0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Comparative Evaluation of Machine Learning Models for Anomaly-Based IDS in IoT Networks
Authors :
Seyed Amir Mousavi
1
Mostafa Sadeghi
2
Mohammad Sadeq Sirjani
3
1- دانشگاه فردوسی مشهد
2- دانشگاه آزاد اسلامی واحد نجف آباد
3- دانشگاه فردوسی مشهد
Keywords :
Network Security،Intrusion Detection System،Artificial Intelligence،Machine Learning
Abstract :
With the increasing Internet use, network security has become essential due to the rise in cyber-attacks on network services. To detect these attacks, a robust Intrusion Detection System (IDS) is required. Traditional IDS face challenges like high false alert rates and slow real-time attack detection. Machine learning (ML) can improve this situation, providing a low False Alarm Rate and high detection rates. This research used five ML methods (Logistic Regression, Random Forest, k-Nearest Neighbors, Support Vector Machine, and XGBoost) to classify the UNSW-NB15 dataset. The goal is to evaluate the performance of various machine learning classifiers in detecting attacks for Internet of Things (IoT) network intrusion detection. The study highlighted the importance of further research to reduce false positives and negatives. To evaluate these classifiers, precision, accuracy, recall, and F1 score were used. The results show that XGBoost achieved the highest accuracy and recall. However, only some algorithms performed perfectly in all aspects, suggesting the need for diverse detection strategies. Future research should focus on developing comprehensive systems and ensemble approaches to minimize false alerts and missed detections.
Papers List
List of archived papers
Silicon photonic microring resonators: A Novel optical router based on Negative-First routing algorithm
Negin Bagheri Renani - Elham Yaghoubi
FiReT: A Neural Radiance Fields Framework for Wireless Field Reconstruction and Transmitter Placement
Negar Pouya - Armin Soleymani - Gholamreza Moradi - Farzaneh Abdollahi
یک رویکرد سریع تحلیل و شناسایی آسیب پذیری Next-Intent در برنامه های کاربردی اندروید
زهرا کلوندی - دکتر مهدی سخائی نیا زهرا کلوندی - مهدی سخائی نیا -
Knowledge gap extraction based on the learner click behavior in interaction with videos using the association rule algorithm
Yosra Bahrani - Omid Fatemi
Taxonomy of Blockchain Solutions to Connected and Autonomous Vehicles
Mohammad Reza Jabbarpour Mohammad Reza Jabbarpour - Houman Zarrabi
امنیت در اینترنت اشیا؛ معماری، کاربردها، چالشها و راهکارها
مهدی موسی وند - دکتر پیام محمودی نصر مهدی موسی وند - پیام محمودی نصر -
Distributed Learning Automata-based Algorithm for Finding K-Clique in Complex Social Networks
Mohammad Mehdi Daliri Khomami - Alireza Rezvanian - Ali Mohammad Saghiri - Mohammad Reza Meybodi
Revolutionizing Credit Scoring: The Synergy of Mamba State Space and CNN Models
Behnam Sabzalian
بهبود رهگیری در زنجیره تامین با استفاده از فناوری زنجیره بلوکی
سید عماد موسوی - مهرداد آشتیانی
A New Routing Protocol in Internet of Vehicles Inspired of Spread Model of the Covid-19 Virus
Taha Yasin Rezapour - Esmaeil Zeinali - Reza Ebrahimi Atani - Mohammad Mehdi Gilanian Sadeghi
more
Samin Hamayesh - Version 42.5.2