﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>10</Volume>
      <Issue>40</Issue>
      <PubDate PubStatus="epublish">
        <Year>2022</Year>
        <Month>10</Month>
        <Day>19</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO</ArticleTitle>
    <VernacularTitle>Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO</VernacularTitle>
    <FirstPage>270</FirstPage>
    <LastPage>278</LastPage>
    <ELocationID EIdType="doi">10.52547/jist.16307.10.40.270</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Mohammad </FirstName>
        <LastName>Nazarpour</LastName>
        <Affiliation>Department of Information Technology Management, Islamic Azad University, Central Tehran Branch, Tehran, Iran.</Affiliation>
      </Author>
      <Author>
        <FirstName>navid</FirstName>
        <LastName>nezafati</LastName>
        <Affiliation>beheshti university</Affiliation>
      </Author>
      <Author>
        <FirstName>Sajjad </FirstName>
        <LastName>Shokouhyar</LastName>
        <Affiliation>Department of Information Technology Management, Islamic Azad University, Central Tehran Branch, Tehran, Iran.</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2021</Year>
      <Month>6</Month>
      <Day>13</Day>
    </History>
    <Abstract>Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detection technology has the disadvantages of low detection rates and weak scalability that cannot adapt to the complicated and changing environment of the Internet of Things. Hence, one of the most widely used traditional methods is the use of neural networks and also the use of evolutionary optimization algorithms to train neural networks can be an efficient and interesting method. Therefore, in this paper, we use the PSO algorithm to train the neural network and detect attacks and abnormalities of the IOT system. Although the PSO algorithm has many benefits, in some cases it may reduce population diversity, resulting in early convergence. Therefore,in order to solve this problem, we use the modified PSO algorithm with a new mutation operator, fuzzy systems and comparative equations. The proposed method was tested with CUP-KDD data set. The simulation results of the proposed model of this article show better performance and 99% detection accuracy in detecting different malicious attacks, such as DOS, R2L, U2R, and PROB.</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">Attack detection</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Internet of Things (IOT)</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Neural Network</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">PSO Algorithm</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Fuzzy rule</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Adaptive Formulation</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/16307</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>