2022
DOI: 10.4018/ijswis.307324
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Using Normalized Mutual Information Feature Selection and Parallel Quantum Genetic Algorithm

Abstract: This paper presents a detection algorithm using normalized mutual information feature selection and cooperative evolution of multiple operators based on adaptive parallel quantum genetic algorithm (NMIFS MOP- AQGA). The proposed algorithm is to address the problems that the intrusion detection system (IDS) has lower the detection speed, less adaptability and lower detection accuracy. In order to achieve an effective reduction for high-dimensional feature data, the NMIFS method is used to select the best featur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 28 publications
0
15
0
Order By: Relevance
“…The former location of that population member is then replaced if the new position raises the value of the goal function. Equation (18).is used to model this update condition…”
Section: Phase 1: Training (Exploration)mentioning
confidence: 99%
See 2 more Smart Citations
“…The former location of that population member is then replaced if the new position raises the value of the goal function. Equation (18).is used to model this update condition…”
Section: Phase 1: Training (Exploration)mentioning
confidence: 99%
“…The NMIFS approach is used to choose the ideal feature combination in order to effectively reduce high‐dimensional feature data. The best features are sent to the MOP‐AQGA classifier for learning and training, and the intrusion detectors are obtained 18,19 . However, the model could not handle the complex data, and hence the deep learning models arise.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The existing trust management schemes [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]44,45,51,52 failed to fulfill the most fundamental requirement for industrial WSN (ICN). Finally, after sincerely analyzing existing work, we can say that without considering indirect (feedback or reputation) trust, frequency of misbehavior, current, and past misbehavior, a malicious node might disguise the network to ruin its reputation 38 and remain not detected as well as trustworthy [46][47][48][49][50] . The survival of ICNs is highly dependent on the successful cooperation of tamper-resistant SNs 3 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…This communication process can potentially introduce latency and consume bandwidth, particularly in IoT networks with limited resources. Zhang Ling et al 35 36 introduced two approaches, namely NMAIFS MOP‐AQAI and NMIFS MOP‐AQGA, to tackle the challenges related to detection rate and accuracy. The experiments were conducted using the KDD99 and UNSW‐NB15 datasets.…”
Section: Literature Surveymentioning
confidence: 99%