2022
DOI: 10.18280/isi.270310
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Network Attacks Based on Whale Optimization Algorithm

Abstract: Network intrusion detection is a significant issue faced by the Information technology industry. Hacker's attacks set of techniques cause confusion network and computer systems, therefore, the need for a network penetration detection process became urgent. This paper proposed an optimization method to detect the potential of attacks on network packets effectively by defining unfamiliar patterns in a massive volume of the network traffic. Initially, the packet characteristics are defined as the normal dispersal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…The model produces incredibly amazing predicted results, as seen in Figure 10. The model predicts an item based [22], [23]; if the probability is less than a specific threshold (here, 0.3), the model predicts that the object does not have Alzheimer's disease [24], [25]. An object's score is a calculation that determines whether or not an object will appear in the expected box.…”
Section: 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =mentioning
confidence: 99%
“…The model produces incredibly amazing predicted results, as seen in Figure 10. The model predicts an item based [22], [23]; if the probability is less than a specific threshold (here, 0.3), the model predicts that the object does not have Alzheimer's disease [24], [25]. An object's score is a calculation that determines whether or not an object will appear in the expected box.…”
Section: 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =mentioning
confidence: 99%