Investigation of combined intrusion ate detection systems with network security approach Case study of RPL protocols

سال انتشار: 1400
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 297

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

این مقاله در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ITCT12_034

تاریخ نمایه سازی: 7 شهریور 1400

چکیده مقاله:

Investigating, recognizing, and preventing malicious functions to intrusion systems and designing intrusion detection systems for network security is one of the most important and practical issues in the field of computer and network sciences. In this study, which is organized as a reviewed and library study, the mentioned systems were studied in several areas, including the use of neural networks, genetic algorithms, and specifically the case study of RPL protocols. The results of this study showed that the neural network is very efficient in investigating and detecting intrusion. If this technique is combined with other machine learning methods, the system efficiency will reach over ۹۰%. Moreover, in this survey of RPL protocols and their role in network security and intrusion detection, it is identified that this group of protocols with proper planning and regulation at the project level with high-security capabilities will have many applications in intrusion detection and awareness.

نویسندگان

Sadaf Taghipoor Tabrizi

Master student of computer software engineering, Islamic Azad University, Central Tehran Branch