0% Complete
English
صفحه اصلی
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Comparative Evaluation of Machine Learning Models for Anomaly-Based IDS in IoT Networks
نویسندگان :
Seyed Amir Mousavi
1
Mostafa Sadeghi
2
Mohammad Sadeq Sirjani
3
1- دانشگاه فردوسی مشهد
2- دانشگاه آزاد اسلامی واحد نجف آباد
3- دانشگاه فردوسی مشهد
کلمات کلیدی :
Network Security،Intrusion Detection System،Artificial Intelligence،Machine Learning
چکیده :
With the increasing Internet use, network security has become essential due to the rise in cyber-attacks on network services. To detect these attacks, a robust Intrusion Detection System (IDS) is required. Traditional IDS face challenges like high false alert rates and slow real-time attack detection. Machine learning (ML) can improve this situation, providing a low False Alarm Rate and high detection rates. This research used five ML methods (Logistic Regression, Random Forest, k-Nearest Neighbors, Support Vector Machine, and XGBoost) to classify the UNSW-NB15 dataset. The goal is to evaluate the performance of various machine learning classifiers in detecting attacks for Internet of Things (IoT) network intrusion detection. The study highlighted the importance of further research to reduce false positives and negatives. To evaluate these classifiers, precision, accuracy, recall, and F1 score were used. The results show that XGBoost achieved the highest accuracy and recall. However, only some algorithms performed perfectly in all aspects, suggesting the need for diverse detection strategies. Future research should focus on developing comprehensive systems and ensemble approaches to minimize false alerts and missed detections.
لیست مقالات
لیست مقالات بایگانی شده
بررسی تأثیر استقرار استاندارد COBIT در افزایش بهره وری سازمانها (مطالعه موردی: شعب نمایندگیهای همراه اول، ایرانسل، رایتل)
دکتر محمد ابراهیم سمیع - ساره رحمانیان محمد ابراهیم سمیع - ساره رحمانیان -
GanjNet: Leveraging Network Modeling with Large Language Models for Persian Word Sense Induction
Amir Mohammad Kouyeshpour - Hadi Veisi - Saman Haratizadeh
NFV-Based Distributed Service Function Chaining with Imperfect Information
Mahsa Alikhani - Marzieh Sheikhi - Dr Vesal Hakami
شناسایی حملات رومینگ تلفنهمراه با استفاده از یادگیری ماشین
سعیده سیف الدین - سجاد شیرعلی شهرضا
Distributed coordination protocol for event data exchange in IoT monitoring applications
Behnam Khazael - Hadi Tabatabaee Malazi
Presentation of a New Decoder Based on Quantum Cellular Automata Technology Along with an Analysis of Energy Consumption
- - -
Statistical Disorder Parameters Computing For Hyperspectral Image Anomaly Detection
Dr Maryam Imani
A Novel Service Deployment Policy in Fog Computing Considering The Degree of Availability and Fog Landscape Utilization Using Multiobjective Evolutionary Algorithms
Maryam Eslami - Dr Mehdi Sakhaei-nia
A Mathematical Optimization Approach for Preference Learning in Movie Recommender Systems with Shared Accounts
Milad Khademali - Fazlollah Aghamohammadi - Marjan Kaedi - Alireza Nasiri
هوشمندسازی پایش کیفیت رنگزنی داخلی گرین تایر و تحلیل داده برای بهینه سازی عمر بلادر، مصرف رنگ و ریشه یابی عیوب پخت
سامان ثنایی - رضا رحیمی
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2