首页 > 最新文献

2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)最新文献

英文 中文
An Intrusion Detection System for IoT Using KNN and Decision-Tree Based Classification 基于KNN和决策树分类的物联网入侵检测系统
Zainab Hussam Abdaljabar, O. Ucan, Khattab M. Ali Alheeti
The Internet of Things (IoT) has grown rapidly in recent years, intending to affect everything from everyday life to large industrial systems. Regrettably, this has attracted the attention of hackers, who have turned the Internet of Things into a target for malicious activity, exposing end nodes to attack. IoT devices’ sheer volume and diversity make protecting the IoT infrastructure with a traditional intrusion detection system difficult. So to protect IoT devices, the data flow was investigated in an IoT context to protect these devices from hackers. We used two machine learning classifiers in this work: KNN (K-Nearest Neighbors) and DT (Decision Tree). We calculated the Error Rate, Accuracy, Precision, Recall, and F1 score for each method. When we combined these two classifiers, we obtained outstanding results (100 %). We have a high rate of detection of attacks. The findings are summarized.
物联网(IoT)近年来发展迅速,旨在影响从日常生活到大型工业系统的一切。令人遗憾的是,这引起了黑客的注意,他们将物联网变成了恶意活动的目标,将终端节点暴露在攻击之下。物联网设备的庞大数量和多样性使得用传统的入侵检测系统保护物联网基础设施变得困难。因此,为了保护物联网设备,我们在物联网环境中研究了数据流,以保护这些设备免受黑客攻击。我们在这项工作中使用了两个机器学习分类器:KNN (K-Nearest Neighbors)和DT (Decision Tree)。我们计算了每种方法的错误率、准确率、精密度、召回率和F1分数。当我们结合这两个分类器时,我们获得了出色的结果(100%)。我们对攻击的侦测率很高。总结了研究结果。
{"title":"An Intrusion Detection System for IoT Using KNN and Decision-Tree Based Classification","authors":"Zainab Hussam Abdaljabar, O. Ucan, Khattab M. Ali Alheeti","doi":"10.1109/MTICTI53925.2021.9664772","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664772","url":null,"abstract":"The Internet of Things (IoT) has grown rapidly in recent years, intending to affect everything from everyday life to large industrial systems. Regrettably, this has attracted the attention of hackers, who have turned the Internet of Things into a target for malicious activity, exposing end nodes to attack. IoT devices’ sheer volume and diversity make protecting the IoT infrastructure with a traditional intrusion detection system difficult. So to protect IoT devices, the data flow was investigated in an IoT context to protect these devices from hackers. We used two machine learning classifiers in this work: KNN (K-Nearest Neighbors) and DT (Decision Tree). We calculated the Error Rate, Accuracy, Precision, Recall, and F1 score for each method. When we combined these two classifiers, we obtained outstanding results (100 %). We have a high rate of detection of attacks. The findings are summarized.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133708173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Classification of Quranic Topics Using SMOTE Technique 基于SMOTE技术的古兰经主题分类
Bassam Arkok, A. Zeki
This paper aims to classify the Quranic topics that differ in their number of verses by applying the SMOTE technique. SMOTE is used to rebalance samples of minority classes in these Quranic topics. Moreover, SMOTE is combined with many classifiers to choose the best technique for the Quranic classification. Also, the k-values of SMOTE were studied to select the best values for the Quranic datasets and improve the performance of imbalanced classification. The SMOTE was implemented with many classifiers to choose the best one. The results showed that the Voted Perceptron classifier was the best technique when implemented with the SMOTE method to classify the Quranic topics. Also, it is concluded that the best range of K numbers in SMOTE method is [1, 10], to obtain the higher performance of Quranic classification.
本文旨在运用SMOTE方法,对古兰经中经文数量不同的主题进行分类。SMOTE用于重新平衡这些古兰经主题的少数班级样本。此外,SMOTE与许多分类器相结合,以选择最佳的古兰经分类技术。同时,研究了SMOTE的k值,为古兰经数据集选择最佳值,提高不平衡分类的性能。SMOTE是用许多分类器来实现的,以选择最好的一个。结果表明,在使用SMOTE方法对古兰经主题进行分类时,投票感知器分类器是最好的分类技术。同时得出SMOTE方法中K数的最佳取值范围为[1,10],以获得更高的古兰经分类性能。
{"title":"Classification of Quranic Topics Using SMOTE Technique","authors":"Bassam Arkok, A. Zeki","doi":"10.1109/MTICTI53925.2021.9664774","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664774","url":null,"abstract":"This paper aims to classify the Quranic topics that differ in their number of verses by applying the SMOTE technique. SMOTE is used to rebalance samples of minority classes in these Quranic topics. Moreover, SMOTE is combined with many classifiers to choose the best technique for the Quranic classification. Also, the k-values of SMOTE were studied to select the best values for the Quranic datasets and improve the performance of imbalanced classification. The SMOTE was implemented with many classifiers to choose the best one. The results showed that the Voted Perceptron classifier was the best technique when implemented with the SMOTE method to classify the Quranic topics. Also, it is concluded that the best range of K numbers in SMOTE method is [1, 10], to obtain the higher performance of Quranic classification.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"98-100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Stakeholders-Driven Process Mining Method for Analyzing Emergency Department Processes 利益相关者驱动的流程挖掘方法分析急诊科流程
Mohammed Al-Dowail, A. Al-Hashedi
The emergency department is the most critical in the hospital. It has a high level of complexity because of the admission of patients with a wide range of diseases and various urgent cases, resulting in a variety of issues such as overcrowding, extended waiting periods, and inefficient resources utilization. Process mining is a new business intelligence framework that focuses on analyzing processes by extracting knowledge from the event log. This paper aims to introduce a method for analyzing emergency department processes using process mining techniques. It is an extension and based on previous methods, with additional phases that suit the complexity of the emergency environment, as well as involve the stakeholder in most phases. It will help you understand the varied patient pathways taken by different groups of patients as well as offer insight into bottlenecks. As a result, the procedures become more efficient.
急诊科是医院里最关键的部门。由于收治的病人疾病种类繁多,急症繁多,因此具有高度的复杂性,造成了人满为患、等待时间延长、资源利用效率低下等各种问题。流程挖掘是一种新的业务智能框架,它侧重于通过从事件日志中提取知识来分析流程。本文旨在介绍一种利用流程挖掘技术分析急诊科流程的方法。它是在以前方法的基础上的扩展,增加了适合应急环境复杂性的附加阶段,并使利益攸关方参与大多数阶段。它将帮助您了解不同患者群体所采取的不同患者路径,并提供对瓶颈的洞察。因此,程序变得更有效率。
{"title":"Stakeholders-Driven Process Mining Method for Analyzing Emergency Department Processes","authors":"Mohammed Al-Dowail, A. Al-Hashedi","doi":"10.1109/MTICTI53925.2021.9664783","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664783","url":null,"abstract":"The emergency department is the most critical in the hospital. It has a high level of complexity because of the admission of patients with a wide range of diseases and various urgent cases, resulting in a variety of issues such as overcrowding, extended waiting periods, and inefficient resources utilization. Process mining is a new business intelligence framework that focuses on analyzing processes by extracting knowledge from the event log. This paper aims to introduce a method for analyzing emergency department processes using process mining techniques. It is an extension and based on previous methods, with additional phases that suit the complexity of the emergency environment, as well as involve the stakeholder in most phases. It will help you understand the varied patient pathways taken by different groups of patients as well as offer insight into bottlenecks. As a result, the procedures become more efficient.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114184646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning 基于机器学习的Ad Hoc网络入侵检测系统研究
Z. Abbood, D. Atilla, Ç. Aydin, Mahmoud Shuker Mahmoud
This advanced research survey aims to perform intrusion detection and routing in ad hoc networks in wireless MANET networks using machine learning techniques. The MANETs are composed of several ad-hoc nodes that are randomly or deterministically distributed for communication and acquisition and to forward the data to the gateway for enhanced communication securely. MANETs are used in many applications such as in health care for communication; in utilities such as industries to monitor equipment and detect any malfunction during regular production activity. In general, MANETs take measurements of the desired application and send this information to a gateway, whereby the user can interpret the information to achieve the desired purpose. The main importance of MANETs in intrusion detection is that they can be trained to detect intrusion and real-time attacks in the CIC-IDS 2019 dataset. MANETs routing protocols are designed to establish routes between the source and destination nodes. What these routing protocols do is that they decompose the network into more manageable pieces and provide ways of sharing information among its neighbors first and then throughout the whole network. The landscape of exciting libraries and techniques is constantly evolving, and so are the possibilities and options for experiments. Implementing the framework in python helps in reducing syntactic complexity, increases performance compared to implementations in scripting languages, and provides memory safety.
这项先进的研究调查旨在使用机器学习技术在无线MANET网络中的自组织网络中执行入侵检测和路由。manet由多个随机或确定性分布的自组织节点组成,用于通信和采集,并将数据转发到网关以增强通信安全性。manet在许多应用中使用,例如在医疗保健中用于通信;在公用事业中,如工业,监测设备和检测任何故障在正常生产活动。一般来说,manet对期望的应用程序进行测量,并将这些信息发送到网关,用户可以通过网关解释这些信息来实现期望的目的。manet在入侵检测中的主要重要性在于,它们可以被训练来检测CIC-IDS 2019数据集中的入侵和实时攻击。manet路由协议设计用于在源节点和目的节点之间建立路由。这些路由协议所做的是将网络分解为更易于管理的部分,并提供在其邻居之间,然后在整个网络中共享信息的方法。令人兴奋的库和技术不断发展,实验的可能性和选择也在不断发展。用python实现框架有助于降低语法复杂性,与脚本语言实现相比提高性能,并提供内存安全性。
{"title":"A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning","authors":"Z. Abbood, D. Atilla, Ç. Aydin, Mahmoud Shuker Mahmoud","doi":"10.1109/MTICTI53925.2021.9664776","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664776","url":null,"abstract":"This advanced research survey aims to perform intrusion detection and routing in ad hoc networks in wireless MANET networks using machine learning techniques. The MANETs are composed of several ad-hoc nodes that are randomly or deterministically distributed for communication and acquisition and to forward the data to the gateway for enhanced communication securely. MANETs are used in many applications such as in health care for communication; in utilities such as industries to monitor equipment and detect any malfunction during regular production activity. In general, MANETs take measurements of the desired application and send this information to a gateway, whereby the user can interpret the information to achieve the desired purpose. The main importance of MANETs in intrusion detection is that they can be trained to detect intrusion and real-time attacks in the CIC-IDS 2019 dataset. MANETs routing protocols are designed to establish routes between the source and destination nodes. What these routing protocols do is that they decompose the network into more manageable pieces and provide ways of sharing information among its neighbors first and then throughout the whole network. The landscape of exciting libraries and techniques is constantly evolving, and so are the possibilities and options for experiments. Implementing the framework in python helps in reducing syntactic complexity, increases performance compared to implementations in scripting languages, and provides memory safety.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116824569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1