Designing a participatory modelby using ensembleintelligence algorithms to detect security anomalies in wireless sensor-based IoT networks
Main Article Content
Abstract
Background: With the development and expansion of technologies and
computing technologies, today the frontiers of knowledge are developing
rapidly. One of the most important factors in starting these technologies is the
formation of a computer network.
purpose: Network traffic is very large and this leads to high data size and
increased noise and makes it very difficult to extract meaningful information to
detect abnormal events. Network training to detect abnormalities helps to
identify the time of the attack. Early detection of attacks improves the stability
of a system.
Methods: The goal of this study is to design a proposed model to identify and
detect malware attacks with appropriate accuracy and reduce the rate of
malfunctions. To meet these goals, we used participatory machine learning
algorithms.
Results: According to the results, our proposed model has a better performance
in intrusion detection of wireless sensor network attacks than the compared
algorithms of decision tree, random tree and Naïve Bayes.
Conclusion: Due to recent advances in data mining, the use of participatory
model in identifying and detecting attacks of wireless sensor networks is very
effective.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.