• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于网络威胁识别的高级入侵检测架构的混合进化机器学习模型。

Hybrid evolutionary machine learning model for advanced intrusion detection architecture for cyber threat identification.

机构信息

Chitkara University Institute of Engineering and Technology, Chitkara University, Chandigarh, Punjab, India.

Robotics and Internet-of-Things Laboratory, Prince Sultan University, Riyadh, Saudi Arabia.

出版信息

PLoS One. 2024 Sep 12;19(9):e0308206. doi: 10.1371/journal.pone.0308206. eCollection 2024.

DOI:10.1371/journal.pone.0308206
PMID:39264944
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11392230/
Abstract

In response to the rapidly evolving threat landscape in network security, this paper proposes an Evolutionary Machine Learning Algorithm designed for robust intrusion detection. We specifically address challenges such as adaptability to new threats and scalability across diverse network environments. Our approach is validated using two distinct datasets: BoT-IoT, reflecting a range of IoT-specific attacks, and UNSW-NB15, offering a broader context of network intrusion scenarios using GA based hybrid DT-SVM. This selection facilitates a comprehensive evaluation of the algorithm's effectiveness across varying attack vectors. Performance metrics including accuracy, recall, and false positive rates are meticulously chosen to demonstrate the algorithm's capability to accurately identify and adapt to both known and novel threats, thereby substantiating the algorithm's potential as a scalable and adaptable security solution. This study aims to advance the development of intrusion detection systems that are not only reactive but also preemptively adaptive to emerging cyber threats." During the feature selection step, a GA is used to discover and preserve the most relevant characteristics from the dataset by using evolutionary principles. Through the use of this technology based on genetic algorithms, the subset of features is optimised, enabling the subsequent classification model to focus on the most relevant components of network data. In order to accomplish this, DT-SVM classification and GA-driven feature selection are integrated in an effort to strike a balance between efficiency and accuracy. The system has been purposefully designed to efficiently handle data streams in real-time, ensuring that intrusions are promptly and precisely detected. The empirical results corroborate the study's assertion that the IDS outperforms traditional methodologies.

摘要

针对网络安全中不断演变的威胁形势,本文提出了一种用于稳健入侵检测的进化机器学习算法。我们专门解决了新威胁的适应性和跨不同网络环境的可扩展性等挑战。我们的方法使用两个不同的数据集进行验证:BoT-IoT,反映了一系列特定于物联网的攻击,以及 UNSW-NB15,提供了更广泛的网络入侵场景,使用基于 GA 的混合 DT-SVM。这种选择有助于全面评估算法在不同攻击向量下的有效性。精心选择了准确性、召回率和误报率等性能指标,以证明算法能够准确识别和适应已知和新的威胁,从而证明算法作为一种可扩展和自适应的安全解决方案的潜力。本研究旨在推进入侵检测系统的发展,这些系统不仅具有反应性,而且能够主动适应新兴的网络威胁。

在特征选择步骤中,使用遗传算法根据进化原则发现和保留数据集中最相关的特征。通过使用这种基于遗传算法的技术,对特征子集进行了优化,从而使后续的分类模型能够专注于网络数据的最相关部分。为了实现这一点,DT-SVM 分类和 GA 驱动的特征选择被集成在一起,以在效率和准确性之间取得平衡。该系统旨在高效地实时处理数据流,确保及时准确地检测入侵。实证结果证实了该研究的断言,即 IDS 优于传统方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/e378603c586e/pone.0308206.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/3c8e9f929e17/pone.0308206.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/c1c7a26513e7/pone.0308206.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/d2d3dc6fefa5/pone.0308206.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/a18da5111348/pone.0308206.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/d97e608b80ab/pone.0308206.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/efd646fb6137/pone.0308206.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/e378603c586e/pone.0308206.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/3c8e9f929e17/pone.0308206.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/c1c7a26513e7/pone.0308206.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/d2d3dc6fefa5/pone.0308206.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/a18da5111348/pone.0308206.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/d97e608b80ab/pone.0308206.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/efd646fb6137/pone.0308206.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cd4d/11392230/e378603c586e/pone.0308206.g007.jpg

相似文献

1
Hybrid evolutionary machine learning model for advanced intrusion detection architecture for cyber threat identification.用于网络威胁识别的高级入侵检测架构的混合进化机器学习模型。
PLoS One. 2024 Sep 12;19(9):e0308206. doi: 10.1371/journal.pone.0308206. eCollection 2024.
2
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
3
Optimized intrusion detection in IoT and fog computing using ensemble learning and advanced feature selection.使用集成学习和先进特征选择技术实现物联网和雾计算中的优化入侵检测。
PLoS One. 2024 Aug 1;19(8):e0304082. doi: 10.1371/journal.pone.0304082. eCollection 2024.
4
A novel intrusion detection framework for optimizing IoT security.一种用于优化物联网安全的新型入侵检测框架。
Sci Rep. 2024 Sep 18;14(1):21789. doi: 10.1038/s41598-024-72049-z.
5
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques.使用平衡类分布、特征选择和集成机器学习技术优化物联网入侵检测
Sensors (Basel). 2024 Jul 1;24(13):4293. doi: 10.3390/s24134293.
6
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.ROAST-IoT:一种用于物联网网络入侵检测的新型距离优化注意力卷积散射技术。
Sensors (Basel). 2023 Sep 23;23(19):8044. doi: 10.3390/s23198044.
7
A hybrid deep learning-based intrusion detection system for IoT networks.一种用于物联网网络的基于深度学习的混合入侵检测系统。
Math Biosci Eng. 2023 Jun 13;20(8):13491-13520. doi: 10.3934/mbe.2023602.
8
Classification model for accuracy and intrusion detection using machine learning approach.使用机器学习方法的用于准确性和入侵检测的分类模型。
PeerJ Comput Sci. 2021 Apr 7;7:e437. doi: 10.7717/peerj-cs.437. eCollection 2021.
9
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
10
Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.基于深度神经网络的物联网架构开发,以应对自动化引导车辆的网络攻击。
Sensors (Basel). 2021 Dec 18;21(24):8467. doi: 10.3390/s21248467.

引用本文的文献

1
Optimizing IoT intrusion detection with cosine similarity based dataset balancing and hybrid deep learning.基于余弦相似度的数据集平衡与混合深度学习优化物联网入侵检测
Sci Rep. 2025 Aug 22;15(1):30939. doi: 10.1038/s41598-025-15631-3.
2
An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments.基于狐狸优化器的特征选择模型的深度学习在物联网环境中保障网络攻击检测的有效性。
Sci Rep. 2025 Aug 6;15(1):28674. doi: 10.1038/s41598-025-13134-9.

本文引用的文献

1
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.基于机器学习的物联网网络攻击分类的实验分析。
Sensors (Basel). 2021 Jan 10;21(2):446. doi: 10.3390/s21020446.
2
Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques.基于机器学习技术的物联网智慧城市应用中的网络攻击检测。
Int J Environ Res Public Health. 2020 Dec 14;17(24):9347. doi: 10.3390/ijerph17249347.
3
Support vector machines for histogram-based image classification.用于基于直方图的图像分类的支持向量机。
IEEE Trans Neural Netw. 1999;10(5):1055-64. doi: 10.1109/72.788646.