection systems (IDS) based on decision tree, random forest and XGBoost using a weighted approach that assigns different levels of importance to each system based on its performance and reliability. The basic idea behind weighted soft voting is to give more weight to the predictions of IDS that have higher accuracy and lower false positive rates, and less weight to those that have lower accuracy and higher false positive rates. The proposed approach can help reduce the impact of false alarms and increase the sensitivity and specificity of the intrusion detection process.</p>
Title: Network intrusion detection using ensemble weighted voting classifier based honeypot framework
Description:
<p>The Internet of Things (IoT) is a new model that connects physical objects and the Internet and has become one of the most important technological developments in computing.
It is estimated that by 2022, one trillion physical objects will be connected to the Internet.
The poor accessibility and lack of interoperability of many of these devices in a vast heterogeneous landscape make it difficult to design specific security measures and implement specific defences mechanism in addition, IoT networks are still open and vulnerable to network disruption attacks.
Therefore, there is a need for additional security tools related to IoT.
Intrusion Detection System could serve this purpose.
Intrusion detection is the process of monitoring and analyzing network traffic in order to detect potential security breaches and unauthorized access to a IOT network.
It involves the use of various technologies and techniques to identify and respond to potential threats in real-time.
Network intrusion detection helps organizations protect their valuable assets, including sensitive data, intellectual property, and financial resources, from cyberattacks.
By detecting and responding to potential security breaches in a timely manner, network intrusion detection systems can help organizations prevent or mitigate the impact of security incidents, minimize downtime and financial losses, and maintain the integrity of their operations and reputation.
Weighted soft voting is a technique used in network intrusion detection to improve the accuracy and reliability of the detection process.
It involves combining the results of multiple intrusion detection systems (IDS) based on decision tree, random forest and XGBoost using a weighted approach that assigns different levels of importance to each system based on its performance and reliability.
The basic idea behind weighted soft voting is to give more weight to the predictions of IDS that have higher accuracy and lower false positive rates, and less weight to those that have lower accuracy and higher false positive rates.
The proposed approach can help reduce the impact of false alarms and increase the sensitivity and specificity of the intrusion detection process.
</p>.

Related Results

Electronic Voting Systems
Electronic Voting Systems
In 2001, Wand and colleagues published a paper titled “The Butterfly Did It” (see Wand, et al. 2001, cited under Voting System Neutrality) in which they argue that Palm Beach Count...
Deep Learning-Based Ensemble Two-Step Classification of Medical Images Using CNN Architectures and Ensemble Methods
Deep Learning-Based Ensemble Two-Step Classification of Medical Images Using CNN Architectures and Ensemble Methods
Breast cancer remains one of the most common cancers amongst women globally. Early detection is crucial for improving survival rates. While mammography is widely used and an effect...
HONEYPOT: Intrusion Detection System
HONEYPOT: Intrusion Detection System
The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of netw...
Reformulasi Sistem Pemungutan Suara Dalam Pemilihan Umum di Indonesia
Reformulasi Sistem Pemungutan Suara Dalam Pemilihan Umum di Indonesia
The aim of this research is to determine and analyze the position of e-voting in current election laws and regulations and the reformulation of the voting system in elections in In...
Exploratory Review: Decentralized Voting System Using Blockchain
Exploratory Review: Decentralized Voting System Using Blockchain
Abstract: Electronic voting, often known as e-voting, has been utilized in various forms since the 1970s, with basic advantages over paper-based systems such as improved efficiency...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
Privacy Preserving Voting Scheme Based on Blockchain Technology
Privacy Preserving Voting Scheme Based on Blockchain Technology
Democracy has made voting incredibly important in any nation due to a general scepticism of the traditional voting process. Individuals have witnessed violations of their fundament...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...

Back to Top