{"title":"基于决策树的雾物联网架构干扰识别","authors":"S. Mugunthan","doi":"10.36548/jtcsst.2020.1.002","DOIUrl":null,"url":null,"abstract":"The cyber-attacks nowadays are becoming more and more erudite causing challenges in distinguishing them and confining. These attacks affect the sensitized information’s of the network by penetrating into the network and behaving normally. The paper devises a system for such interference recognition in the internet of things architecture that is aided by the FOG. The proposed system is a combination of variety of classifiers that are founded on the decision tree as well as the rule centered conceptions. The system put forth involves the JRip and the REP tree algorithm to utilize the features of the data set as input and distinguishes between the benign and the malicious traffic in the network and includes an decision forest that is improved with the penalizing attributes of the previous trees in the final stage to classify the traffic in the network utilizing the initial data set as well as the outputs of the classifiers that were engaged in the former stages. The proffered system was examined using the dataset such BOT-Internet of things and the CICIDS2017 to evince its competence in terms of rate of false alarm, detection, and accuracy. The attained results proved that the performance of the proposed system was better compared to the exiting methodologies to recognize the interference.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"Decision Tree Based Interference Recognition for Fog Enabled IOT Architecture\",\"authors\":\"S. Mugunthan\",\"doi\":\"10.36548/jtcsst.2020.1.002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The cyber-attacks nowadays are becoming more and more erudite causing challenges in distinguishing them and confining. These attacks affect the sensitized information’s of the network by penetrating into the network and behaving normally. The paper devises a system for such interference recognition in the internet of things architecture that is aided by the FOG. The proposed system is a combination of variety of classifiers that are founded on the decision tree as well as the rule centered conceptions. The system put forth involves the JRip and the REP tree algorithm to utilize the features of the data set as input and distinguishes between the benign and the malicious traffic in the network and includes an decision forest that is improved with the penalizing attributes of the previous trees in the final stage to classify the traffic in the network utilizing the initial data set as well as the outputs of the classifiers that were engaged in the former stages. The proffered system was examined using the dataset such BOT-Internet of things and the CICIDS2017 to evince its competence in terms of rate of false alarm, detection, and accuracy. The attained results proved that the performance of the proposed system was better compared to the exiting methodologies to recognize the interference.\",\"PeriodicalId\":107574,\"journal\":{\"name\":\"Journal of Trends in Computer Science and Smart Technology\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Trends in Computer Science and Smart Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.36548/jtcsst.2020.1.002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Trends in Computer Science and Smart Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36548/jtcsst.2020.1.002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25
摘要
当今的网络攻击越来越广泛,给网络攻击的识别和控制带来了挑战。这类攻击通过渗透到网络中并正常活动来影响网络的敏感信息。本文设计了一种基于光纤陀螺的物联网干扰识别系统。所提出的系统是基于决策树和以规则为中心概念的各种分类器的组合。系统提出涉及JRip和代表树算法利用数据集的特征作为输入,并区分良性和恶意的交通网络中,包括一个提高决策森林与以前的惩罚属性树最后阶段分类的交通网络利用初始数据集以及分类器的输出,从事前阶段。使用BOT-Internet of things和CICIDS2017等数据集对所提供的系统进行了检查,以证明其在误报率、检测率和准确性方面的能力。实验结果表明,与现有的干扰识别方法相比,该方法具有更好的识别性能。
Decision Tree Based Interference Recognition for Fog Enabled IOT Architecture
The cyber-attacks nowadays are becoming more and more erudite causing challenges in distinguishing them and confining. These attacks affect the sensitized information’s of the network by penetrating into the network and behaving normally. The paper devises a system for such interference recognition in the internet of things architecture that is aided by the FOG. The proposed system is a combination of variety of classifiers that are founded on the decision tree as well as the rule centered conceptions. The system put forth involves the JRip and the REP tree algorithm to utilize the features of the data set as input and distinguishes between the benign and the malicious traffic in the network and includes an decision forest that is improved with the penalizing attributes of the previous trees in the final stage to classify the traffic in the network utilizing the initial data set as well as the outputs of the classifiers that were engaged in the former stages. The proffered system was examined using the dataset such BOT-Internet of things and the CICIDS2017 to evince its competence in terms of rate of false alarm, detection, and accuracy. The attained results proved that the performance of the proposed system was better compared to the exiting methodologies to recognize the interference.