Artificial Intelligence for Creating Low Latency and Predictive Intrusion Detection with Security Enhancement in Power Systems

被引:1
|
作者
Bhadoria, Robin Singh [1 ]
Bhoj, Naman [2 ]
Zaini, Hatim G. [3 ]
Bisht, Vivek [4 ]
Nezami, Md. Manzar [5 ]
Althobaiti, Ahmed [6 ]
Ghoneim, Sherif S. M. [6 ]
机构
[1] GLA Univ, Dept Comp Engn & Applicat, Mathura 281406, Uttar Pradesh, India
[2] Birla Inst Appl Sci BIAS, Dept Comp Sci & Engn, Bhimtal 263136, Uttarakhand, India
[3] Taif Univ, Dept Comp Engn, Coll Comp & Informat Technol, Al Huwaya 26571, Taif, Saudi Arabia
[4] Lasalle Coll, Dept IT, 2000 St Catherine St, Montreal, PQ H3H 2T2, Canada
[5] GLA Univ, Dept Elect & Commun Engn, Mathura 281406, Uttar Pradesh, India
[6] Taif Univ, Dept Elect Engn, Coll Engn, At Taif 21944, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 24期
关键词
data security; intrusion detection system (IDS); artificial intelligence; power system; support vector machine (SVM);
D O I
10.3390/app112411988
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Advancement in network technology has vastly increased the usage of the Internet. Consequently, there has been a rise in traffic volume and data sharing. This has made securing a network from sophisticated intrusion attacks very important to preserve users' information and privacy. Our research focuses on combating and detecting intrusion attacks and preserving the integrity of online systems. In our research we first create a benchmark model for detecting intrusions and then employ various combinations of feature selection techniques based upon ensemble machine learning algorithms to improve the performance of the intrusion detection system. The performance of our model was investigated using three evaluation metrics namely: elimination time, accuracy and F1-score. The results of the experiment indicated that the random forest feature selection technique had the minimum elimination time, whereas the support vector machine model had the best accuracy and F1-score. Therefore, conclusive evidence could be drawn that the combination of random forest and support vector machine is suitable for low latency and highly accurate intrusion detection systems.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Artificial intelligence based ensemble approach for intrusion detection systems
    Zhao, Hongwei
    Li, Mingzhao
    Zhao, Haoyu
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2020, 71
  • [2] Artificial intelligence for resilience enhancement of power distribution systems
    Hosseini M.M.
    Parvania M.
    Electricity Journal, 2021, 34 (01):
  • [3] Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud-Fog-Edge architectures
    Hernandez-Jaimes, Mireya Lucia
    Martinez-Cruz, Alfonso
    Ramirez-Gutierrez, Kelsey Alejandra
    Feregrino-Uribe, Claudia
    INTERNET OF THINGS, 2023, 23
  • [4] Artificial Intelligence for Glaucoma Creating and Implementing Artificial Intelligence for Disease Detection and Progression
    Al-Aswad, Lama A.
    Ramachandran, Rithambara
    Schuman, Joel S.
    Medeiros, Felipe
    Eydelman, Malvina B.
    OPHTHALMOLOGY GLAUCOMA, 2022, 5 (05): : E16 - E25
  • [5] Research on Security Detection of Embedded Terminals in Power Grids Under Artificial Intelligence
    Gu, Yaqi
    Ma, Yan
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2024, 16 (01)
  • [6] Research on Intrusion Detection Technology of Computing Nodes in Digital Power Grid based on Artificial Intelligence
    Lin, Xubin
    Zhang, Situo
    Hu, Feifei
    Wu, Liu
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2023, 10 (04) : 1 - 7
  • [7] On the Concept and Strategy of Creating Cybernetic Systems with Artificial Intelligence
    Boyun, V. P.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2023, 59 (5) : 713 - 724
  • [8] On the Concept and Strategy of Creating Cybernetic Systems with Artificial Intelligence
    V. P. Boyun
    Cybernetics and Systems Analysis, 2023, 59 : 713 - 724
  • [9] Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities
    Kenan Senturk
    Ahmet Faruk Gormus
    Serkan Gonen
    Mehmet Ali Bariskan
    Ahmet Kaan Durmaz
    Cluster Computing, 2025, 28 (3)
  • [10] The use of artificial intelligence based techniques for intrusion detection: a review
    Kumar, Gulshan
    Kumar, Krishan
    Sachdeva, Monika
    ARTIFICIAL INTELLIGENCE REVIEW, 2010, 34 (04) : 369 - 387