0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Comparative Evaluation of Machine Learning Models for Anomaly-Based IDS in IoT Networks
Authors :
Seyed Amir Mousavi
1
Mostafa Sadeghi
2
Mohammad Sadeq Sirjani
3
1- دانشگاه فردوسی مشهد
2- دانشگاه آزاد اسلامی واحد نجف آباد
3- دانشگاه فردوسی مشهد
Keywords :
Network Security،Intrusion Detection System،Artificial Intelligence،Machine Learning
Abstract :
With the increasing Internet use, network security has become essential due to the rise in cyber-attacks on network services. To detect these attacks, a robust Intrusion Detection System (IDS) is required. Traditional IDS face challenges like high false alert rates and slow real-time attack detection. Machine learning (ML) can improve this situation, providing a low False Alarm Rate and high detection rates. This research used five ML methods (Logistic Regression, Random Forest, k-Nearest Neighbors, Support Vector Machine, and XGBoost) to classify the UNSW-NB15 dataset. The goal is to evaluate the performance of various machine learning classifiers in detecting attacks for Internet of Things (IoT) network intrusion detection. The study highlighted the importance of further research to reduce false positives and negatives. To evaluate these classifiers, precision, accuracy, recall, and F1 score were used. The results show that XGBoost achieved the highest accuracy and recall. However, only some algorithms performed perfectly in all aspects, suggesting the need for diverse detection strategies. Future research should focus on developing comprehensive systems and ensemble approaches to minimize false alerts and missed detections.
Papers List
List of archived papers
Data Analysis to Reduce Electrical Power Plants
Amirali Sahraei - Jamshid Shanbehzadeh
آرتمیا: پروتکل مسیریابی مبتنی بر انجمن و آگاه به نظم تماس در شبکة اجتماعی متحرک تأخیرپذیر
سعید مرادی - جمشید باقرزاده محاسفی
Using Deconvolutional Variational Autoencoder for Answer Selection in Community Question Answering
Golshan Afzali Boroujeni - Heshaam Faili
An approach to model the optimal service provisioning in vehicular cloud networks
Farhoud Jafari Kaleibar - Maghsoud Abbaspour
Combinatorial Auction Based on Social Choice in the Internet of Things
Maede Esmaeili - Faria Nassiri-Mofakham - Fatemeh Hassanvand
A Comparison between Slimed Network and Pruned Network for Head Pose Estimation
Amir Salimiparsa - Hadi Veisi - Mohammad-shahram Moin
Distributed Learning Automata-based Algorithm for Finding K-Clique in Complex Social Networks
Mohammad Mehdi Daliri Khomami - Alireza Rezvanian - Ali Mohammad Saghiri - Mohammad Reza Meybodi
Classical-Quantum Multiple Access Wiretap Channel with Common Message: One-shot Rate Region
Hadi Aghaee - Dr Bahareh Akhbari
بررسی امنیت وفقی در اینترنت وسایل نقلیه
سیده یگانه غیور باغبانی - دکتر سعید جلیلی سیده یگانه غیور باغبانی - سعید جلیلی -
Fast Duplicate Bug Reports Detector Training using Sampling for Dimension Reduction
Behzad Soleimani Neysiani - Saeed Doostali - Seyed Morteza Babamir - Zahra Aminoroaya
more
Samin Hamayesh - Version 42.5.2