The rapid development of Internet of Things (IoT) devices and their increasing numbers have caused a tremendous increase in network traffic and a wider range of cyber-attacks. This growing trend has complicated the detection process for traditional intrusion detection systems and heightened the challenges faced by these devices, such as imbalanced and large training data. This study presents a cohesive methodology of a series of intelligent techniques to prepare clean and balanced data for training the first (core) layer of a robust hierarchical intrusion detection system. The methodology was built by cleaning and compressing the data using an Autoencoder and preparing a strong latent space for balancing using a hybrid method that combines Grey Wolf Optimization (GWO) with Borderline-SMOTE. Particle Swarm Optimization (PSO) was used to select the most important features that provide the greatest amount of information for training the first layer, which was built using deep learning techniques, and linking them in a hybrid manner that combines a Convolutional Neural Network–Long Short-Term Memory (CNN–LSTM) and the Attention mechanism. The proposed model was evaluated using two different types of datasets: the CICIOT2023 dataset, which is characterized by its large size and significant variation in the number of attacks, and the UNSW-NB15 dataset, which is characterized by its simplicity and less imbalance compared to the first dataset, to prepare and generalize the system across multiple environments. The proposed class showed binary classification results with an accuracy of 0.94, an Area Under the Curve (AUC) of 0.93, an optimized F1-score of 0.338, and a Matthews Correlation Coefficient (MCC) of 0.324 at the best threshold on the CICIoT2023 dataset. It also achieved an accuracy of approximately 0.96, an AUC of 0.985, and an MCC of over 0.82 on the UNSW-NB15 dataset. These results confirmed the construction of a strong and resilient layer, preparing the foundation for a robust hierarchical offside detection system.
Simulation Study
Abstract :
Robust statistics Known as, Resistance to mistakes resulting of the deviation of Check hypotheses of statistical properties ( Adjacent Unbiased , The Efficiency of data taken from a wide range of probability distributions follow a normal distribution or a mixture of other distributions with different standard deviations.
power spectrum function lead to, President role in the analysis of Stationary random processes, organized according to time, may be discrete random variables or continuous. Measuring its total capacity as frequency function.
Estimation methods Share with
... Show MoreCopper indium disulphide, CuInS2, is a promising absorber material for thin film photovoltaic which has recently attracted considerable attention due to its suitability to reach high efficiency solar cells by using low cost techniques. In this work CuInS2 thin films have been deposited by chemical spray pyrolysis onto glass substrates at ambient atmosphere, using different [Cu]/[In] ratio in the aqueous solutions at substrate temperature 3000C
and different annealing temperatures . Structural and optical properties of CIS films were analyzed by X-ray diffraction, and optical spectroscopy. Sprayed CIS films are polycrystalline with a chalcopyrite structure with a preferential orientation along the 112 direction and no remains of oxides
Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreThe aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di
... Show MoreDust and bird residue are problems impeding the operation of solar street lighting systems, especially in semi-desert areas, such as Iraq. The system in this paper was designed and developed locally using simple and inexpensive materials. The system runs automatically. It Connects to solar panels used in solar street lighting, and gets the required electricity from the same solar system. Solar panels are washed with dripping water in less than half a minute by this system. The cleaning period can also be controlled. It can also control, sensing the amount of dust the system operates. The impact of different types of falling dust on panels has also been studied. This was collected from different winds and studied their impact o
... Show MoreThe rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes, process data, and communicate seamlessly within interconnected networks. Typically, such devices integrate low-power radio transmitters and multiple smart sensors, hence enabling efficient functionality across wide ranges of applications. Alongside these technological developments, the concept of the IoT has emerged as a transformative paradigm, facilitating the interconnection of uniquely identifiable devices through internet-based networks. This paper aims to provide a comprehensive ex
... Show MoreThe current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the
... Show More