استفاده از الگوریتم رقابت استعماری اصلاح شده به منظور افزایش سرعت و دقت سیستم تشخیص نفوذ هوشمند
الموضوعات : سامانههای پردازشی و ارتباطی چندرسانهای هوشمندمحمد نظرپور 1 , نوید نظافتی 2 , سجاد شکوهیار 3
1 - دانشجوی دکتری، مدیریت فناوری اطلاعات، واحد تهران مرکزی، دانشگاه آزاد اسلامی، تهران، ایران
2 - استادیار، گروه مدیریت، دانشگاه شهید بهشتی، تهران، ایران
3 - دانشیار، گروه مدیریت، دانشگاه شهید بهشتی، تهران، ایران.
الکلمات المفتاحية: فرمولاسیون انطباقی, قانون فازی, الگوریتم ICA, تشخیص حمله, شبکه عصبی,
ملخص المقالة :
در تمام سیستمهای پردازش اطلاعات، شناسایی حملات سایبری یک چالش اصلی محسوب می شود و با شناسایی به موقع حملات میتوان اثرات آن را مسدود یا کم کرد. سیستم اینترنت اشیا نیز از این پدیده مستثنی نبوده و با پیشرفت رو به رشد این فناوری و گسترش زیرساخت های آن، نیاز به سیستم تشخیص نفوذ هوشمند با دقت و سرعت بالا یک امر ضروری است. شبکههای عصبی سیستمهای مدرنی هستند که از روشهای محاسباتی نوین برای یادگیری ماشین، نمایش دانش و در نهایت استفاده از دانش کسبشده برای به حداکثر رساندن پاسخهای خروجی سیستمهای پیچیده استفاده می کنند. یکی از معایب استفاده از آموزش با روش های کلاسیک در شبکه های عصبی، گیرافتادن در نقاط بهینه محلی است. در این مقاله از الگوریتم فراابتکاری رقابت امپریال (ICA) برای آموزش شبکه های عصبی استفاده کرده، نشان دادیم که این الگوریتم در زمینه تشخیص نفوذ در سیستم اینترنت اشیا، می تواند عملکرد بسیار بهتری از منظر سرعت و دقت نسبت به روش های آموزشی کلاسیک داشته باشد .نتایج نشان می دهد روش پیشنهادی دارای دقت 90% می باشد که در مقایسه با روش شبکه عصبی کلاسیک که دارای دقت 75 درصد بوده عملکرد بهتری دارد.
1- Hasan, Mahmudul, et al. "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches." Internet of Things 7 (2019): 100059.
2- Kotenko, Igor, et al. "Attack detection in IoT critical infrastructures: a machine learning and big data processing approach." 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). IEEE, 2019.
3- Foley, John, Naghmeh Moradpoor, and Henry Ochen. "Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset." Security and Communication Networks 2020 (2020).
4- Doshi, Rohan, Noah Apthorpe, and Nick Feamster. "Machine learning ddos detection for consumer internet of things devices." 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 2018.
5- Syed, Naeem Firdous, et al. "Denial of service attack detection through machine learning for the IoT." Journal of Information and Telecommunication (2020): 1-22.
6- Radi, Sanaz Amirmokhtar, and Sajjad Shokouhyar. "Toward consumer perception of cellphones sustainability: A social media banalytics." Sustainable Production and Consumption 25 (2021): 217-233.
7- Shokohyar, Sajjad, Ehsan Taati, and Sara Zolfaghari. "The Effect of Drivers' Demographic Characteristics on Road Accidents in Different Seasons Using Data Mining." Promet-Traffic&Transportation 29.6 (2017): 555-567.
8- Arabi, Mahsa, Saeed Mansour, and Sajjad Shokouhyar. "Optimizing a warranty–based sustainable product service system using game theory." International Journal of Sustainable Engineering 11.5 (2018): 330-341.
9- Shokouhyar, Sajjad, Mohammad Reza Seddigh, and Farhad Panahifar. "Impact of big data analytics capabilities on supply chain sustainability: A case study of Iran." World Journal of Science, Technology and Sustainable Development (2020).
10- Manimurugan, S., et al. "Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network." IEEE Access 8 (2020): 77396-77404.
11- Latif, Shahid, et al. "A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random N`eural Network." IEEE Access 8 (2020): 89337-89350.
12- Nia, Masoud Ramezani, and Sajjad Shokouhyar. "Analyzing the effects of visual aesthetic of Web pages on users’ responses in online retailing using the VisAWI method." Journal of Research in Interactive Marketing (2020).
13- Shokohyar, Sajjad, Seed Mansour, and Behrooz Karimi. "Simulation-based optimization of ecological leasing: a step toward extended producer responsibility (EPR)." The International Journal of Advanced Manufacturing Technology 66.1 (2013): 159-169.
14- Sharifi, Zahra, and Sajjad Shokouhyar. "Promoting consumer's attitude toward refurbished mobile phones: A social media analytics approach." Resources, Conservation and Recycling 167 (2021): 105398.
15- Alkronz, Eyad Sameh, et al. "Prediction of Whether Mushroom is Edible or Poisonous Using Back-propagation Neural Network." (2019).
16- Wang, Weilin, et al. "Estimation of PM2. 5 concentrations in China using a spatial back propagation neural network." Scientific reports 9.1 (2019): 1-10.
17- Mohammadi, Farzaneh, et al. "Modelling and optimizing pyrene removal from the soil by phytoremediation using response surface methodology, artificial neural networks, and genetic algorithm." Chemosphere 237 (2019): 124486.
18- Azimi, Yousef, Seyed Hasan Khoshrou, and Morteza Osanloo. "Prediction of blast induced ground vibration (BIGV) of quarry mining using hybrid genetic algorithm optimized artificial neural network." Measurement 147 (2019): 106874.
19- Cai, Jianghui, et al. "A Novel Clustering Algorithm Based on DPC and PSO." IEEE Access 8 (2020): 88200-88214.
20- Singh, Shakti, Prachi Chauhan, and NirbhowJap Singh. "Capacity optimization of grid connected solar/fuel cell energy system using hybrid ABC-PSO algorithm." International Journal of Hydrogen Energy (2020).
21- Devarasiddappa, D., M. Chandrasekaran, and R. Arunachalam. "Experimental investigation and parametric optimization for minimizing surface roughness during WEDM of Ti6Al4V alloy using modified TLBO algorithm." Journal of the Brazilian Society of Mechanical Sciences and Engineering 42.3 (2020): 1-18.
22- Qiao, Weibiao, Hossein Moayedi, and Loke Kok Foong. "Nature-inspired hybrid techniques of IWO, DA, ES, GA, and ICA, validated through a k-fold validation process predicting monthly natural gas consumption." Energy and Buildings (2020): 110023.
23- Prithi, S., and S. Sumathi. "LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network." Ad Hoc Networks 97 (2020): 102024.
24- Kacimi, Mohand Akli, et al. "New mixed-coding PSO algorithm for a self-adaptive and automatic learning of Mamdani fuzzy rules." Engineering Applications of Artificial Intelligence 89 (2020): 103417.
25- Jallal, Mohammed Ali, Samira Chabaa, and Abdelouhab Zeroual. "A novel deep neural network based on randomly occurring distributed delayed PSO algorithm for monitoring the energy produced by four dual-axis solar trackers." Renewable Energy 149 (2020): 1182-1196.
26- Niknam, Taher, Ehsan Azadfarsani, and Masoud Jabbari. "A new hybrid evolutionary algorithm based on new fuzzy adaptive PSO and NM algorithms for distribution feeder reconfiguration." Energy Conversion and Management 54.1 (2012): 7-16.
27- Niknam, Taher, Hassan Doagou Mojarrad, and Majid Nayeripour. "A new fuzzy adaptive particle swarm optimization for non-smooth economic dispatch." Energy 35.4 (2010): 1764-1778.
28- Gao, Liuyang, et al. "Target Signal Extraction Method Based on Enhanced ICA with Reference." Mathematical Problems in Engineering 2019 (2019).
29- Gao, Wei, et al. "A predictive model based on an optimized ANN combined with ICA for predicting the stability of slopes." Engineering with Computers 36.1 (2020): 325-344.
30- Qiao, Weibiao, Hossein Moayedi, and Loke Kok Foong. "Nature-inspired hybrid techniques of IWO, DA, ES, GA, and ICA, validated through a k-fold validation process predicting monthly natural gas consumption." Energy and Buildings (2020): 110023.
31- Kaewwit, Chesada. "High accuracy EEG biometrics identification using ICA and AR model." Journal of Information and Communication Technology 16.2 (2020): 354-373.