0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Comparative Evaluation of Machine Learning Models for Anomaly-Based IDS in IoT Networks
Authors :
Seyed Amir Mousavi
1
Mostafa Sadeghi
2
Mohammad Sadeq Sirjani
3
1- دانشگاه فردوسی مشهد
2- دانشگاه آزاد اسلامی واحد نجف آباد
3- دانشگاه فردوسی مشهد
Keywords :
Network Security،Intrusion Detection System،Artificial Intelligence،Machine Learning
Abstract :
With the increasing Internet use, network security has become essential due to the rise in cyber-attacks on network services. To detect these attacks, a robust Intrusion Detection System (IDS) is required. Traditional IDS face challenges like high false alert rates and slow real-time attack detection. Machine learning (ML) can improve this situation, providing a low False Alarm Rate and high detection rates. This research used five ML methods (Logistic Regression, Random Forest, k-Nearest Neighbors, Support Vector Machine, and XGBoost) to classify the UNSW-NB15 dataset. The goal is to evaluate the performance of various machine learning classifiers in detecting attacks for Internet of Things (IoT) network intrusion detection. The study highlighted the importance of further research to reduce false positives and negatives. To evaluate these classifiers, precision, accuracy, recall, and F1 score were used. The results show that XGBoost achieved the highest accuracy and recall. However, only some algorithms performed perfectly in all aspects, suggesting the need for diverse detection strategies. Future research should focus on developing comprehensive systems and ensemble approaches to minimize false alerts and missed detections.
Papers List
List of archived papers
Smart City Standardized Evaluation :Use Case of Mashhad
Dr ُSeyed Mohammadreza Mirsarraf - Dr Alireza Yari - Dr Navid Zohdi - Ali Motevalizadeh
Task Scheduling for Real-time Object Detection: Methods and Performance Comparison in ADAS Applications
Mahdi Seyfipoor - Sayyed Muhammad Jaffry - Siamak Mohamadi
SecVanet: provably secure authentication protocol for sending emergency events in VANET
Seyed Amir Mousavi - Mohammad Sadeq Sirjani - Seyyed Javad Bozorg zadeh Razavi - Morteza Nikooghadam
کشف لبه در تصاویر پزشکی با استفاده از اتوماتای سلولی سلسله مراتبی
مریم علینقی زاده - علیرضا رضوانیان
Inner and Outer Bearing Fault Diagnosis of electrical Motors Using a Proposed Algorithm and Vibration Signals
Vahid Safari Dehnavi - Masoud Shafiee
Customer Churn Prediction Using Data Mining Techniques for an Iranian Payment Application
Olya Rezaeian - Dr ُSeyedhamidreza Shahabi Haghighi - Dr Jamal Shahrabi
شبکههای نرمافزار محور در کلان داده: مطالعهی راهکارهای امنیتی و چالشها
احسان سلیمانی دهکردی - محمدرضا ملاخلیلی میبدی
A Hybrid Crow Search and Penguin Optimization Algorithm (CPMM) for Efficient Cloud Workflow Scheduling
Reza Akraminejad - Farhad Kazemipour - Mozhdeh Koreh Davoodi
Extending Interaction Flow Modeling Language as a Profile for Form-making Systems
Ghazaleh Shahin - Dr Bahman Zamani
A Demand Response Schema in Industry: Smart Scheduling Approach for Industrial Processes
Negin Shafinezhad - Hamid Abrishami - Maryam Mahmoodi
more
Samin Hamayesh - Version 41.3.1