@article {
author = {Nazarpour, Mohammad and Nezafati, Navid and Shokuhyar, Sajjad},
title = {Detection of Attacks and Anomalies in The Internet of Things System Using Neural Networks Based on Training with PSO and TLBO Algorithms},
journal = {Signal Processing and Renewable Energy},
volume = {4},
number = {4},
pages = {81-94},
year = {2020},
publisher = {Islamic Azad University, South Tehran Branch},
issn = {2588-7327},
eissn = {2588-7335},
doi = {},
abstract = {Detecting attacks and anomalies is one of the new challenges in commercializing and advancing IOT technology. One of the most effective methods for detecting attacks is the machine learning algorithms. Until now, many ML models have been suggested to detect attacks and anomalies, all of them use experimental data to model the detection process. One of the most popular and efficient ML algorithms is the artificial neural network. Neural networks also have different classical learning methods. But all of these classic learning methods are problematic for systems that have a lot of local optimized points or have a very complex target function so that they get stuck in local optimal points and are unable to find the global optimal point. The use of evolutionary optimization algorithms for neural network training can be an effective and interesting method. These algorithms have the capability to solve very complex problems with multi-purposed functions and high constraints. Among the evolutionary algorithms, the particle swarm optimization algorithm is fast and popular. Hence, in this article, we use this algorithm to train the neural network to detect attacks and anomalies of the Internet of Things system. Although the PSO algorithm has so many merits, in some cases it may reduce population diversity, resulting in premature convergence. So, in order to solve this problem, we make use of the TLBO algorithm and also, we show that in some cases, up to 90% accuracy of attack detection can be obtained.},
keywords = {Attack detection,Neural network,PSO Algorithm,Fuzzy rule,Adaptive Formulation,TLBO Algorithm},
url = {http://spre.azad.ac.ir/article_677172.html},
eprint = {http://spre.azad.ac.ir/article_677172_eabfa84876999207681334e5732879c9.pdf}
}