Customer & Sales Support
Our executive will get in touch with you.
In fact, as more devices share data over the internet, this data becomes exposed to cyberattacks, which are becoming increasingly frequent and sophisticated. Three types of attacks currently seen as the greatest threats to IoT devices are denial-of-service (DoS), man-in-the-middle and SQL attacks.
Aware of the risks associated with the continuous increase in IoT devices, a team of researchers at Glasgow Caledonian University and COMSATS University in Pakistan have recently developed a new scheme that could help to protect sensitive information shared over the internet. This intrusion detection scheme, outlined in a paper presented at IEEE's 2019 China … es (UCET) conference, is based on an artificial bee colony (ABC) algorithm and a random neural network (RNN). An ABC algorithm is an swarm intelligence optimization technique widely used in artificial intelligence (AI) research, which simulates the foraging behavior of honey bees to tackle practical and computational problems. A random neural network (RNN), on the other hand, is a class of a machine-learning models inspired by the behavior of biological neural networks in the human brain.
"In this paper, an anomaly-based intrusion detection scheme is proposed that can protect sensitive information and detect novel cyber-attacks," the researchers wrote in their paper. "The artificial bee colony (ABC) algorithm is used to train the random neural network (RNN) based system (RNN-ABC)". The researchers trained their intrusion detection RNN-ABC scheme on the NSL-KDD Train+ dataset. NSL-KDD is a dataset used to train algorithms to detect cyberattacks, which contains a vast amount of internet traffic record data.
After training their RNN-ABC model on internet traffic data, the researchers carried out a series of tests to evaluate its performance in identifying and classifying cyberattacks. Their findings are highly promising, as their scheme was able to classify new attacks with a remarkable accuracy of 91.65 percent. In addition, the team compared the new model with an existing intrusion detection system based on a hybrid multilayer perceptron (MLP), a type of artificial neural network (ANN) trained using a supervised learning technique known as backpropagation. Remarkably, they found that the RNN-ABC scheme significantly outperformed the MLP technique, as it generalized better across new data.
Get tailored solutions to support security operations across the digital enterprise, while monitoring and responding to the evolving threat landscape.
Deploy a variety of identity solutions, from provisioning and access governance to strong authentication and public key infrastructure.
Protect critical data and meet constantly increasing privacy requirements such as the General Data Protection Regulation (GDPR).
Meet unique security requirements through design, installation and integration of perimeter, network, endpoint and advanced threat-protection solutions.
Amazon Web Services (AWS) began offering IT infrastructure services to businesses in the form of web services -- now Intrisus and AWS commonly known as cloud computing partners. One of the key benefits of this partnership is to replace up-front capital infrastructure expenses with low variable costs that scale with your business.
Intrisus Labs and Cisco Webex products provide core collaboration capabilities, including video meetings, team messaging and file sharing. The suite is considered a leading collaboration platform in the unified communications and is geared toward small group collaboration as well as enterprise-wide deployments.
HPE is a global, edge-to-cloud Platform-as-a-Service company built to transform your business. How? By helping you connect, protect, analyze, and act on all your data and applications wherever they live, from edge to cloud, so you can turn insights into outcomes at the speed required to thrive in today’s complex world.
Intrisus corporation is the exclusive partner for APAC for Fireeye. FireEye is a publicly traded cybersecurity company headquartered in Milpitas, California.It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.
Sophos evolves to meet every new challenge, protecting nearly 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyber threats. We now bring that same always-evolving belief to home users. At Sophos, we want to make sure the same level of protection we provide businesses is available to everyone.