2021
DOI: 10.3390/app112311200
|View full text |Cite
|
Sign up to set email alerts
|

Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm

Abstract: With the frequent occurrence of network security events, the intrusion detection system will generate alarm and log records when monitoring the network environment in which a large number of log and alarm records are redundant, which brings great burden to the server storage and security personnel. How to reduce the redundant alarm records in network intrusion detection has always been the focus of researchers. In this paper, we propose a method using the whale optimization algorithm to deal with massive redun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 46 publications
0
1
0
Order By: Relevance
“…Extracting features from network traffic with CNN deep learning, feature selection by majority voting among several meta-heuristic methods, and using multiple deep learning classifiers in majority voting to detect an intrusion is more accurate than our future works. From right to left, Upward-spirals and Double-loops movement of the valves around the optimal solution [14] Figure 2 Various attacks and their contributions against the Internet of Things network [15] Figure 3 The mechanism of botnet attacks in the smart city and the IoT [17] Figure 4 Network-based intrusion detection system [18] Figure 5 The framework of the proposed method for detecting attacks Figure 6 Dimension reduction of samples with improved WOA algorithm in fog nodes Figure 7 Comparison of attack detection time in the proposed method and other meta-heuristic methods Figure 8 Comparison of attack detection accuracy in the proposed method and other methods Figure 9 Comparison of attack detection precision in the proposed method and other methods…”
Section: Discussionmentioning
confidence: 99%
“…Extracting features from network traffic with CNN deep learning, feature selection by majority voting among several meta-heuristic methods, and using multiple deep learning classifiers in majority voting to detect an intrusion is more accurate than our future works. From right to left, Upward-spirals and Double-loops movement of the valves around the optimal solution [14] Figure 2 Various attacks and their contributions against the Internet of Things network [15] Figure 3 The mechanism of botnet attacks in the smart city and the IoT [17] Figure 4 Network-based intrusion detection system [18] Figure 5 The framework of the proposed method for detecting attacks Figure 6 Dimension reduction of samples with improved WOA algorithm in fog nodes Figure 7 Comparison of attack detection time in the proposed method and other meta-heuristic methods Figure 8 Comparison of attack detection accuracy in the proposed method and other methods Figure 9 Comparison of attack detection precision in the proposed method and other methods…”
Section: Discussionmentioning
confidence: 99%