2023
DOI: 10.1016/j.eswa.2022.118745
|View full text |Cite
|
Sign up to set email alerts
|

An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 46 publications
0
22
0
Order By: Relevance
“…Shen et al [ 24 ] combined the KNN, random forest, and decision tree algorithms to realize the classification of encrypted web page data based on the features extracted from the two-way interactions between client and server. Alghanam et al [ 25 ] proposed an ensemble learning approach based on LS-PIO (Local Search with a Pigeon-Inspired Optimizer) by integrating multiple machine learning algorithms and enhancing the feature extraction algorithm, the Pigeon-Inspired Optimizer (PIO). Reference [ 26 ] proposes an LSTM network for classifying VPN data flows based on an attention mechanism.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Shen et al [ 24 ] combined the KNN, random forest, and decision tree algorithms to realize the classification of encrypted web page data based on the features extracted from the two-way interactions between client and server. Alghanam et al [ 25 ] proposed an ensemble learning approach based on LS-PIO (Local Search with a Pigeon-Inspired Optimizer) by integrating multiple machine learning algorithms and enhancing the feature extraction algorithm, the Pigeon-Inspired Optimizer (PIO). Reference [ 26 ] proposes an LSTM network for classifying VPN data flows based on an attention mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…To evaluate the performance of the proposed algorithm in terms of its identification accuracy, we carried out experiments to make a comparison between the proposed algorithm and seven other typical malicious-traffic-identification algorithms, namely iForest [ 14 ], the OC-SVM [ 15 ], LOF [ 16 ], DNNs [ 19 ], FNNs [ 22 ], SNNs [ 22 ], and LS-PIO-based ensemble [ 25 ]. These methods were introduced in Section 2 .…”
Section: Experiments and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, the process of setting inference rules in the previous research works depends on either the analysis of the systems' vulnerabilities and threats, or it depends on userdefined rules. In our approach, we have proposed the use of ML to set inference rules based on the superiority of artificial intelligence and ML in the security during the last years [21][22] [23].…”
Section: Ontologies Consideringmentioning
confidence: 99%