利用基于 ELM 的自动终止鲸鱼优化技术优化雾计算环境中的入侵检测系统

Q1 Mathematics
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
{"title":"利用基于 ELM 的自动终止鲸鱼优化技术优化雾计算环境中的入侵检测系统","authors":"Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray","doi":"10.5815/ijcnis.2024.02.07","DOIUrl":null,"url":null,"abstract":"In fog computing, computing resources are deployed at the network edge, which can include routers, switches, gateways, and even end-user devices. Fog computing focuses on running computations and storing data directly on or near the fog devices themselves. The data processing occurs locally on the device, reducing the reliance on network connectivity and allowing for faster response times. However, the conventional intrusion detection system (IDS) failed to provide security during the data transfer between fog nodes to cloud, fog data centres. So, this work implemented the optimized IDS in fog computing environment (OIDS-FCE) using advanced naturally inspired optimization algorithms with extreme learning. Initially, the data preprocessing operation maintains the uniform characteristics in the dataset by normalizing the columns. Then, comprehensive learning particle swarm based effective seeker optimization (CLPS-ESO) algorithm extracts the intrusion specific features by analyzing the internal patterns of all rows, columns. In addition, automatic termination-based whale optimization algorithm (ATWOA) selects the best intrusion features from CLPS-ESO resultant features using correlation analysis. Finally, the hybrid extreme learning machine (HELM) classifies the varies instruction types from ATWOA optimal features. The simulation results show that the proposed OIDS-FCE achieved 98.52% accuracy, 96.38% precision, 95.50% of recall, and 95.90% of F1-score using UNSW-NB dataset, which are higher than other artificial intelligence IDS models.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"44 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM\",\"authors\":\"Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray\",\"doi\":\"10.5815/ijcnis.2024.02.07\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In fog computing, computing resources are deployed at the network edge, which can include routers, switches, gateways, and even end-user devices. Fog computing focuses on running computations and storing data directly on or near the fog devices themselves. The data processing occurs locally on the device, reducing the reliance on network connectivity and allowing for faster response times. However, the conventional intrusion detection system (IDS) failed to provide security during the data transfer between fog nodes to cloud, fog data centres. So, this work implemented the optimized IDS in fog computing environment (OIDS-FCE) using advanced naturally inspired optimization algorithms with extreme learning. Initially, the data preprocessing operation maintains the uniform characteristics in the dataset by normalizing the columns. Then, comprehensive learning particle swarm based effective seeker optimization (CLPS-ESO) algorithm extracts the intrusion specific features by analyzing the internal patterns of all rows, columns. In addition, automatic termination-based whale optimization algorithm (ATWOA) selects the best intrusion features from CLPS-ESO resultant features using correlation analysis. Finally, the hybrid extreme learning machine (HELM) classifies the varies instruction types from ATWOA optimal features. The simulation results show that the proposed OIDS-FCE achieved 98.52% accuracy, 96.38% precision, 95.50% of recall, and 95.90% of F1-score using UNSW-NB dataset, which are higher than other artificial intelligence IDS models.\",\"PeriodicalId\":36488,\"journal\":{\"name\":\"International Journal of Computer Network and Information Security\",\"volume\":\"44 9\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Network and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5815/ijcnis.2024.02.07\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Network and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5815/ijcnis.2024.02.07","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

摘要

在雾计算中,计算资源部署在网络边缘,包括路由器、交换机、网关甚至终端用户设备。雾计算的重点是直接在雾设备上或其附近运行计算和存储数据。数据处理在设备本地进行,从而减少了对网络连接的依赖,加快了响应速度。然而,传统的入侵检测系统(IDS)无法在雾节点与云、雾数据中心之间的数据传输过程中提供安全保障。因此,这项工作采用先进的自然启发优化算法和极端学习方法,在雾计算环境中实现了优化的入侵检测系统(OIDS-FCE)。首先,数据预处理操作通过归一化列来保持数据集的统一特性。然后,基于粒子群的综合学习有效寻道优化算法(CLPS-ESO)通过分析所有行、列的内部模式来提取特定的入侵特征。此外,基于自动终止的鲸鱼优化算法(ATWOA)通过相关性分析,从 CLPS-ESO 得出的特征中选择最佳入侵特征。最后,混合极端学习机(HELM)从 ATWOA 最佳特征中对不同指令类型进行分类。仿真结果表明,OIDS-FCE 在 UNSW-NB 数据集上取得了 98.52% 的准确率、96.38% 的精确率、95.50% 的召回率和 95.90% 的 F1 分数,高于其他人工智能 IDS 模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
In fog computing, computing resources are deployed at the network edge, which can include routers, switches, gateways, and even end-user devices. Fog computing focuses on running computations and storing data directly on or near the fog devices themselves. The data processing occurs locally on the device, reducing the reliance on network connectivity and allowing for faster response times. However, the conventional intrusion detection system (IDS) failed to provide security during the data transfer between fog nodes to cloud, fog data centres. So, this work implemented the optimized IDS in fog computing environment (OIDS-FCE) using advanced naturally inspired optimization algorithms with extreme learning. Initially, the data preprocessing operation maintains the uniform characteristics in the dataset by normalizing the columns. Then, comprehensive learning particle swarm based effective seeker optimization (CLPS-ESO) algorithm extracts the intrusion specific features by analyzing the internal patterns of all rows, columns. In addition, automatic termination-based whale optimization algorithm (ATWOA) selects the best intrusion features from CLPS-ESO resultant features using correlation analysis. Finally, the hybrid extreme learning machine (HELM) classifies the varies instruction types from ATWOA optimal features. The simulation results show that the proposed OIDS-FCE achieved 98.52% accuracy, 96.38% precision, 95.50% of recall, and 95.90% of F1-score using UNSW-NB dataset, which are higher than other artificial intelligence IDS models.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
4.10
自引率
0.00%
发文量
33
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信