{"title":"基于人工免疫系统和神经网络的网络入侵检测","authors":"Raj Kumar Yaduwanshi Raj, Prof. Manorama Malviya","doi":"10.18535/ijecs/v11i04.4670","DOIUrl":null,"url":null,"abstract":"Easy access, simulation of IOT network increases its application and demands in different area. As many of IOT networks are vulnerable in nature and attracts intruders to take advantage of weak security. This paper has developed a model that can detect the IOT network intrusion. In this work feature optimization was done by use of artificial immune system algorithm. AIS reduces the dimension of the dataset by applying affinity check and cloning steps. Selected features were further use for the traiing of neural network. Trained neural network predict the class of IOT network session (Normal / Malicious). Experiment was done on real dataset of IOT session and result shows that rpopsoed model has improved the detection accuracy as compared o existing models.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Intrusion Detection by Artificial Immune System and Neural Network\",\"authors\":\"Raj Kumar Yaduwanshi Raj, Prof. Manorama Malviya\",\"doi\":\"10.18535/ijecs/v11i04.4670\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Easy access, simulation of IOT network increases its application and demands in different area. As many of IOT networks are vulnerable in nature and attracts intruders to take advantage of weak security. This paper has developed a model that can detect the IOT network intrusion. In this work feature optimization was done by use of artificial immune system algorithm. AIS reduces the dimension of the dataset by applying affinity check and cloning steps. Selected features were further use for the traiing of neural network. Trained neural network predict the class of IOT network session (Normal / Malicious). Experiment was done on real dataset of IOT session and result shows that rpopsoed model has improved the detection accuracy as compared o existing models.\",\"PeriodicalId\":231371,\"journal\":{\"name\":\"International Journal of Engineering and Computer Science\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18535/ijecs/v11i04.4670\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18535/ijecs/v11i04.4670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Intrusion Detection by Artificial Immune System and Neural Network
Easy access, simulation of IOT network increases its application and demands in different area. As many of IOT networks are vulnerable in nature and attracts intruders to take advantage of weak security. This paper has developed a model that can detect the IOT network intrusion. In this work feature optimization was done by use of artificial immune system algorithm. AIS reduces the dimension of the dataset by applying affinity check and cloning steps. Selected features were further use for the traiing of neural network. Trained neural network predict the class of IOT network session (Normal / Malicious). Experiment was done on real dataset of IOT session and result shows that rpopsoed model has improved the detection accuracy as compared o existing models.