{"id":"https://openalex.org/W4402191738","doi":"https://doi.org/10.3233/idt-240476","title":"An effective attack detection framework using multi-scale depth-wise separable 1DCNN via fused grasshopper-based lemur optimizer in IoT routing system","display_name":"An effective attack detection framework using multi-scale depth-wise separable 1DCNN via fused grasshopper-based lemur optimizer in IoT routing system","publication_year":2024,"publication_date":"2024-09-03","ids":{"openalex":"https://openalex.org/W4402191738","doi":"https://doi.org/10.3233/idt-240476"},"language":"en","primary_location":{"id":"doi:10.3233/idt-240476","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-240476","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008863556","display_name":"Ajay Dilip Kumar Marapatla","orcid":null},"institutions":[{"id":"https://openalex.org/I175691731","display_name":"Pondicherry University","ror":"https://ror.org/01a3mef16","country_code":"IN","type":"education","lineage":["https://openalex.org/I175691731"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ajay Dilip Kumar Marapatla","raw_affiliation_strings":["Department of Computer Science & Engineering, Pondicherry Technological University, Pillaichavadi, Puducherry, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, Pondicherry Technological University, Pillaichavadi, Puducherry, India","institution_ids":["https://openalex.org/I175691731"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067501991","display_name":"E. Ilavarasan","orcid":null},"institutions":[{"id":"https://openalex.org/I175691731","display_name":"Pondicherry University","ror":"https://ror.org/01a3mef16","country_code":"IN","type":"education","lineage":["https://openalex.org/I175691731"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ilavarasan E","raw_affiliation_strings":["Department of Computer Science & Engineering, Pondicherry Technological University, Pillaichavadi, Puducherry, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, Pondicherry Technological University, Pillaichavadi, Puducherry, India","institution_ids":["https://openalex.org/I175691731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008863556"],"corresponding_institution_ids":["https://openalex.org/I175691731"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15477966,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"3","first_page":"1741","last_page":"1762"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7516977787017822},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5865258574485779},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4253145456314087},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30122652649879456}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7516977787017822},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5865258574485779},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4253145456314087},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30122652649879456}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/idt-240476","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-240476","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2145356049","https://openalex.org/W2585392941","https://openalex.org/W2604884785","https://openalex.org/W2754269241","https://openalex.org/W2901333864","https://openalex.org/W2904959125","https://openalex.org/W2918518732","https://openalex.org/W2942441318","https://openalex.org/W2945622591","https://openalex.org/W2952821154","https://openalex.org/W2990603658","https://openalex.org/W2994779073","https://openalex.org/W2995544081","https://openalex.org/W3017236471","https://openalex.org/W3030523928","https://openalex.org/W3093971349","https://openalex.org/W3105416451","https://openalex.org/W3128033608","https://openalex.org/W3133156249","https://openalex.org/W3133564241","https://openalex.org/W3159551017","https://openalex.org/W3162318599","https://openalex.org/W3196661916","https://openalex.org/W3206891657","https://openalex.org/W3207353561","https://openalex.org/W3214846261","https://openalex.org/W4206571941","https://openalex.org/W4293109491","https://openalex.org/W4293778742","https://openalex.org/W4294763000","https://openalex.org/W4303578926","https://openalex.org/W4309344204","https://openalex.org/W4311008682","https://openalex.org/W4312938911"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"A":[0],"secured":[1,46,281],"IoT":[2,47,82,282],"routing":[3,48,66,161,190,235,283],"model":[4,143,217,236],"against":[5],"different":[6,148,201,285],"attacks":[7,13,23,149,279],"has":[8,276],"been":[9],"implemented":[10],"to":[11,57,91,133,146,222],"detect":[12,147],"like":[14,27,252],"replay":[15],"attacks,":[16,18],"version":[17],"and":[19,33,183,185,244,256,273,284],"rank":[20],"attacks.":[21],"These":[22],"cause":[24],"certain":[25,174],"issues":[26],"energy":[28],"depletion,":[29],"minimized":[30],"packet":[31],"delivery,":[32],"loop":[34],"creation.":[35],"By":[36],"mitigating":[37],"these":[38],"issues,":[39],"an":[40,59],"advanced":[41],"attack":[42,61,103,155,215,286],"detection":[43,62,152,216],"approach":[44,101,265],"for":[45,102],"techniques":[49,251],"with":[50,78,114,200],"a":[51],"deep":[52],"structured":[53],"scheme":[54],"is":[55,76,131,144,218,240,266],"promoted":[56],"attain":[58],"efficient":[60,247],"rate":[63],"over":[64],"the":[65,69,72,79,85,92,107,110,115,128,135,138,141,151,160,164,169,189,193,198,205,209,213,230,234,249,260,263,270],"network.":[67],"In":[68],"starting":[70],"stage,":[71],"aggregation":[73],"of":[74,81,117,127,137,207,212,233,262],"data":[75],"done":[77],"help":[80],"networks.":[83],"Then,":[84],"selected":[86],"weighted":[87],"features":[88],"are":[89,112,157,195],"subjected":[90],"Multiscale":[93],"Depthwise":[94],"Separable":[95],"1-Dimensional":[96],"Convolutional":[97],"Neural":[98],"Networks":[99],"(MDS-1DCNN)":[100],"detection,":[104],"in":[105,109,150,188],"which":[106,220],"parameters":[108],"1-DCNN":[111],"tuned":[113],"aid":[116],"Fused":[118],"Grasshopper-aided":[119],"Lemur":[120],"Optimization":[121],"Algorithm":[122],"(FG-LOA).":[123],"The":[124,154],"parameter":[125],"optimization":[126],"FG-LOA":[129,166,239],"algorithm":[130],"used":[132,145],"enlarge":[134],"efficacy":[136],"approach.":[139],"Especially,":[140],"MDS-1DCNN":[142],"phase.":[153],"nodes":[156],"mitigated":[158,277],"during":[159],"process":[162],"using":[163,280],"developed":[165,214],"by":[167],"formulating":[168],"fitness":[170],"function":[171],"based":[172,237],"on":[173,187,238],"variables":[175],"such":[176],"as":[177],"shortest":[178],"distance,":[179],"energy,":[180],"path":[181],"loss":[182],"delay,":[184],"so":[186],"process.":[191],"Finally,":[192],"performances":[194],"examined":[196],"through":[197],"comparison":[199],"traditional":[202],"methods.":[203],"From":[204],"validation":[206],"outcomes,":[208],"accuracy":[210],"value":[211],"96.87%,":[219],"seems":[221],"be":[223],"better":[224],"than":[225,248,269],"other":[226],"comparative":[227],"techniques.":[228],"Also,":[229],"delay":[231],"analysis":[232],"17.3%,":[241],"12.24%,":[242],"10.41%,":[243],"15.68%":[245],"more":[246,267],"classical":[250],"DHOA,":[253],"HBA,":[254],"GOA,":[255],"LOA,":[257],"respectively.":[258],"Hence,":[259],"effectualness":[261],"offered":[264],"enriched":[268],"baseline":[271],"approaches":[272],"also":[274],"it":[275],"diverse":[278],"models.":[287]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
