0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Comparative Evaluation of Machine Learning Models for Anomaly-Based IDS in IoT Networks
Authors :
Seyed Amir Mousavi
1
Mostafa Sadeghi
2
Mohammad Sadeq Sirjani
3
1- دانشگاه فردوسی مشهد
2- دانشگاه آزاد اسلامی واحد نجف آباد
3- دانشگاه فردوسی مشهد
Keywords :
Network Security،Intrusion Detection System،Artificial Intelligence،Machine Learning
Abstract :
With the increasing Internet use, network security has become essential due to the rise in cyber-attacks on network services. To detect these attacks, a robust Intrusion Detection System (IDS) is required. Traditional IDS face challenges like high false alert rates and slow real-time attack detection. Machine learning (ML) can improve this situation, providing a low False Alarm Rate and high detection rates. This research used five ML methods (Logistic Regression, Random Forest, k-Nearest Neighbors, Support Vector Machine, and XGBoost) to classify the UNSW-NB15 dataset. The goal is to evaluate the performance of various machine learning classifiers in detecting attacks for Internet of Things (IoT) network intrusion detection. The study highlighted the importance of further research to reduce false positives and negatives. To evaluate these classifiers, precision, accuracy, recall, and F1 score were used. The results show that XGBoost achieved the highest accuracy and recall. However, only some algorithms performed perfectly in all aspects, suggesting the need for diverse detection strategies. Future research should focus on developing comprehensive systems and ensemble approaches to minimize false alerts and missed detections.
Papers List
List of archived papers
Customer Churn Prediction Using Data Mining Techniques for an Iranian Payment Application
Olya Rezaeian - Dr ُSeyedhamidreza Shahabi Haghighi - Dr Jamal Shahrabi
SDN-based Deep Anomaly Detection For Securing Cloud Gaming Servers
Mohammadreza Ghafari - Dr Seyed Mostafa Safavi Hemami
بهبود تشخیص نفوذ به شبکه اینترنت اشیاء با استفاده از مدل ترکیبی الگوریتم های بهینهسازی ازدحام ذرات، گرگ خاکستری و جنگل تصادفی
مهدی علیرضانژاد - عمار عبیس حسین المعموری
Aspect-Based Sentiment Analysis of After-Sales Service Quality: A Case Study of Snowa and Competitors Using Digikala Reviews
Safiyeh Samadanian - Marjan Kaedi
Electrophysiological Modeling and Interactive Approaches of Electrical Circuits and Hypergraphs for Understanding Neural Circuit Dynamics
Arian Baymani - Maryam Naderi Soorki
DRL-Based Phase Optimization for O-RIS in Dual-Hop Hard Switching FSO/RIS-aided RF and UWOC Systems
Aboozar Heydaribeni - Hamzeh Beyranvand - Sahar Eslami
مقایسه اثربخشی و سودمندی معیارهای پوشش آزمون نرم افزارهای مبتنی بر گرامر
عطیه منعمی بیدگلی
بررسی روش یادگیری انتقالی جهت پیشبینی پیوند
علی روحانی فر - کمال میرزایی بدرآبادی
طرحی برای تبدیل نمودارهای رفتاری BPMN به نمودار UML و تولید کد از آن
مهدیس صفری - احمد عبدالله زاده بارفروش
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Neda Toghraee - Hamid Mala
more
Samin Hamayesh - Version 42.5.2