Volume 13, Issue 1 (3-2021)                   itrc 2021, 13(1): 32-39 | Back to browse issues page

XML Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Rezaei F, Afshar Kazemi M A, Keramati M A. Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm . itrc 2021; 13 (1) :32-39
URL: http://journal.itrc.ac.ir/article-1-477-en.html
1- Department of Information Technology Management Central Tehran Branch, Islamic Azad University Tehran, Iran
2- Department of Industrial Management Central Tehran Branch, Islamic Azad University Tehran, Iran
3- Department of Industrial Management Central Tehran Branch, Islamic Azad University Tehran, Iran , m-Keramati@iau-arak.ac.ir
Abstract:   (2042 Views)
Detection of attacks and anomalies is one of the new challenges in promoting e-commerce technologies. Detecting anomalies of a network and the process of detecting destructive activities in e-commerce can be executed by analyzing the behavior of network traffic. Data mining systems/techniques are used extensively in intrusion detection systems (IDS) in order to detect anomalies. Reducing the size/dimensions of features plays an important role in intrusion detection since detecting anomalies, which are features of network traffic with high dimensions, is a time-consuming process. Choosing suitable and accurate features influences the speed of the proposed task/work analysis, resulting in an improved speed of detection. The present papers utilize a neural network for deep learning to detect e-commerce attacks and anomalies of e-commerce systems. Overfitting is a common event in multi-layer neural networks. In this paper, features are reduced by the firefly algorithm (FA) to avoid this effect. Simulation results illustrate that a neural network system performs with high accuracy using feature reduction. Ultimately, the neural network structure is optimized by using particle swarm optimization (PSO) to increase the accuracy of attack detection capability.
 
Full-Text [PDF 851 kb]   (817 Downloads)    
Type of Study: Research | Subject: Network

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.