Abstract

The technique of keeping an eye out for malicious activity or policy violations on a computer network or system is known as intrusion detection. It entails examining system logs, network traffic, and other data sources to spot potential security breaches, misuse, and illegal access. Network-based and host-based intrusion detection systems (IDS) are the two types available. The former analyzes network traffic and packets, while the latter concentrates on specific hosts or devices. This paper investigates how to improve intrusion detection systems in cyber security by combining dragonfly optimization (DFO) and Bayesian neural network (BNN) methodologies. The NSL-KDD dataset, which is tested and trained in the system, is the source of the dataset used in the study. By utilizing the optimization skills of DFO and the probabilistic reasoning powers of BNN, the hybrid technique improves the accuracy and flexibility of detecting and addressing network intrusions. This research illustrates the effectiveness of the suggested methodology in navigating dynamic network environments and identifying emerging dangers through a thorough examination. In addition to improving detection performance, the integration of BNN and DFO gives enterprises insightful information about infiltration patterns and the ability to take proactive measures to thwart hostile activity. The created model's enhanced intrusion detection performance is demonstrated by the experimental findings. These results are validated in terms of accuracy, precision, recall, execution time, and F1 score by comparing them with models that are currently in use.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.