Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. It has been implemented in VC++. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
This document summarizes a research paper on current studies of intrusion detection systems using genetic algorithms and fuzzy logic. The paper presents an overview of intrusion detection systems, including different techniques like misuse detection and anomaly detection. It discusses using genetic algorithms to generate fuzzy rules to characterize normal and abnormal network behavior in order to reduce false alarms. The paper also outlines the dataset, genetic algorithm approach, and use of fuzzy logic that are proposed for the intrusion detection system.
Survey on Host and Network Based Intrusion Detection System
With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system or network activities for malicious activities or policy violations. It produces reports to a management station [1]. In this paper we are mainly focused on different IDS concepts based on Host and Network systems.
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...
IEEE 802.16, known as WiMax, is at the top of communication technology because it is gaining a great position in the wireless networks. In this paper, an intrusion detection system for DDOS attacks diagnosis is proposed, inspired by artificial immune system. Since the detection unit on all subscriber stations in the network is WIMAX, proposed system is a fully distributed system. A risk theory is used for antigens detection in attack time. The proposed system decreases the attack effects and increases network performance. Results of simulation show that the proposed system improves negative selection time, detection Precision, and ability to identify new attacks compared to the similar algorithm.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document discusses network intrusion detection systems (NIDS) and their ability to handle high-speed traffic. It introduces NIDS and their role in monitoring network traffic. The document presents an experiment that tests the open-source NIDS Snort under high-volume traffic. The experiment shows that Snort drops more packets as traffic speed and volume increases, demonstrating a weakness of NIDS in high-speed environments. It suggests using a parallel NIDS technique to help NIDS better handle high-speed network traffic and reduce packet dropping.
Context-Aware Intrusion Detection and Tolerance in MANETsIDES Editor
Mobile ad-hoc network (MANET) is a
decentralized network where each node will forward the data
to other nodes. The major challenge in handling security in
MANETs is that the network is not constant and thereby it is
difficult to set a constant algorithm for detecting the intrusion.
In this work, a context-aware intrusion detection and
tolerance module for MANETs is proposed. A node in
MANET can be a filtering node or a monitor node. The
intrusion detection based on context awareness is done with
the help of filtering and monitoring nodes and intrusion
tolerance is done with the help of membership policy. The
filtering nodes have minimum level of static database and the
monitoring nodes have a database with learning capability.
For tolerance, the nodes which are not a member are denied
service while the nodes which are members are allowed the
service according to some specific rules.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsCSCJournals
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. It has been implemented in VC++. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
This document summarizes a research paper on current studies of intrusion detection systems using genetic algorithms and fuzzy logic. The paper presents an overview of intrusion detection systems, including different techniques like misuse detection and anomaly detection. It discusses using genetic algorithms to generate fuzzy rules to characterize normal and abnormal network behavior in order to reduce false alarms. The paper also outlines the dataset, genetic algorithm approach, and use of fuzzy logic that are proposed for the intrusion detection system.
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system or network activities for malicious activities or policy violations. It produces reports to a management station [1]. In this paper we are mainly focused on different IDS concepts based on Host and Network systems.
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...Editor IJCATR
IEEE 802.16, known as WiMax, is at the top of communication technology because it is gaining a great position in the wireless networks. In this paper, an intrusion detection system for DDOS attacks diagnosis is proposed, inspired by artificial immune system. Since the detection unit on all subscriber stations in the network is WIMAX, proposed system is a fully distributed system. A risk theory is used for antigens detection in attack time. The proposed system decreases the attack effects and increases network performance. Results of simulation show that the proposed system improves negative selection time, detection Precision, and ability to identify new attacks compared to the similar algorithm.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
This document summarizes a research paper that classifies different types of networks and discusses their associated security issues. It categorizes networks based on size (LAN, MAN, WAN), design (peer-to-peer, client-server, standalone), layering (layered, non-layered), and provides examples such as Ethernet, Wi-Fi, VPNs. It also discusses common security threats for different network types like viruses, denial of service attacks, and evaluates security measures including encryption, firewalls, access control. The paper aims to provide a comprehensive classification of networks and analyze how security needs vary depending on the network and software development stages.
This document summarizes a proposed network attack alerting system that aims to reduce redundant alerts from intrusion detection systems (IDS). The system uses both network-based and host-based IDS to detect attacks launched using the Backtrack penetration testing tool on a virtual network environment. Well-known open source IDS tools from the Security Onion distribution are used to generate alerts. The system builds a database of alerts and defines rules to eliminate duplicate alerts for the same attack based on attributes like source/destination IP and port. It also establishes a severity classification scheme using threshold values of alerts and time to help administrators prioritize responses.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
A hierarchical security framework for defending against sophisticated attacks...redpel dot com
A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defence against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. Along with the widespread evolution of new emerging services, the quantity and impact of attacks have continuously increased, attackers continuously find vulnerabilities at various levels, from the network itself to operating system and applications, exploit them to crack system and services. Network defence and network monitoring has become an essential component of computer security to predict and prevent attacks. Unlike traditional Intrusion Detection System (IDS), Intrusion Detection and Prevention System (IDPS) have additional features to secure computer networks.
In this paper, we present a detailed study of how deployment of an IDPS plays a key role in its performance and the ability to detect and prevent known as well as unknown attacks. We categorize IDPS based on deployment as Network-based, host-based, and Perimeter-based and Hybrid. A detailed comparison is shown in this paper and finally we justify our proposed solution, which deploys agents at host-level to give better performance in terms of reduced rate of false positives and accurate detection and prevention.
Security in manet via different intrusion detection techniquesIAEME Publication
This document discusses security threats in mobile ad hoc networks (MANETs) and different intrusion detection techniques that can be used to counter attacks. It first describes MANETs and notes their vulnerabilities like dynamic topology, lack of infrastructure, and resource constraints make them prone to security threats. Both passive attacks like eavesdropping and active attacks like black holes, sinkholes, and denial of service attacks are discussed. The document then examines various intrusion detection techniques like specification-based, anomaly-based, agent-based, and cluster-based that could be applied to MANETs to detect security threats and attacks.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
This document discusses security considerations for a proposed marine communication network for fishermen. It outlines several potential security vulnerabilities at different layers of the network architecture, including physical, data link, network, transport and application layers. Specific issues for the marine environment are also discussed, such as signals crossing maritime borders, boats crossing borders, and spoofing of nodes like access points, customer premise equipment, smartphones and base stations. The document proposes that solutions are needed to address these security vulnerabilities and situational risks.
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and manage misuse and anomaly detects.
Three level intrusion detection system based on conditional generative advers...IJECEIAES
Security threat protection is important in the internet of things (IoT) applications since both the connected device and the captured data can be hacked or hijacked or both at the same time. To tackle the above-mentioned problem, we proposed three-level intrusion detection system conditional generative adversarial network (3LIDS-CGAN) model which includes four phases such as first-level intrusion detection system (IDS), second-level IDS, third-level IDS, and attack type classification. In first-level IDS, features of the incoming packets are extracted by the firewall. Based on the extracted features the packets are classified into three classes such as normal, malicious, and suspicious using support vector machine and golden eagle optimization. Suspicious packets are forwarded to the second-level IDS which classified the suspicious packets as normal or malicious. Here, signature-based intrusions are detected using attack history information, and anomaly-based intrusions are detected using event-based semantic mapping. In third-level IDS, adversary packets are detected using CGAN which automatically learns the adversarial environment and detects adversary packets accurately. Finally, proximal policy optimization is proposed to detect the attack type. Experiments are conducted using the NS-3.26 network simulator and performance is evaluated by various performance metrics which results that the proposed 3LIDS-CGAN model outperforming other existing works.
This document summarizes an article that proposes integrating conditional random fields (CRFs) and a layered approach to improve intrusion detection systems. CRFs can effectively model relationships between different features to increase attack detection accuracy. A layered approach reduces computation time by eliminating communication overhead between layers and using a small set of features in each layer. The proposed system aims to achieve both high attack detection accuracy using CRFs and high efficiency using the layered approach. It presents integrating these two methods for intrusion detection to address issues with limited coverage, high false alarms, and inefficiency in existing systems.
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to
rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus
or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection
System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data
created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for
anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack
signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with
the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System
called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in
detecting abnormal content in the traffic data during information passing from one node to another and
also detects known attack signature and unknown attack. This approach is tested by running the artificial
network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in detecting abnormal content in the traffic data during information passing from one node to another and also detects known attack signature and unknown attack. This approach is tested by running the artificial network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
This document discusses securing healthcare networks against cyber attacks. It proposes using intrusion detection systems to continuously monitor networks, firewalls to ensure endpoint devices comply with security policies, and biometrics for identity-based network access control. This would help protect patient privacy by safeguarding electronic health records and enhancing the security of hospital networks. The growing adoption of electronic records and devices in healthcare has increased risks of attacks that could intercept patient data or take over entire hospital networks. Strong network security measures are needed to address these risks.
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
Wireless Sensor Network (WSNs) are deployed at aggressive environments which are vulnerable to various security attacks such as Wormholes, Denial of Attacks and Sybil Attacks. There are various intrusion detection techniques that are used to identify attacks in a network with high accuracy level. This paper has focused on Denial of Service attack, since it is the most common attack that affects the environment severely. Therefore a new hybrid technique combining Hidden Markov Model with Ant Colony Optimization (HMM+ACO) has been
proposed that gives improved performance than the other techniques.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
This document discusses machine learning and deep learning models for detecting IoT botnet attacks. It begins with an abstract that outlines the challenges of securing the growing number of IoT devices and describes how machine learning and deep learning techniques like LSTM RNN can be used to develop effective detection systems. The introduction provides background on botnets, distributed denial of service attacks, and the need for detection systems. The literature review then summarizes several previous works that used techniques such as Bayesian classifiers, random neural networks, decision trees, and other machine learning algorithms for attack detection. The methodology section outlines the general approach of anomaly-based intrusion detection systems and different learning methods. The experimental setup describes collecting and preprocessing data, feature extraction, model training and evaluation
This document summarizes various soft computing techniques that can be used for intrusion detection, including fuzzy logic, graph-based approaches, and neural networks. Fuzzy logic can be used to classify parameters and detect anomalies by comparing normal and new fuzzy association rule sets. Graph-based approaches model network traffic as graphs of nodes and edges and use clustering algorithms to detect anomalies. Neural networks can be trained on audit log data to recognize normal behavior and detect deviations that may indicate attacks. These soft computing methods aim to improve on signature-based detection by learning patterns of normal network activity and detecting anomalies.
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMijistjournal
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer exist to the real user is one of the part of soft computing. Researcher proposed several mechanism to fight against cyber attacks. Several existing techniques available intrusion detection systems are responsible to face upcoming cyber attacks. Soft computing is one of the best presently using techniques which is applied in Intrusion Detection System to manage network traffic and use to detect cyber attacks with increased efficiency and accuracy.
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMIJNSA Journal
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have
become a needful component in terms of computer and network security. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. So, the quest of betterment continues. In this progression, here we present an Intrusion
Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions. Parameters and evolution processes for GA are discussed in details and implemented. This approach uses evolution theory to information evolution in order to filter the traffic data and thus reduce the complexity. To implement and measure the performance of our system we used the KDD99
benchmark dataset and obtained reasonable detection rate.
A Comprehensive Review On Intrusion Detection System And TechniquesKelly Taylor
This document discusses machine learning techniques for intrusion detection systems (IDS). It provides an overview of the research progress using machine learning to improve intrusion detection in networks. Machine learning and data mining techniques have been widely used to automatically detect network traffic anomalies. The goal is to summarize and compare research contributions of IDS using machine learning, define existing challenges, and discuss anticipated solutions. Commonly used machine learning techniques for IDS are reviewed along with some existing machine learning-based IDS proposed by researchers.
The nature of wireless networks itself created new vulnerabilities that in the classical wired networks do
not exist. This results in an evolutional requirement to implement new sophisticated security mechanism in
form of Intrusion Detection and Prevention Systems. This paper deals with security issues of small office
and home office wireless networks. The goal of our work is to design and evaluate wireless IDPS with use
of packet injection method. Decrease of attacker’s traffic by 95% was observed when compared to
attacker’s traffic without deployment of proposed IDPS system.
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a proposed artificial neural network based intrusion detection system. It uses a multilayer perceptron neural network architecture trained on the KDD Cup 99 intrusion detection dataset. The system monitors network traffic in real-time, extracts features from network packets, and classifies the traffic into six categories using the neural network. It is able to detect both known and unknown attacks. The system aims to improve upon traditional signature-based intrusion detection systems.
This document summarizes a research paper that evaluates the performance of Byzantine flood rushing attacks in ad hoc networks. The paper implements a flood rushing attack in an AODV-enabled ad hoc network using a network simulator. It analyzes the effects of the attack on network throughput, latency, and packet delivery ratio. The results show that as more adversarial nodes carry out the flood rushing attack, the network throughput decreases and latency increases, degrading network performance.
A review on machine learning based intrusion detection system for internet of...IJECEIAES
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gather the abundant amount of data that is being generated and then transmit this data to the predetermined server over the internet. IoT connects billions of objects and the internet to communicate without human intervention. But network security and privacy issues are increasing very fast, in today's world. Because of the prevalence of technological advancement in regular activities, internet security has evolved into a necessary requirement. Because technology is integrated into every aspect of contemporary life, cyberattacks on the internet of things represent a bigger danger than attacks against traditional networks. Researchers have found that combining machine learning techniques into an intrusion detection system (IDS) is an efficient way to get beyond the limitations of conventional IDSs in an IoT context. This research presents a comprehensive literature assessment and develops an intrusion detection system that makes use of machine learning techniques to address security problems in an IoT environment. Along with a comprehensive look at the state of the art in terms of intrusion detection systems for IoT-enabled environments, this study also examines the attributes of approaches, common datasets, and existing methods utilized to construct such systems.
This document summarizes a proposed network attack alerting system that aims to reduce the large number of alerts generated by intrusion detection systems (IDS). The system uses both network-based and host-based IDS to detect attacks launched using the Backtrack attacking tools on a virtual network lab environment. Well-known open source security tools on the Security Onion Linux distribution are used to generate alerts. The system defines rules to identify important alert types and stores alerts in a database. It aims to eliminate redundant alerts for the same attack by analyzing attributes like source/destination IP and port. Alert severity levels are defined using threshold counts and times to classify alerts and help administrators respond appropriately.
Comparison study of machine learning classifiers to detect anomalies IJECEIAES
In this era of Internet ensuring the confidentiality, authentication and integrity of any resource exchanged over the net is the imperative. Presence of intrusion prevention techniques like strong password, firewalls etc. are not sufficient to monitor such voluminous network traffic as they can be breached easily. Existing signature based detection techniques like antivirus only offers protection against known attacks whose signatures are stored in the database.Thus, the need for real-time detection of aberrations is observed. Existing signature based detection techniques like antivirus only offers protection against known attacks whose signatures are stored in the database. Machine learning classifiers are implemented here to learn how the values of various fields like source bytes, destination bytes etc. in a network packet decides if the packet is compromised or not . Finally the accuracy of their detection is compared to choose the best suited classifier for this purpose. The outcome thus produced may be useful to offer real time detection while exchanging sensitive information such as credit card details.
Cyber Warfare is the current single greatest emerging threat to National Security. Network security has become an essential component of any computer network. As computer networks and systems become ever more fundamental to modern society, concerns about security has become increasingly important. There are a multitude of different applications open source and proprietary available for the protection +-system administrator, to decide on the most suitable format for their purpose requires knowledge of the available safety measures, their features and how they affect the quality of service, as well as the kind of data they will be allowing through un flagged. A majority of methods currently used to ensure the quality of a networks service are signature based. From this information, and details on the specifics of popular applications and their implementation methods, we have carried through the ideas, incorporating our own opinions, to formulate suggestions on how this could be done on a general level. The main objective was to design and develop an Intrusion Detection System. While the minor objectives were to; Design a port scanner to determine potential threats and mitigation techniques to withstand these attacks. Implement the system on a host and Run and test the designed IDS. In this project we set out to develop a Honey Pot IDS System. It would make it easy to listen on a range of ports and emulate a network protocol to track and identify any individuals trying to connect to your system. This IDS will use the following design approaches: Event correlation, Log analysis, Alerting, and policy enforcement. Intrusion Detection Systems (IDSs) attempt to identify unauthorized use, misuse, and abuse of computer systems. In response to the growth in the use and development of IDSs, we have developed a methodology for testing IDSs. The methodology consists of techniques from the field of software testing which we have adapted for the specific purpose of testing IDSs. In this paper, we identify a set of general IDS performance objectives which is the basis for the methodology. We present the details of the methodology, including strategies for test-case selection and specific testing procedures. We include quantitative results from testing experiments on the Network Security Monitor (NSM), an IDS developed at UC Davis. We present an overview of the software platform that we have used to create user-simulation scripts for testing experiments. The platform consists of the UNIX tool expect and enhancements that we have developed, including mechanisms for concurrent scripts and a record-and-replay feature. We also provide background information on intrusions and IDSs to motivate our work.
Similar to A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709
2702
the network and data link layer of the protocol stack. Because each packet must be passed through
intermediate nodes quickly, that packet has to travel from the source to the destination. Malicious routing
attacks may target the routing detection or maintenance process by failing to follow the specifications of
the routing protocol [2, 3]. This increases the possibility of attacks such as eavesdropping, spoofing, denial of
service, and impersonation. Compared to fixed networks, Mobile ad hoc Network security is taken into
account from various points such as availability, privacy, reliability, encryption, authentication, access
control, and usage control. Due to the prominent characteristics of Mobile ad hoc Networks, security methods
used to secure fixed networks are not feasible for MANET [4]. New threats such as attacks from internal
malicious nodes, Byzantine, and wormhole attacks are difficult to defend. An Intrusion Detection System
(IDS) is an effective way to identify when an attack occurs in a MANET.
For the above reasons, it is very important to deploy in MANET as a second line of defense an
intrusion detection system [5]. Intrusion detection systems (IDS) are a mechanism for monitoring and
investigating events occurring in a computer system. An IDS incorporates methods for modeling and
discovering abnormal behaviors and complex techniques. They try to determine whether or not the network is
going through any malicious activity. This is typically accomplished by gathering data automatically from
a variety of systems and network sources and then analyzing the information for potential security issues.
Current intrusion detection and prevention methods, such as firewalls, access control protocols and
authentication, have several drawbacks in defending networks and devices from ever more advanced attacks,
such as a denial of service [6]. However, most systems based on such techniques are suffering from high
false positive and false negative detection rates and lack of continuous adaptation to evolving malicious
behaviors. Deep learning, therefore, allows to quickly perform data analysis and visualization, the aim is to
enable the detection of device vulnerabilities and flaws by security professionals. Several Deep Learning
(DL) approaches have been applied to the issue of intrusion detection to increase detection rates and
adaptability. Such techniques are often used to establish the attacks existing and detailed knowledge base.
The remainder of this paper is organized as follows. Section 2 is dedicated to discuss Security
attacks in MANET. Then, Section 3 describes the intrusion detection system architectures in MANET.
Section 4 provides a deep learning models for intrusion detection system in MANET. In section 5
the experiments and resultas. In section 6 we conclude by conclusion.
2. SECURITY ATTACKS IN MANET
Compared to wired infrastructure networks, Mobile ad hoc Networks (MANET) [7] are more
vulnerable to attacks. MANET face more security threats than centralized networks due to their dynamic
topology and the lack of centralized network administration. In the Mobile ad hoc networks, several
characteristics could be used to classify attacks. Examples would include looking at the behavior of
the attacks (passive vs. active), the source of the attacks (external vs. internal).
In active attack, the attacker is actively involved in the network operations and tries to change
the messages being transmitted. By disrupting the entire network process, the attacker may modify, insert,
forge, drop data. The frequency of this attack is high because the whole network can be brought down [8].
They are easy to detect as the network performance degrades significantly. In passive attack, the attacker
does not corrupt the shared data but listens to it. They are attempting to gain confidential information and
analyze the traffic patterns transmitted. They are difficult to detect because they do not interrupt or modify
the information sent or received. It is also possible to classify the attacks into two categories depending on
the domain of the attacks, namely external attacks, and internal attacks. Internal attacks are carried out by
nodes that are not part of the domain of the network. External attacks are triggered by nodes that are already
part of the network. External attacks are more severe than internal attacks [9].
2.1. Denial of service attacks (DoS)
A denial of service attack is an attempt to make a machine or network resource unavailable to its
intended users [10, 11], such as to temporarily or indefinitely interrupt or suspend services of a host
connected to the Internet. This attack can be launched at different layers. the physical layer, network layer,
transport layer.
2.2. Remote to user attacks (R2L)
Occurs when an attacker does not have an account on the victim machine and attempts to gain
access by sending packets to a machine over a network in order to generate some vulnerability on that
machine that allows him/ her to gain local access as a user of that machine.
3. Int J Elec & Comp Eng ISSN: 2088-8708
A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib)
2703
2.3. User to root attacks (U2R)
This attack occurs when normal system user illegally gains access to either root’s or super user’s
privileges such as Perl, xterm [12].
2.4. Probing
Probing occurs when an attacker scans a network in order to gather information or find known
vulnerabilities that allow him /her to hack the entire network. Usually, this method is used in information
mining such as saint, port sweep, Mscan, Nmap, etc [13].
3. INTRUSION DETECTION SYSTEM ARCHITECTURES IN MANET
Many intrusion detection systems (IDS) have been developed for MANET to detect various types of
attacks, IDS plays an important role in MANET to detect any type of attacks [14, 15]. An IDS is a software
system used to analyzes misbehavior and violation of policy, and then generate a report based on it,
Basically, intrusion detection system is classified into following three basic categories according to their
operational structure.
3.1. The standalone architecture
In this system, to determine intrusion, the intrusion detection system runs independently on
the individual node. All decisions made about a particular activity depend solely on information collected at
its own node, as there is no collaboration between nodes in the network [16]. Therefore, there is no transfer
of information. Even, as no alert information is transferred, a node in the same network does not have any
information about the other nodes in the network. Because of its limitations, this model is not efficient, it can
be used effectively in a network where all nodes already have an IDS installed. Compared to multi-layered
network infrastructure, this system is also suitable for single layer network. Since the information available
on any single node is not sufficient to detect intrusions, this system has not been chosen as MANET IDS.
3.2. The distributed and collaborative architecture
In this architecture, the intrusion detection engine is installed on each node in this architecture,
which monitors local audit data and detects intrusion We also participate in the cooperative detection and/or
response process by sharing audit information and/or detection results with neighboring nodes to solve
the problem. When the intrusion is captured, either a local response (e.g. alerting the local user) or a global
response may be issued by an IDS agent. Each node is involved in the method and response of intrusion
detection as having an IDS agent running on it [17]. An IDS agent is responsible for detecting and collecting
local information and data in order to identify any attack if an attack occurs in the network, as well as taking
an independent response. However, when the evidence is non-conclusive, neighboring IDS agents also
cooperate in global intrusion detection. This system, like standalone IDS, is also more suitable for flat
network systems, not multi-layer systems.
3.3. The hierarchical IDS intrusion detection architecture
Hierarchical IDS system Expand the distributed and cooperative IDS system functions and have been
implemented for multi-layer network infrastructures where the network is divided into various small
networks known as clusters. Usually, each cluster head has more functionality than other cluster members,
such as transmitting data packets to other clusters. We can therefore say that these cluster heads work in
some way as central points similar to wired network control devices such as routers, switches or gateways.
The multi- layering concept applies to intrusion detection systems where there is a proposal for hierarchical
IDS. Each IDS agent runs on a specific member node and is responsible for its node, i.e. monitoring and
deciding on intrusions detected locally. A cluster head is responsible for their node locally as well as globally
for their cluster, such as monitoring network traffic and announcing a global response when detecting
network intrusion [18].
4. DEEP LEARNING MODELS FOR INTRUSION DETECTION SYSTEM IN MANET
Deep learning is a class of Machine learning algorithms that uses multiple layers to progressively
extract higher level features from the raw input. The aim is to make machines like computers think and
understand how humans think by imitating the grid of the human brain connection, Deep learning
architectures such as deep neural networks, deep belief networks, recurrent neural networks and
convolutional neural networks have been applied to fields including computer vision, speech recognition,
natural language processing, audio recognition, social network filtering, machine translation, bioinformatics,
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709
2704
drug design, medical image analysis, material inspection and board game programs, where they have
produced results comparable to and in some cases superior to human experts [19]. Supervised learning
algorithm is applied to a dataset that has features and each of those features associated with a label. However,
deep learning algorithms comes under unsupervised learning algorithms which are applied to a dataset which
has many features in order to learn useful properties from the structure of the dataset [20].
The Security applications of deep learning models like Intrusion Detection System (IDS), malware
detection, spam-filtering have become essentials in designing tasks for data protection, classification, and
prediction. These different types of tasks depending on the intelligence to build a model that usually classifies
and discriminates between samples of "benign" and "malign," such as attacks and benign packets [21].
The complexity of attack techniques tools is increased with the rapid increase with the use of Deep learning
models.There are lots of popular variants of Deep learning models like CNNs and RNNs. To solve
the hardness of training, BLSTM is proposed to alleviate some limitations of the basic RNN, Inception
convolutional neural network (CNN) which a variant of basic CNN and deep belief network (DBN).
This section gives a brief introduction of the models we have used in our experiments: the inception
architecture CNN, BLSTM and DBN [22].
4.1. The inception architecture CNN
Szegedy et al [23] suggest the Inception architecture CNN to solve the problem of a large number of
parameters and speed up the learning of CNN. An Inception network is typically a network consisting of
modules of the above type stacked on each other, with occasional max-pooling layers with phase two to halve
grid resolution. It seemed useful to start using Inception modules only at higher layers for technical reasons
(memory capacity during training) while retaining the lower layers in traditional convolutional fashion.
As we can see in Figure 1, the 1x1 convolutions are used to compute reductions before the expensive
3x3 and 5x5 convolutions. Besides being used as reductions, they also include the use of rectified linear
activation which makes them dual-purpose [24]. One of the main benefits of this architecture is that it makes
it possible to dramatically increase the number of units at each stage without an uncontrolled blow-up in
computational complexity. Another practically useful aspect of this design is that it is in line with
the principle that visual information should be processed on different scales and then aggregated so that
the next stage can simultaneously abstract features from different scales. The improved use of computational
resources allows for increasing both the width of each stage as well as the number of stages without getting
into computational difficulties. Another way to utilize the inception architecture is to create slightly inferior,
but computationally cheaper versions of it.
Figure 1. Architecture of the inception module with dimentions reductions [25]
4.2. Bidirectional long short-term memory (BLSTM)
Instead of running an RNN only in the forward mode starting from the first symbol, we start another
one from the last symbol running from back to front. Bidirectional recurrent neural networks introduce
a hidden layer to more robust processes by passing information in a reverse direction. Figure 2 illustrates
the architecture of a bidirectional recurrent neural network. In fact, this is not too dissimilar to the forward
and backward recursion we encountered above. The main distinction is that in the previous case these
equations had a specific statistical meaning. Now they are devoid of such easily accessible interpretaton and
5. Int J Elec & Comp Eng ISSN: 2088-8708
A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib)
2705
we can just treat them as generic functions. This transition epitomizes many of the principles guiding
the design of modern deep networks: first, use the type of functional dependencies of classical statistical
models, and then use the models in a generic form [26].
Figure 2. Architecture of BLSTM [27]
4.3. Deep belief network (DBN)
To overcome the overfitting problem in Multi-Layer Perceptron (MLP), we can set up a DBN,
do unsupervised pretraining to get a decent set of feature representations for the inputs, then finetune on
the training set to actually get predictions from the network. While weights of an MLP are initialized
randomly, a DBN uses a greedy layer-by-layer pretraining algorithm to initialize the network weights through
probabilistic generative models composed of a visible layer and multiple layers of stochastic, latent variables,
which are called hidden units or feature detectors. Restricted Boltzmann Machines (RBM) in the DBN are
stacked, forming an undirected probabilistic graphical model similar to Markov Random Fields (MRF):
the two layers are composed of visible neurons and then hidden neurons. The top two layers in a stacked
RBM have undirected, symmetric connections between them and form an associative memory, whereas lower
layers receive top-down, directed connections from the layer above. A hybrid model is established by
stacking up RBMs, as illustrated in Figure 3. The top two layers form the RBM and the lower layers form
a directed belief net [28]. This hybrid model is called a deep belief network (DBN). The deep-belief-network
is a simple, clean, fast Python implementation of deep belief networks based on binary Restricted Boltzmann
Machines (RBM). In our case, it was based on NumPy and TensorFlow libraries to take advantage of GPU
computation.
Figure 3. Hybrid model of the DBN after greedy layer-wise learning. The top two layers form the RBM and
the bottom layers form a directed belief network [29]
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709
2706
5. EXPERIMENT AND RESULTS
5.1. Data preprocessing
The methodology discussed in this paper is applied on the entire NSL-KDD dataset. The NSL-KDD
dataset was proposed to deal with inherent problems of the KDD Cup 1999 dataset which contain too many
redundant records. An example of dataset record is ‘0 tcp ftp_data SF 491 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2
0 0 0 0 1 0 0 150 25 0.17 0.03 0.17 0 0 0 0.05 0 normal’. As you can see, data contains some text values
also. Pre-processing of original NSL-KDD dataset is necessary to make it a suitable input for learning
models. We need to transform the nominal features to numeric values. Only column number
2(Protocol_type), 3(Services), 4(Flag) and 42(Attack or Normal) contains nominal values [30].
5.2. Evaluation metrics
For evaluation purposes, Accuracy (ACC), Precision (P), Recall (R) metrics are used. These metrics
are calculated by using four different measures, true positive (TP), true negative (TN), false positive (FP)
and false negative (FN). Accuracy is the percentage of the records number classified correctly over total
the records. Precision means the percentage of your results which are relevant. On the other hand, recall
refers to the percentage of total relevant results correctly classified by your algorithm [31].
True Positive Rate (TPR): also known as Detection Rate (DR) is the percentage of the anomaly
records number correctly flagged as anomaly over the total number of anomaly records in (4):
Accuracy =
TP+TN
TP+FP+FN+TN
(1)
Precision =
TP
TP+FP
(2)
Recall =
TP
TP+Fn
(3)
DR = TPR =
TP
TP+Fn
(4)
False Positive Rate (FPR): the percentage of the normal records number wrongly flagged as
anomaly is divided by the total number of normal records in (5) [32].
FPR =
FP
FP+TN
(5)
5.3. Comparative study of three deep learning models-based intrusion detection system
The research on security issues relating to IDS exists since the birth of computer architectures.
In recent days, applying deep learning to IDS is of prime interest among security researchers and specialists.
A comparative study of three deep learning models, Inception convolutional neural network (CNN),
Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) applied to IDS.
Tables 1-3 illustrate the accuracy, precision, and recall of our three deep learning models in KDD+
and KDD-21, as we can see that the inception CNN and BLSTM exceed the DBN. Figures 4-7 provide
a comparison of the experimental results of Tables 1-3. From the results, we could find that the inception
architecture CNN got the highest overall accuracy (ACC). Besides, the BLSTM model surpassed the DBN
model on both the overall precision and overall recall rate in KDD+ and KDD-21. Although the DBN model
performed worse than the other three models on ACC, precision, recall rate in KDD+ and KDD-21,
it obviously failed on information on the attack. The proper explanation that BLSTM tried a lot on
the whole sequence comprehension and Inception-CNN could extract the key information more quickly.
Inception-CNN and BLSTM perform better than DBN. In theory, DBN should be the best model but it is
very hard to estimate joint probabilities accurately at the moment.
We found that all three models had good performance on the Normal data and DoS data and Probe.
Table 4 shows the DR of KDDTest+; Table 5 shows the FPR of KDDTest+; Table 6 shows the DR of
KDDTest-21; Table 7 shows the FPR of KDDTest-21. Results in Tables 4, 5, 6 and 7 compare DR and FPR
of KDDTest+ and KDDTest-21 we can conclude that the Inception-CNN and BLSTM provide better results
in DR and FPR compared to DBN, we can find that results of R2L and U2R are relatively quite small for all
models, which might because of the insufficiency of their records in the dataset. However, the models still
can detect some of them. Bidirectional long short-term memory (BLSTM) and Inception-CNN, are used to
detect anomalies in sequence. The results show that the Inception-CNN and BLSTM showed superiority over
the other DBN model. We tie that to the fact that Inception-CNN and BLSTM has the ability to define normal
behavior from large datasets and can be used to detect a new unseen threat. It can be concluded that if one
only wants to classify the network traffic as normal or attack, Inception CNN or BLSTM they will be
a better choice.
7. Int J Elec & Comp Eng ISSN: 2088-8708
A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib)
2707
Table 1. Accuracy for each model
Inception-
CNN
BLSTM DBN
KDDTest+ 88,03% 84,03% 71.91%
KDDTest–21 73.98% 75.36% 66.73%
Table 2. Precision for each model
Inception-
CNN
BLSTM DBN
KDDTest+ 85.90% 93.98% 73.86%
KDDTest–21 83.66% 77.89% 74,.65%
Table 3. Recall for each model
Inception-
CNN
BLSTM DBN
KDDTest+ 85.58% 86.01% 80.67%
KDDTest–21 72.11% 72.98% 69,23%
Table 4. DR of KDD Test+
Normal Dos Probe R2L U2R
Inception-CNN 88.468% 69.548% 61.357% 18.579% 22.348%
BLSTM 87.975% 71.576% 63.574% 29.110% 24.022%
DBN 79.697% 66.241% 57.957% 16.436% 17.043%
Table 5. FPR of KDD Test+
Normal Dos Probe R2L U2R
Inception- CNN 28.576% 28.622% 6.061% 2.178% 0.063%
BLSTM 65.448% 24.659% 10.323% 7.810% 0.082%
DBN 46.533% 25.2108% 14.073% 6.073% 1.065%
Table 6. DR of KDD Test- 21
Normal Dos Probe R2L U2R
Inception-CNN 95.870% 77.182% 67.245% 22.323% 20.819%
BLSTM 82.451% 67.584% 61.865% 20.567% 21.634%
DBN 72.211% 54.987% 60.773% 16.765% 19.984%
Table 7. FPR of KDD Test- 21
Normal Dos Probe R2L U2R
Inception-CNN 36.870% 14.53% 2.357% 0.479% 0.068%
BLSTM 51.975% 19.576% 7.574% 1.110% 0.022%
DBN 63.432% 22.653% 7.325% 2.972% 1.086%
Figure 4. Accuracy, precision and recall of
KDDTest+
Figure 5. DR of KDDTest+ using inception-CNN,
BLSTM, DBN
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2701 - 2709
2708
Figure 6. Accuracy, precision and recall of
KDDTest-21
Figure 7. DR of KDDTest-21 using inception-CNN,
BLSTM, DBN
6. CONCLUSION
Recently, Deep learning for intrusion detection system has received much deliberation. In any IDS,
audit data samples are analyzed to set detection rules in highly mobile node network to protect against
number of novel attacks. The primary advantage of using Deep learning based intrusion detection systems is
that it is highly accurate and able to detect or categorize attacks without any environmental influence.
Different Deep learning based IDS approaches have their own benefits and disadvantages. Therefore,
considering the MANET scenarios, it is important to choose a precise method for implementing IDS.
This paper is motivated by the need to develop good training algorithms for deep architectures-based
IDS, since these can be much more representationally efficient than shallow ones such as SVMs and one-
hiddenlayer neural nets. which may be proved important for selecting the appropriate methods on bases of
the situation in MANET. In this work, the practical problems of existing IDS have been addressed and
different Deep Learning models (Inception-CNN, BLSTM and Deep Belief model) are compared to solve
these problems. The models have been implemented and tested on NSL-KDD dataset. The reason behind
the superiority of Inception-CNN in general that, it’s the ability to define normal behavior from a large
dataset and can be used to detect a new unseen threat. This work can be extended in two directions: first,
implement other deep models and create hybrid models and voting systems across different models to detect
and recognize low false alarm threats. Second, provide existing systems with real-world data for multiple
networks in such a way that the model can increase its accuracy by adapting the definition of normal
activities through different un-calibrated datasets.
REFERENCES
[1] E. Amiri, H. Keshavarz, H. Heidari, E. Mohamadi, and H. Moradzadeh, “Intrusion Detection Systems in MANET:
A Review,” Procedia - Social and Behavioral Sciences, vol. 129, pp. 453–459, 2014.
[2] S. Laqtib, K. E. Yassini, M. Houmer, M. D. E. Ouadghiri, and M. L. Hasnaoui, “Impact of mobility models on
Optimized Link State Routing Protocol in MANET,” 2016 International Conference on Wireless Networks and
Mobile Communications (WINCOM), 2016.
[3] S. Laqtib, K. E. Yassini, and M. L. Hasnaoui, “Performance Evaluation of Multicast Routing Protocols in
MANET,” in International Conference on Advanced Intelligent Systems for Sustainable Development, Springer,
Cham, 2018.
[4] S. Laqtib, K. E. Yassini, and M. L. Hasnaoui, “Link-state QoS routing protocol under various mobility
models,��� Indonesian Journal of Electrical Engineering and Computer Science Science (IJEECS), vol. 16, no. 2,
pp. 906-916, Nov. 2019.
[5] I. Butun, S. Morgera and R. Sankar, “A Survey of Intrusion Detection Systems in Wireless Sensor Networks,”
IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, 2014.
[6] S. Iqbal, M. L. M. Kiah, B. Dhaghighi, M. Hussain, S. Khan, M. K. Khan, and K.-K. R. Choo, “On cloud security
attacks: A taxonomy and intrusion detection and prevention as a service,” Journal of Network and Computer
Applications, vol. 74, pp. 98–120, 2016.
[7] A. Fudholi and K. Sopian, “Review on Solar Collector for Agricultural Produce,” International Journal of Power
Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 414-419, Jan. 2018.
[8] T. Laagoubi, M. Bouzi, and M. Benchagra, “MPPT and Power Factor Control for Grid Connected PV Systems with
Fuzzy Logic Controllers,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1,
pp. 105-113, Jan. 2018.
9. Int J Elec & Comp Eng ISSN: 2088-8708
A technical review and comparative analysis of machine learning techniques... (Safaa Laqtib)
2709
[9] A. Fudholi, et. al., “Primary Study of Tracking Photovoltaic System for Mobile Station in Malaysia,” International
Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 427-432, Jan. 2018.
[10] A. Fudholi and K. Sopian, “Review on Exergy and Energy Analysis of Solar Air Heater,” International Journal of
Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 420-426, Jan. 2018.
[11] S. Suraya, P. S. Sujatha, and B. K. P, “A Novel Control Strategy for Compensation of Voltage Quality Problem in
AC Drives,” International Journal of Power Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 8-16, 2018.
[12] S. Samadi, et. al., “Optimum range of angle tracking radars: a theoretical computing,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1765, Jan. 2019.
[13] T. Zaidi and R. Rampratap, “Virtual Machine Allocation Policy in Cloud Computing Environment using
CloudSim,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 344-454,
Jan. 2018.
[14] G. S. N. Rao, et. al., “Dynamic Time Slice Calculation for Round Robin Process Scheduling Using NOC,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 5, no. 6, pp. 1480-1485, Jan. 2015.
[15] A. Oukennou, A. Sandali, and S. Elmoumen, “Coordinated Placement and Setting of FACTS in Electrical Network
based on Kalai-smorodinsky Bargaining Solution and Voltage Deviation Index,” International Journal of Electrical
and Computer Engineering (IJECE), vol. 8, no. 6, pp. 4079-4088, Jan. 2018.
[16] A. Othman, N.I.S. Shaari, A.M. Zobilah, N.A. Shairi, Z. Zakaria, “Design of Compact Ultra Wideband Antenna for
Microwave Medical Imaging Application,” Indonesian Journal of Electrical Engineering and Computer Science
(IJEECS), vol. 15, no. 3, pp. 1197-1202, Sep. 2019.
[17] N. Batayev, “Axial Compressor Fouling Detection for Gas Turbine Driven Gas Compression Unit,” Indonesian
Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1257-1263, Sep. 2019.
[18] djelloul kheira, “Performance of channel selection used for Multi-class EEG signal classification of motor
imagery,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3,
pp. 1305-1312, Sep. 2019.
[19] S.H. Ahammad, “Automatic Segmentation of Spinal Cord Diffusion MR Images for disease location finding,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1313-1321,
Sep. 2019.
[20] M. Lalaoui, A.E. Afia, R. Chiheb, “A Self-Tuned Simulated Annealing Algorithm Using Hidden Markov Model,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 291-298, Jan. 2018.
[21] A. Fudholi and K. Sopian, “Review on Solar Collector for Agricultural Produce,” International Journal of Power
Electronics and Drive Systems (IJPEDS), vol. 9, no. 1, pp. 414-419, Jan. 2018.
[22] A.F. Majid, Y. Mukhlis, “Aperture Coupling Rectangular Slotted Circular Ring Microstrip Patch Antenna,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, pp. 1419-1427,
Sep. 2019.
[23] Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan,
Vincent Vanhoucke, Andrew Rabinovich, “MPPT Going deeper with convolutions,” Conference on Computer
Vision and Pattern Recognition (CVPR). IEEE Conference on 2015.
[24] Fudholi, Ahmad, and Kamaruzzaman Sopian, “Review on exergy and energy analysis of solar air heater,”
International Journal of Power Electronics and Drive Systems(IJPEDS), vol. 9, no. 1, pp. 420-426, 2018.
[25] Kuchibhatla, Samanthaka Mani, D. Padmavathi, and R. Srinivasa Rao, “Effect of Carrier Frequency in Grid Inter
Connected Wind System with SSFC Controller,” International Journal of Power Electronics and Drive Systems
(IJPEDS), vol. 9, no. 3, pp. 1349-1355, 2018.
[26] Neethu B, “Classification of intrusion detection dataset using machine learning approaches,” International Journal
of Electronics and Computer Science Engineering, pp. 1044-1051, 2012.
[27] Ramkumar, Purigilla Venkata, and Munagala Surya Kalavathi, “Fractional Order PID Controlled Interleaved Boost
converter Fed Shunt Active Filter System,” International Journal of Power Electronics and Drive Systems
(IJPEDS), vol. 9, no. 1, pp. 126-138, 2018.
[28] Pane, Syafrial Fachri, et al., “RFID-based conveyor belt for improve warehouse operations,” TELKOMNIKA
(Telecommunication Computing Electronics and Control), vol. 17, no. 2, pp. 794-800, 2019.
[29] Mohsen, Mowafak K., et al., “Electronically controlled radiation pattern leaky wave antenna array for
(C band) application,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 2,
pp. 573-579, 2019.
[30] Rahardja, Untung, Eka Purnama Harahap, and Shylvia Ratna Dewi, “The strategy of enhancing article citation and
H-index on SINTA to improve tertiary reputation,” TELKOMNIKA (Telecommunication Computing Electronics
and Control), vol. 17, no. 2, pp. 683-692, 2019.
[31] Zainuri, Akhmad, et al., “VRLA battery state of health estimation based on charging time,” TELKOMNIKA
(Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1577-1583, 2019.
[32] H. Setti, et. al., “A new configuration of a printed diplexer designed for DCS and ISM bands,” TELKOMNIKA
(Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1090-1095, Jan. 2019.