Effective gorilla troops optimization-based hierarchical clustering with HOP field neural network for intrusion detection
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.23Keywords:
Intrusion detection, Gorilla troops optimization, Hierarchical clustering, Hopfield neural network, Cybersecurity.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
An intrusion detection system (IDS) armed with signature and attack pattern databases as reference tools are used to protect computer networks from intrusion. This article provides a hybrid machine learning algorithm for gorilla troops optimization (GTO) integrating hierarchical clustering and Hopfield neural network. In this paper, the authors present a model to improve intrusion detection accuracy and contain high operational flexibility of these techniques. It is inspired by social behavior in gorillas and optimizes the clustering process HNN. Experimental results show that the proposed approach enhances the traditional methods in intrusion detection for a variety of intrusions and it presents an effective solution that can help cybersecurity application development better.Abstract
How to Cite
Downloads
Similar Articles
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Mohamed Azharudheen A, Vijayalakshmi V, Improvement of data analysis and protection using novel privacy-preserving methods for big data application , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Josephine Theresa S, Graph Neural Network Ensemble with Particle Swarm Optimization for Privacy-Preserving Thermal Comfort Prediction , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- R. Sridevi, V. S. J. Prakash, Load aware active low energy adaptive clustering hierarchy for IoT-WSN , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- A. Jafar Ali, G. Ravi, D.I. George Amalarethinam, AI-Integrated Swarm-Powered Self-Scheduling Routing for Heterogeneous Wireless Sensor Networks to Maximize Network Lifetime , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- G. Hemamalini, V. Maniraj, Enhanced otpmization based support vector machine classification approach for the detection of knee arthritis , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- C. Premila Rosy, Clustering of cancer text documents in the medical field using machine learning heuristics , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- Y. Mohammed Iqbal, M. Mohamed Surputheen, S. Peerbasha, Swarm intelligence-driven HC2NN model for optimized COVID-19 detection using lung imaging , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Pallavi M. Shimpi, Nitin N. Pise, Comparative Analysis of Machine Learning Algorithms for Malware Detection in Android Ecosystems , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- N. Anbarasi, K. Anitha, S. Hemalatha, A study on energy sum of dominating sets in East Indian states , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- V. Seethala Devi, N. Vanjulavalli, K. Sujith, R. Surendiran, A metaheuristic optimisation algorithm-based optimal feature subset strategy that enhances the machine learning algorithm’s classifier performance , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Chaotic-based optimization, based feature selection with shallow neural network technique for effective identification of intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper

