• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Deep Learning Based Optimal Multimodal Fusion Framework for Intrusion Detection Systems for Healthcare Data

    2021-12-16 06:38:58PhongThanhNguyenVyDangBichHuynhKhoaDangVoPhuongThanhPhanMohamedElhosenyandDacNhuongLe
    Computers Materials&Continua 2021年3期

    Phong Thanh Nguyen,Vy Dang Bich Huynh,Khoa Dang Vo,Phuong Thanh Phan,Mohamed Elhoseny and Dac-Nhuong Le

    1Department of Project Management, Ho Chi Minh City Open University,Ho Chi Minh City, 700000,Vietnam

    2Department of Learning Material, Ho Chi Minh City Open University,Ho Chi Minh City, 700000,Vietnam

    3Faculty of Computers and Information, Mansoura University, Dakahlia Governorate, 35516,Egypt

    4Institute of Research and Development, Duy Tan University, Danang, 550000, Vietnam

    5Faculty of Information Technology, Duy Tan University, Danang, 550000,Vietnam

    Abstract: Data fusion is a multidisciplinary research area that involves different domains.It is used to attain minimum detection error probability and maximum reliability with the help of data retrieved from multiple healthcare sources.The generation of huge quantity of data from medical devices resulted in the formation of big data during which data fusion techniques become essential.Securing medical data is a crucial issue of exponentially-pacing computing world and can be achieved by Intrusion Detection Systems (IDS).In this regard, since singularmodality is not adequate to attain high detection rate, there is a need exists to merge diverse techniques using decision-based multimodal fusion process.In this view, this research article presents a new multimodal fusion-based IDS to secure the healthcare data using Spark.The proposed model involves decision-based fusion model which has different processes such as initialization, pre-processing,Feature Selection(FS)and multimodal classification for effective detection of intrusions.In FS process,a chaotic Butterfly Optimization(BO)algorithm called CBOA is introduced.Though the classic BO algorithm offers effective exploration,it fails in achieving faster convergence.In order to overcome this,i.e.,to improve the convergence rate,this research work modifies the required parameters of BO algorithm using chaos theory.Finally,to detect intrusions,multimodal classifier is applied by incorporating three Deep Learning (DL)-based classification models.Besides, the concepts like Hadoop MapReduce and Spark were also utilized in this study to achieve faster computation of big data in parallel computation platform.To validate the outcome of the presented model, a series of experimentations was performed using the benchmark NSLKDDCup99 Dataset repository.The proposed model demonstrated its effective results on the applied dataset by offering the maximum accuracy of 99.21%,precision of 98.93%and detection rate of 99.59%.The results assured the betterment of the proposed model.

    Keywords: Big data;data fusion;deep learning;intrusion detection;bio-inspired algorithm;spark

    1 Introduction

    Internet of Things (IoT), embedded devices, sensors, mobile applications, patient records and online sources are some of the complicated data sources for decision support in the healthcare industry.The data supported by medical devices significantly support the earlier identification of diseases and respective medication.The term ‘Big Data’ is generally used to denote diverse data types of homogeneous size,from heterogeneous source, which have been stacked on memory devices and can be calculated in petabytes as well as zeta-bytes [1].The application of security in big data is one of the complex tasks to be achieved in the past few decades and there is a drastic increase in the data size during recent times.Further, huge volumes of data are produced from heterogeneous sources which arrive in various formats like structured, semi-structured as well as unstructured that tend to degrade the commodity hardware.The security in big data is comprised of protecting the data produced, structure security, data accessibility,user authorization and communication integrity.In order to resolve these problems, IDS is applied.Here,it is assumed with two significant factors of big data.Fig.1 shows the general fusion framework of network intrusion detection model.

    Figure 1: General fusion framework of IDS model

    Network IDS (NIDS) is defined as the new production of network security by applying conventional security parameters like firewall and data encryption [2] in a rapid manner.These security metrics are capable of preventing attacks and malicious events named as second line of defense on internet.But, due to big data management in recent times, dense quantity of data makes the NIDS undergo crucial issues.Initially, massive high-dimensional data improves the difficulty and demands more amount of processing as well as memory storage [3].Then iterations of repeated and unwanted data affect the network security prediction adversely.Finally, few attacks are very complex to predict due to the presence of big data and analysis.The inherent vulnerabilities of NIDS enhance the immediate request on productive solutions.Data Fusion (DF) is one of the challenging models in big data which is used in the application of NIDS to resolve the predefined complications in the last few decades.

    DF method was developed by US Department of Defence, initially presented by Joint Directors of Laboratories (JDL).The DF method depends upon national defence supervision system [4].Consecutively, this method was modelled and implemented in alternate domains like automated management,image prediction,target forecasting,and cyber security while other developers have presented description of DF centric studies and works [5].DF method is primarily used at three stages in terms of processing the fusion.In general, three major stages exist namely data, feature, and decision.Various fusion models are utilized in diverse levels to enhance the entire function of data processing [6].Every detection process is performed using the fundamental prediction under different stages such as preprocessing, feature reduction, as well as identification to deploy primary inferences on the monitored objectives.Followed by, these inferences are combined into extensive and correct decision making by applying decision fusion modules.

    In the domain of NIDS, DF mainly concentrates on feature layer and decision layer.It is due to networking data that has to be fused with public datasets which are combined earlier at data layer itself[7].The application of DF approach, at feature level, heavily decreases the size of data processing and increases the effectiveness of NIDSs.On the other hand, the refined data produced by feature fusion supports the decision making and enhances the robust nature as well as accuracy of the system.Since the DF model should be applied at decision level, the decision fusion center merges all the decisions arrived from several local detectors to achieve maximum accuracy and stable identifications of network characteristics [8-10].

    Recently, the DL models become popular and finds useful among several applications like image processing, speech recognition, object detection, etc.The DL models are commonly employed due to its inherent characteristics.The DL model has the ability of executing the feature engineering on its own.The DL model scans the data for searching the features which correlates and combines them enable faster learning without being explicitly.In the recent times, various studies were conducted on DF for IDS to extend the function of NIDS [11].Therefore, it identifies open dataset, number of simulation data instances, and fusion models which are applied in several domains.It is challenging to learn and examine the robustness and weaknesses of diverse fusion approaches.Also, it is mandatory to imply uniform criteria to estimate a greater number of references and provide the performance statistics of the recent study.Since it is simple to learn the features of recent DF approaches, the developers apply it in massive range.Fig.2 shows the Apache Spark components.

    Figure 2: Apache spark components

    This paper presents a new multimodal fusion-based IDS for secure big data platform using Spark.The proposed IDS model mainly focuses on effective FS and classification process.To extract the effective set of features,Chaotic Butterfly Optimization(CBO)algorithm is introduced in this study followed by multimodal classification process.Since singular-modality is inadequate to attain higher detection rate, the diverse techniques need to be merged using decision-based multimodal fusion process.In this case, a set of three DL-based classifier models namely Convolutional Neural Network (CNN), Long Short-Term Memory(LSTM) and Gated Recurrent Unit (GRU) was used.Besides, Hadoop MapReduce and Spark were utilized in this study to accomplish rapid computation of big data in parallel computational platform.

    The remaining sections of the study are arranged as follows.Section 2 briefs the works related to the study.Section 3 explains the proposed model and Section 4 validates the performance of the proposed model.Finally,Section 5 concludes the work.

    2 Related Works

    DF model is applied in a wide range of applications namely automated control,image analysis, target detection and IDS.In the study conducted Cao et al.[12], a free automation control system was proposed on the basis of DF using smart building.These layers are used in smart home to attain exact free alarm as well as free integrity.Zhang et al.[13] presented a DF-relied smart home controlling system.The projected smart home controlling system is composed of internet access, data acquisition, internal network service module along with Bluetooth connection, Data Fusion (DF) controller which applies Fuzzy Logic(FL),Fuzzy Neural Network (FNN),and incorporated system in home appliances.

    In the literature [14], a DF model was applied to extract the features and find the missile target.According to D-S evidence reasoning, the developers analyze missile targets, jamming light on region square feature, clutter and free stack on position features, correspondingly.The possibility of identification gets higher with a combination of three sensors along with D-S evidence.The results showed improvement when compared with the approach in which only one sensor was applied.Hu et al.[15] used DF fuzzy theory to deploy an alarming system on the basis of Wireless Sensor Network(WSN).These systems are capable of providing detection accuracy; however, it enhances the intelligence of observing.The newly deployed model performed well using a sensor, when compared with conventional diagnostic approaches.

    Yan et al.[16]utilized DF in reputation production and projected an opinion fusion as well as mining.These opinions were integrated and categorized as main opinion in a set which has same attitudes.Liu et al.[17] reviewed four studies to understand the application of DF in Internet of Things (IoT).When massive WSN is applied, IoT produces dense volume of maximum, multi-sourced and dynamic data.In this case,it is evident that DF is a major device that can be used to process and control the data with the purpose of enhancing the efficiency of advanced intelligence.A DF approach for IDS was proposed in the literature [18], on the basis of clustering.It was also applied with centralized technique for the purpose of DF from diverse analyzers that help in decision making process.The key objective of the presented model is based on accuracy to fuse data collected from various detection systems and applicability-toscalability.Also, the DF has been considered with respect to efficiency of every analyzer in DF process which detects the future network attacks.

    DF model is composed of two major classes for feature fusion in NIDS namely filters and wrappers[19].Here,the filters are used by statistical models,information theory,and searching approaches[20].ML model is applied by the wrapper to estimate and combine features so as to find the optimal subset.These models depend upon two portions: Feature search as well as evaluation algorithms.The wrapper models were applied in previous study [21] to produce optimal feature subset which incurs high cost and memory space when compared with filter.

    The filters as well as wrappers are two integrated complementary modes.Usually, a hybrid model is constrained with two phases.In the beginning, the filter method is applied to get rid of the irrelevant features by leaving some vital features.This resulted in limiting the size of data processing.Later, the residual feature represents the actual data which is employed as input parameter to transfer into wrapper for future optimization of significant features.Therefore, the decision fusion technologies are classified as two classes: winner-take-all and weighted sum, by assuming the combination of decisions derived from fundamental classification models [22].In weighted sum, the weight of every basic classifier is based on corresponding abilities.The weights of basic classification are estimated and simulation outcome with weights are combined to provide final decision.Hence, the weighted sum is composed of both average as well as Neural Network (NN) [23-30].

    3 The Proposed Model

    The overall process of the proposed model is illustrated in Fig.3.Hadoop MapReduce and Spark were utilized in this study to achieve faster computation of big data in parallel computational platform.The projected approach involves a set of processes namely initialization, pre-processing, FS and multimodal classification for effective detection of intrusions.Once the data was initialized and pre-processed,CBOA-based FS process was performed to select the optimal set of features.Followed by, DL-based multimodal data classification was conducted to detect intrusions.

    Figure 3: Block diagram of the proposed model

    3.1 Initialization Process

    In the beginning,the architecture of the system is validated,when the extended systems are capable of supporting parallel processing of dense dataset.During initial stage,NetBeans is initialized on JDK8.0 and the essential libraries are acquired to NetBeans.Then, Hadoop is applied which tends to employ Yarn,MapReduce and HDFS.After which, this is initialized with Apache Spark in the similar cluster with Hadoop MapReduce.These modules are implemented in recent decade that again initiates parallel processing.At last,the initializing stage gets completed with the import of NSL KDD dataset to NetBeans.

    Hadoop MapReduce:Hadoop is named as ‘Big Data Handler’ since the system is mainly used to control huge volumes of data generated.Hadoop 2.6.0 was used in this research for model implementation.The Hadoop is utilized through various methods like Hadoop Distributed File System(HDFS), MapReduce, HBase, Hive, Pig and so on.For Hadoop, YARN manages the related resources and job scheduling operation.For specific situations, the data is required adversely that gets saved in HDFS.Hadoop is capable of saving data in peta-bytes and zetabytes without any limited storage.At the same time, when applied with MapReduce, it offers rapid processing.MapReduce is defined as batchcentric programming approach in Hadoop which performs data management and job scheduling.MapReduce divides the data into autonomous chunks which are computed wholly by mapping functions tasks in parallel manner.

    Apache Spark:Spark is referred as a BDS deployed on Hadoop and implemented on Hadoop Yarn.Here, it is employed with Apache Spark version 2.1.0.Spark could be a standalone with MapReduce and HDFS.The units of Spark are SQL, Streaming and MLlib (Machine Learning library).Some of the classification models in Apache Spark are still applied.Hadoop clusters run on interactive query,streaming data,and Apache Spark.

    Spark RDD:It supports a systematic method that is identical to MapReduce; but expands with‘Resilient Distributed Dataset’s (RDD) which is a data-sharing abstraction.With the application of these abstractions, the Spark is capable of capturing a wider processing overhead that requires unique engines such as streaming,Machine Learning(ML), SQL,and graph computation.

    3.2 Data Pre-Processing

    NSL KDD cup dataset has been processed earlier itself since it is applied for IDS and has been updated by removing repeated measures in training set as well as without any duplicate records in test set.Therefore,it is processed in this study to attain a dataset with robust processing,absence of repetitive values,and lack of values in a column.It is pre-processed again by applying Parse-labelled-point.In MLlib,the labelled points are employed in supervised learning models.Also,it employs a double to store the label,thus the labelled points could be utilized in regression as well as classification.Spark.ml package offers ML whereas API developed the data frame which becomes the main portion of Spark SQL library.

    3.3 Feature Selection Process

    3.3.1 BOA

    Butterfly Optimization Algorithm(BOA)is a novel,speed optimizing model with minimum processing complexity and optimal resolving convergence.This method was developed on the basis of food exploring behavior of butterfly.Butterflies are types of insects with various capabilities like hearing,smelling,and taste.These capabilities help the species find applicable nectar,partner mating,and egg laying in adoptable place and escape from attackers.The study shows that the smelling nature of butterflies is a vital feature in identifying the food in faraway distance.Butterflies search food by chemoreceptors.It is capable of sensing and placing diverse aromas inside an optimal precise.The population in BOA is defined by a set of butterflies as “searching agents”.The expense of an objective function in BOA differs on the basis of butterflies’ place.BOA is defined as Swarm Optimization Algorithm (SOA) in which all the agents share the knowledge by alternate butterflies on the basis of fragrance distance.Under the sensation of a fragrance, it migrates through the phase of global searching point.The procedure involved in the BO algorithm is provided in Algorithm 1.

    Fragrance:Fragrance in BOA,is classified into three parts:Power exponent(a),Sensory modality(c),Stimulus intensity (I).Power is an exponent used for selecting important density which leads to linear response, regular, and response compression.Alternatively, sensory is defined as the form of energy whereas the modality defines the applied input by sensors.The substances of butterflies are developed by two vital cases:difference of fragrance (f)and stimulus intensity (I).It is expressed as given below.

    where, and βc are in a range[0,1].

    Movement of butterflies:It is composed with three major phases,such as Initialization,Searching,and Finalizing.Here,the algorithm metrics are fixed.Once the parameters are fixed,the optimization process is initiated.The primary location of a butterfly can be generated in random manner from solution space.After the initiation of the iteration,the artificial butterflies,present in a search space,migrate to the new place and reach the cost values.Then,butterflies produce a fragrance in the same location as given below

    where,g*shows the best solution for iteration t,defines the solution vector xifor ithbutterfly,fragrance of ithbutterfly is mentioned by and fiand r depict random constant from (0,1).

    The BOA parameters, along with partner mating as well as food exploration of butterflies, could be executed in global and local scales.

    The local search in this model can be attained as provided below:

    3.3.2 Chaotic Butterfly Optimization (CBO) Algorithm

    BOA model has achieved better outcome in searching the best measures which has few restrictions in the convergence.In this study,a novel approach is projected to change the required metrics of BOA in terms of convergence speed.In order to resolve these issues, the vector of major parameters for BOA, is given by V = [a,c,r] that depends upon chaos theory.Chaos science is referred as the learning task which is about random and unpredictable task.It is highly used in maximum sensation that gets affected by minimum adjustments.The feature produces the points with greater distribution as well as resolves the complexity to enhance the points’distribution.A common format for chaos theory is represented by:

    where,l shows the map dimension,andimplies a chaotic model generator.Here,logistic mapping can be applied as,

    where,k denotes the iteration value, a0,c0,r0∈[0,1 ]is the initial arbitrary measure,and ρ defines a control parameter in the interval of ρ ∈[0 ,1]-[0.25,0.5,0.75].It is pointed that ρ=4 during which the function might be in a chaos state.Fig.4 demonstrates the flowchart for the proposed optimization algorithm.

    3.3.3 CBO-Based Feature Selection Process

    Feature Selection(FS)is defined as a binary optimization issue where the searching agents are confined with binary{0,1}values.Here,all the solutions undergo characterization as 1D vector with length of vector based on the value attributes in dataset.Each cell of a vector contains two values, (1 or 0), where value 1 shows the adjacent attribute as selected while 0 indicates the attribute to be non-selected.FS issue could be assumed as a multi-objective optimization issue where two contrast goals to be attained;selection of low number of features as well as higher classification accuracy.To resolve multi-objective issue, two binary optimization models are presented.In FS issue, the solution is named as the optimal one when it is composed of a smaller number of features along with maximum classification accuracy.

    Figure 4: Flowchart of CBO algorithm

    The intention is to find a balance among number of attributes as well as classification accuracy;Fitness Function(FF) in Eq.(10)is used in optimization models to estimate these solutions.

    where ΥR(D )refers a classification error rate.Therefore,|R|is a cardinality of selected feature subset while| N|shows the overall features in actual dataset,α and β are two parameters to the significance of classifying quality and subset length, α ∈ [0, 1]and β = (1 -α) applied in the study.

    3.4 Classification Process

    The CNN,LSTM and GRU process the essential classification in the pre-processed as well as the dataset chosen by classification phase,according to the training principles used.The attained results are induced as input for the next iteration.Usually,the input is classified as attack and not-attack.By analysing the input and output traffic,it computes the DoS attack.

    3.4.1 CNN Model

    CNN is a typically-applied ANN method[31].It belongs to the class of deep,feed-forward ANN which is used in examining visual imagery.Also, it is familiar feature extraction as well as time-series data classification.CNN is identical to Multilayer Perceptron (MLP).It enables CNN to have translational as well as rotational invariance that tend to structure a method.Generally, the CNN is comprised of more than one convolutional layer and fully connected(FC) layer such as weights and pooling layers.

    Convolutional layer:A dot product of every sub-region of input data with a kernel is included by a bias through an activation function to generate a feature map for consecutive layer.When the beat undergoes a sampling, the data input vector iswhere ‘n’ implies the number of samples for each beat and resultant values are determined on the basis of Eq.(9).

    Here,l shows a layer index;h implies an activation function that is used to establish a non-linearity to layer;b represents the bias term for jth feature map;M indicates a kernel size, andis a weight.

    Max-pooling layer:This layer is defined as a sub-sampling layer.It applies convolutional layer and performs down-sampling task to minimize the size of a feature.It is employed with tiny rectangular blocks of data and generates a single output for all blocks.Here, a Maxpooling task is applied to estimate the maximum value.The pooling of a feature map from a layer is provided as given in Eq.(10).

    Here, R shows the size of pooling window and T implies a pooling stride.

    3.4.2 LSTM Model

    LSTM is defined as time Recurrent Neural Network(RNN)[32].It is composed of a cell,an input gate,an output gate,and a forget gate.The unit has the values at diverse time intervals whereas three gates are used in data flow management.The forget gate can be managed using a simple 1-layer NN.The activation of a gate is estimated by applying Eq.(11).

    Here,xtdenotes an input sequence;ht-1shows the existing block output;Ct-1implies traditional LSTM block memory; bfdepicts a bias vector; W is a separate weight,and a logistic sigmoid function.

    The input gate contains novel memory developed by easy NN along with tanh activation function and existing memory block effect.Such task is evaluated by Eqs.(12) and(13).

    The resultant gate is comprised with result of recent LSTM block.It is determined by applying Eqs.(14)and (15).

    3.4.3 GRU Model

    The Gated Recurrent Unit (GRU) is an alternate model [33] of gate-relied recurrent unit that contains minimum structure and similar operation of LSTM unit.GRU has two gates: Reset and update.r(t)and z(t)are the measures of reset and update gates at time step t, correspondingly.xi∈Rnshows 1D input vector to GRU block at time step t.?h(t )represents the output candidate of GRU block.h(t-1)defines the recurrent GRU block output of time step t-1 and the present output at time t is h(t).These functions are estimated in the following equations.

    where Wz,Wr,and W are feedforward weights and Uz,Ur,and U are RNN weights of update gate,reset gate,and output candidate activation.bz, brand b are biases of these gates and output candidate activationcorrespondingly.

    3.5 Multimodal Fusion Process

    Here,the decision-based fusion is used on inputs obtained from existing phase.It is employed with big data;an effective and accurate classification is required to perform rapid processing and provide exact results with low false alarm rate and greater value for detection value.Thus, rather to combine every classifier, it concatenates CNN, LSTM and GRU.The results from classification phase are two classes such as attack and not-attack respectively.

    4 Performance Validation

    The proposed model was executed in Windows10 platform on a 64-bit OS and a system with configuration of i7 processor with 6 GB RAM.The simulation was carried out using NetBeans 8.2 to execute all the applications like Hadoop MapReduce task, and Spark (RDD).A detailed set of experiments was conducted using NSLKDDCup99 Dataset.The applied dataset and simulation outcome of the presented technique are explained in the upcoming section.

    4.1 Dataset Description

    NSLKDDCup99 Dataset [20]is a current model of the older KDD Cup 99dataset.It has no repetitive instances in training and testing datasets.Obviously,it is a minimized version of the KDD cup 99 dataset and comprises of a set of 1,25,973 instances in the training set and 22,544 records in the testing set,along with a set of 41 features.It is the current version of KDD Cup 99 dataset that is applied to work on IDS.Tab.1 tabulates the details of the applied dataset.The attacks and normal instances exist in the NSL KDD 99 dataset are shown in the Fig.5.Then, different kinds of attacks that exist in the NSL KDD dataset with their patterns are shown in Fig.6.For experimentation, 10 fold cross validation process is applied to split the applied dataset into training and testing parts.

    Table 1: Dataset description

    Figure 5: Types of attacks in NSLKDDCup99 dataset

    Figure 6: Types of attack patterns in NSLKDDCup99 dataset

    4.2 Results Analysis

    Tab.2 and Fig.7 examine the FS results of diverse models on the applied dataset in terms of best cost and chosen features.The table values indicate that the PSO-FS algorithm achieved ineffective FS results by attaining the maximum best cost of 0.009139.At the same time, the results also indicate that the GA-FS technique exhibited slightly better FS outcome over PSO-FS algorithm by offering a slightly lower best cost of 0.008150.In the same way, the BGOA-FS algorithm achieved near optimal results with the best cost of 0.006530.At last,the proposed model outperformed with best optimal FS results with the selection of 21 features and best cost of 0.002345.

    Table 2: Result analysis of existing FS with proposed CBOA FS method for applied dataset

    Figure 7: Best cost analysis of diverse FS models

    Tab.3 and Fig.8 show the multimodal classifier results of the analysis in terms of different measures under the absence and presence of FS process.

    Table 3: Result analysis of the proposed method in terms of accuracy,precision and detection rate

    The table values pointed out that CNN is the least performer since it attained minimal results over other compared methods.At the same time,the LSTM model generated slightly better classification outcome over CNN, but not superior than GRU and fused classifier.In line with this, the GRU model resulted in a manageable outcome over other models.However, the proposed fused classifier, without FS itself,outperformed the compared methods with FS.In addition,the fused classifier with FS process was observed to have achieved an optimal accuracy of 99.21%,precision of 98.93%and detection rate of 99.59%.

    Figure 8: Multimodal fusion results analysis

    Tab.4 provides a detailed comparison of the results attained by the proposed model with a set of existing methods [21]namely SVM, GBT,DT, RF,LR and SVM+ GBT+DT +RF +LR models.

    Table 4: Result analysis of the proposed method with existing methods in terms of accuracy,precision and detection rate

    Fig.9 showcases the effectiveness of the proposed model in terms of accuracy with and without FS process.The figure portrays that the SVM model failed to yield better results with the least accuracy value of 83.38%, which then got improved to 90.58% when using FS process.Besides, the GBT and DT models attained slightly higher and near-identical results with their accuracy values being 88.79% and 88.68% respectively.This also got increased to 90.36% and 91.04% respectively when utilizing FS process.At the same time, RF, LR and SVM + GBT + DT + RF + LR models attempted their best to attain manageable results with the accuracy values of 90.69%,90.37% and 89.95% respectively.This also got improved to 89.39%, 90.13% and 92.30% correspondingly when using FS process.Followed by, the CNN model attained slightly lower accuracy value of 87.29% which further got significantly increased to 96.25% with the induction of FS process.The LSTM model reached higher accuracy value of 89.94%without FS and 97.06% when using FS process.Moreover, it can be noticed that the GRU model produced competitive results with accuracy values of 93.88% and 97.47% respectively with and without FS processes.However, the proposed model attained the best results compared to other methods by yielding the maximum accuracy of 95.55%, which got further increased to 99.21% when FS process was included.

    Figure 9: Accuracy analysis of diverse models

    Fig.10 examines the efficiency of the proposed method with respect to precision with and without FS tasks.The figure states that the SVM model failed to produce good results with 85.90%minimum precision value which then got enhanced to 91.60%when FS process was applied.On the other hand,both CNN and DT model reached slightly better and closer identical results with the precision values of 89.17%and 97.36%respectively.When FS process was applied,these values also got improved to 90%and 91.90%respectively.Simultaneously,GBT,RF and SVM+GBT+DT+RF+LR models attempted to reach appreciable outcome with precision values of 90.20%, 90.90% and 91.20% which then got improved to 91.40%, 90.70% and 92.80% correspondingly by the employment of FS process.The LR model accomplished slightly lower precision value of 91.50% which got significantly increased to 91.30% when FS process was deployed.The LSTM model attained uniform higher precision value of 91.93% without FS and 98.04% with FS process.Furthermore,it is evident that the GRU model achieved competitive results with 95.61% with FS process and 98.41% without FS process.But the presented system attained qualified results compared to other methods by achieving a higher precision of 96.88% which got further improved to 98.93% when FS process was added.

    Figure 10: Precision analysis of diverse models

    Fig.11 analyzes the efficiency of the proposed model by means of detection rate with and without FS processes.The figure shows that the CNN model was not at all capable of providing better results with lower detection rate i.e.,87.32%though it got increased to 95.70%when FS task was applied.Meanwhile,LSTM and GRU models achieved detection rates of 89.54% and 94.90% respectively which got improved to 93.12% and 96.91% when employing FS model.Similarly, in the proposed system, LR and SVM models tried to reach acceptable results with detection rate values of 94.90%, 95.78% and 98.02%, which got further enhanced to 99.59%, 99.29% and 99.26% respectively by the exploitation of FS process.A low detection rate value of 98.85% was achieved by DT model and this value got incremented to 99.03%when using FS process.Then, the GBT model reached even higher detection rate value of 99.04%without FS and 99.14%when using FS process.

    Figure 11: Detection rate analysis of diverse models

    Furthermore,it can be noticed that the SVM+GBT+DT+RF+LR model yielded competitive results with detection rate values of 99.34%and 99.38%with and without FS processes.Therefore,the RF model achieved qualified results compared to other methods by yielding 99.33% optimal detection rate that got further enhanced to 99.42% with the inclusion of FS process.After observing the experimental results offered by the proposed and existing models, it is inferred that the proposed model is superior to other compared methods since it produced maximum results in several aspects.The increased performance of the proposed model might be attributed to the multimodal fusion process of CNN, LSTM and GRU models.Besides, the inclusion of CBO algorithm for FS also had a positive impact on the classification performance.

    5 Conclusion

    This research work has developed an effective multimodal IDS for healthcare environment in Spark.The proposed model made use of the CBO algorithm to select the features by optimizing the parameters of the classical BO algorithm and followed chaos theory to achieve faster convergence.Then,the multimodal DL classifiers namely CNN, LSTM and GRU models were applied to improve the detection rate.Besides,Hadoop MapReduce and Spark were utilized to achieve faster computation of big data in a parallel computational environment.The experimental validation of the proposed model was undertaken using a benchmark dataset.From the experimental analysis, it is observed that the proposed model resulted in optimal FS results with the selection of 21 features and the best cost of 0.002345.The proposed model demonstrated its effective results on the applied dataset by offering the maximum accuracy of 99.21%,precision of 98.93% and detection rate of 99.59%.In future, the performance of the proposed model can be enhanced by a bio-inspired algorithm-based multimodal classification technique.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产一区二区三区在线臀色熟女| 午夜日韩欧美国产| 日韩大尺度精品在线看网址| 欧洲精品卡2卡3卡4卡5卡区| 99热全是精品| 久久九九热精品免费| 日韩av在线大香蕉| 久久午夜福利片| 国产精品嫩草影院av在线观看| 午夜福利在线观看吧| 亚洲精品影视一区二区三区av| 免费搜索国产男女视频| 久久久久国内视频| 亚洲av免费高清在线观看| 1024手机看黄色片| 国产v大片淫在线免费观看| 精品无人区乱码1区二区| 欧美xxxx黑人xx丫x性爽| 免费观看的影片在线观看| 亚洲人与动物交配视频| 日本黄色片子视频| 51国产日韩欧美| 99热这里只有是精品在线观看| 午夜福利视频1000在线观看| 国产精华一区二区三区| 99热6这里只有精品| 91精品国产九色| 欧美成人免费av一区二区三区| 99久久成人亚洲精品观看| 特大巨黑吊av在线直播| 国产中年淑女户外野战色| 久99久视频精品免费| 亚洲最大成人手机在线| 久久久久性生活片| 特大巨黑吊av在线直播| 真实男女啪啪啪动态图| 成人一区二区视频在线观看| 成人高潮视频无遮挡免费网站| 麻豆久久精品国产亚洲av| 人妻夜夜爽99麻豆av| 色在线成人网| 亚洲欧美成人综合另类久久久 | 国模一区二区三区四区视频| 国产精品久久视频播放| 亚洲精品国产av成人精品 | 国产白丝娇喘喷水9色精品| 日本熟妇午夜| 高清午夜精品一区二区三区 | 人妻夜夜爽99麻豆av| 欧美日韩在线观看h| 国产精品,欧美在线| 99九九线精品视频在线观看视频| 日韩欧美精品免费久久| 国产中年淑女户外野战色| 99久久成人亚洲精品观看| 日韩欧美免费精品| 久久热精品热| 美女免费视频网站| 亚洲熟妇熟女久久| 精品免费久久久久久久清纯| 男女视频在线观看网站免费| 嫩草影院入口| 久久精品夜色国产| 久久久久性生活片| 久久99热6这里只有精品| 99久国产av精品| 真实男女啪啪啪动态图| 亚洲性久久影院| 寂寞人妻少妇视频99o| 亚洲激情五月婷婷啪啪| 国产不卡一卡二| www.色视频.com| 嫩草影院精品99| 亚洲欧美日韩卡通动漫| 国产亚洲av嫩草精品影院| 精品欧美国产一区二区三| 国产精品一区www在线观看| 91精品国产九色| 亚洲欧美成人精品一区二区| 伊人久久精品亚洲午夜| 老熟妇仑乱视频hdxx| 看非洲黑人一级黄片| 看非洲黑人一级黄片| 国产成人福利小说| 亚洲精品久久国产高清桃花| 国产精品美女特级片免费视频播放器| 99久国产av精品| av专区在线播放| 欧美+日韩+精品| 午夜福利在线观看免费完整高清在 | 大香蕉久久网| 亚洲第一区二区三区不卡| 日韩人妻高清精品专区| 一区福利在线观看| 亚洲最大成人av| 美女内射精品一级片tv| 国产麻豆成人av免费视频| 中出人妻视频一区二区| 亚洲美女搞黄在线观看 | 深夜a级毛片| 哪里可以看免费的av片| a级毛片免费高清观看在线播放| 亚洲精品久久国产高清桃花| 久久午夜福利片| 精品久久久久久久末码| 一级av片app| 精品久久久噜噜| 少妇熟女aⅴ在线视频| 成年女人看的毛片在线观看| 热99在线观看视频| 国产一区二区亚洲精品在线观看| 99久久精品国产国产毛片| 午夜福利成人在线免费观看| 亚洲在线观看片| 国产视频一区二区在线看| 村上凉子中文字幕在线| 五月玫瑰六月丁香| 欧美zozozo另类| 国产一区二区亚洲精品在线观看| or卡值多少钱| 日韩高清综合在线| 亚洲一区高清亚洲精品| 淫妇啪啪啪对白视频| 国产黄片美女视频| 亚洲自拍偷在线| 丰满的人妻完整版| 国产一区二区在线av高清观看| 午夜亚洲福利在线播放| 国产亚洲精品久久久com| 美女高潮的动态| 免费人成在线观看视频色| 日韩国内少妇激情av| 99久久久亚洲精品蜜臀av| 精华霜和精华液先用哪个| 久久久久久久久大av| 两个人视频免费观看高清| 欧美色视频一区免费| 欧美国产日韩亚洲一区| 免费看光身美女| 三级国产精品欧美在线观看| 亚洲欧美成人综合另类久久久 | 亚洲综合色惰| 亚洲人与动物交配视频| 日韩精品中文字幕看吧| 麻豆国产97在线/欧美| 麻豆av噜噜一区二区三区| 国产毛片a区久久久久| 一进一出好大好爽视频| 三级毛片av免费| 不卡视频在线观看欧美| 久久婷婷人人爽人人干人人爱| 一本一本综合久久| 人人妻人人看人人澡| 午夜福利18| 少妇猛男粗大的猛烈进出视频 | 成人av一区二区三区在线看| 日日摸夜夜添夜夜爱| 国产 一区 欧美 日韩| 在线观看av片永久免费下载| 亚洲国产精品成人综合色| 麻豆精品久久久久久蜜桃| 亚洲欧美清纯卡通| 国国产精品蜜臀av免费| 性插视频无遮挡在线免费观看| 国产成人aa在线观看| 久久久精品大字幕| 日韩中字成人| 99riav亚洲国产免费| 联通29元200g的流量卡| 国产一区二区在线观看日韩| 1024手机看黄色片| 国产毛片a区久久久久| 亚洲av免费在线观看| 精品无人区乱码1区二区| 日韩精品中文字幕看吧| 久久久久久久午夜电影| 亚洲久久久久久中文字幕| av.在线天堂| 淫秽高清视频在线观看| 天堂影院成人在线观看| 午夜影院日韩av| 18禁在线无遮挡免费观看视频 | 日韩欧美一区二区三区在线观看| 久久久国产成人免费| 熟妇人妻久久中文字幕3abv| 五月玫瑰六月丁香| 女的被弄到高潮叫床怎么办| 老熟妇仑乱视频hdxx| 人人妻人人澡人人爽人人夜夜 | 特大巨黑吊av在线直播| 两个人的视频大全免费| 欧美zozozo另类| 成人美女网站在线观看视频| 少妇丰满av| 亚洲成人中文字幕在线播放| 国产成人aa在线观看| 国产伦在线观看视频一区| 国产精品久久久久久精品电影| 熟女人妻精品中文字幕| 小说图片视频综合网站| 亚洲七黄色美女视频| 天堂网av新在线| 久久国产乱子免费精品| 久久精品夜色国产| 不卡一级毛片| 久久午夜福利片| 国产色爽女视频免费观看| 三级男女做爰猛烈吃奶摸视频| 女生性感内裤真人,穿戴方法视频| 精品欧美国产一区二区三| 精品国内亚洲2022精品成人| 午夜a级毛片| 久99久视频精品免费| 伦理电影大哥的女人| 女生性感内裤真人,穿戴方法视频| 女生性感内裤真人,穿戴方法视频| 一卡2卡三卡四卡精品乱码亚洲| 寂寞人妻少妇视频99o| 一夜夜www| 欧美最黄视频在线播放免费| 国产成人91sexporn| 三级毛片av免费| 成人亚洲欧美一区二区av| 综合色av麻豆| 成人综合一区亚洲| 久久精品国产亚洲av香蕉五月| 少妇人妻精品综合一区二区 | 波多野结衣高清无吗| 嫩草影院入口| 少妇熟女aⅴ在线视频| 国产av不卡久久| 蜜桃久久精品国产亚洲av| 国产三级中文精品| 国产片特级美女逼逼视频| 又黄又爽又免费观看的视频| 黄色视频,在线免费观看| 中文字幕人妻熟人妻熟丝袜美| 自拍偷自拍亚洲精品老妇| 女人十人毛片免费观看3o分钟| 亚洲成人久久爱视频| 美女内射精品一级片tv| 欧洲精品卡2卡3卡4卡5卡区| 国产视频一区二区在线看| 免费av毛片视频| 亚洲欧美日韩高清专用| 国产精品99久久久久久久久| 日本精品一区二区三区蜜桃| 桃色一区二区三区在线观看| 亚洲欧美日韩东京热| 欧美日韩精品成人综合77777| 一级毛片我不卡| 欧美丝袜亚洲另类| 免费看av在线观看网站| 国产亚洲精品综合一区在线观看| 国内精品美女久久久久久| 精品午夜福利在线看| 给我免费播放毛片高清在线观看| 蜜桃久久精品国产亚洲av| 欧美+日韩+精品| 色5月婷婷丁香| 最好的美女福利视频网| 亚洲va在线va天堂va国产| 国产成人freesex在线 | 一级av片app| 精品福利观看| 亚洲成人精品中文字幕电影| 一本久久中文字幕| 伦精品一区二区三区| 热99在线观看视频| 色视频www国产| av天堂中文字幕网| 毛片一级片免费看久久久久| av专区在线播放| 国产精品一及| 国产视频内射| 欧美+亚洲+日韩+国产| 成人午夜高清在线视频| 国内精品久久久久精免费| 99国产极品粉嫩在线观看| 搡老妇女老女人老熟妇| 天堂网av新在线| av中文乱码字幕在线| 国产淫片久久久久久久久| 色5月婷婷丁香| 床上黄色一级片| 午夜激情福利司机影院| 变态另类成人亚洲欧美熟女| 69人妻影院| 高清毛片免费看| 天天躁夜夜躁狠狠久久av| 中文字幕熟女人妻在线| 国产综合懂色| 亚洲欧美成人综合另类久久久 | 五月玫瑰六月丁香| 最新在线观看一区二区三区| 国产高清视频在线播放一区| 日本a在线网址| 日韩一区二区视频免费看| 人人妻人人澡欧美一区二区| 最近2019中文字幕mv第一页| 欧美潮喷喷水| 久久久久免费精品人妻一区二区| 成人性生交大片免费视频hd| 可以在线观看的亚洲视频| 国产精品人妻久久久久久| 日韩人妻高清精品专区| 亚洲精品粉嫩美女一区| a级毛色黄片| 午夜日韩欧美国产| 日韩精品有码人妻一区| 男人的好看免费观看在线视频| 亚洲av五月六月丁香网| 亚洲国产欧美人成| 一级毛片aaaaaa免费看小| 国产蜜桃级精品一区二区三区| 久久精品夜色国产| 国产精品综合久久久久久久免费| 一个人观看的视频www高清免费观看| 国产精品99久久久久久久久| 九色成人免费人妻av| 久久久久久久久久久丰满| 人人妻,人人澡人人爽秒播| 18禁在线播放成人免费| 在线免费十八禁| 老熟妇乱子伦视频在线观看| 午夜福利在线观看吧| 成人特级av手机在线观看| 精品无人区乱码1区二区| 国产高清有码在线观看视频| 女人十人毛片免费观看3o分钟| 国产乱人视频| 亚洲熟妇中文字幕五十中出| 高清午夜精品一区二区三区 | 寂寞人妻少妇视频99o| 精品一区二区三区av网在线观看| 亚洲国产精品成人久久小说 | 欧美高清成人免费视频www| 国产又黄又爽又无遮挡在线| 国产aⅴ精品一区二区三区波| 精品人妻一区二区三区麻豆 | 欧美成人精品欧美一级黄| 18禁在线无遮挡免费观看视频 | 午夜福利在线在线| 嫩草影院新地址| 尤物成人国产欧美一区二区三区| 国内精品美女久久久久久| 欧美成人一区二区免费高清观看| 亚洲在线观看片| 亚洲真实伦在线观看| 美女内射精品一级片tv| 国产激情偷乱视频一区二区| 黑人高潮一二区| 成年免费大片在线观看| 你懂的网址亚洲精品在线观看 | av天堂在线播放| 色播亚洲综合网| 亚洲欧美日韩东京热| 九九久久精品国产亚洲av麻豆| 成人av在线播放网站| 国产免费男女视频| 亚洲内射少妇av| 热99re8久久精品国产| 国产高清视频在线播放一区| 亚洲av第一区精品v没综合| 老女人水多毛片| 午夜福利在线在线| 国产成人aa在线观看| 波野结衣二区三区在线| 国产黄色小视频在线观看| 日韩欧美国产在线观看| 国产成年人精品一区二区| 国产69精品久久久久777片| 欧美三级亚洲精品| 色播亚洲综合网| 免费无遮挡裸体视频| 女生性感内裤真人,穿戴方法视频| 99精品在免费线老司机午夜| 热99在线观看视频| 麻豆精品久久久久久蜜桃| 91午夜精品亚洲一区二区三区| 国模一区二区三区四区视频| 国产精品亚洲美女久久久| 香蕉av资源在线| 又爽又黄a免费视频| 寂寞人妻少妇视频99o| 久久久色成人| 悠悠久久av| 99在线视频只有这里精品首页| 寂寞人妻少妇视频99o| 在现免费观看毛片| 日韩欧美 国产精品| 亚洲精品国产av成人精品 | 超碰av人人做人人爽久久| 日韩成人伦理影院| 在线观看美女被高潮喷水网站| 亚洲欧美日韩高清在线视频| 精品久久国产蜜桃| 国产在视频线在精品| 国产伦在线观看视频一区| 国产午夜精品久久久久久一区二区三区 | 一进一出好大好爽视频| 舔av片在线| 久久人人爽人人片av| 亚洲成av人片在线播放无| 国产高潮美女av| 久久精品国产清高在天天线| 国产精品三级大全| 亚洲av免费高清在线观看| 搡老熟女国产l中国老女人| 亚洲精品日韩在线中文字幕 | 亚洲av中文av极速乱| 亚洲内射少妇av| 给我免费播放毛片高清在线观看| 国产精品人妻久久久久久| 波多野结衣高清无吗| 变态另类丝袜制服| 免费观看的影片在线观看| 国产精品不卡视频一区二区| 欧美又色又爽又黄视频| 美女xxoo啪啪120秒动态图| 在现免费观看毛片| 99久久成人亚洲精品观看| 国产精品亚洲美女久久久| 日本 av在线| 在线免费观看不下载黄p国产| 日韩成人伦理影院| 美女黄网站色视频| 国产精品永久免费网站| 精华霜和精华液先用哪个| 久久人人爽人人片av| 国产真实伦视频高清在线观看| 久久国内精品自在自线图片| 久久鲁丝午夜福利片| 色播亚洲综合网| 亚洲国产日韩欧美精品在线观看| 国产一区二区在线av高清观看| 成人欧美大片| 99久久中文字幕三级久久日本| 中出人妻视频一区二区| 国产免费一级a男人的天堂| 亚洲国产色片| 99热精品在线国产| 国产精品国产高清国产av| 国产又黄又爽又无遮挡在线| 精品少妇黑人巨大在线播放 | 国产一区二区在线观看日韩| 最近视频中文字幕2019在线8| 亚洲精品影视一区二区三区av| 麻豆成人午夜福利视频| 日本三级黄在线观看| 欧美日韩国产亚洲二区| 亚洲精品一区av在线观看| 亚洲无线在线观看| 久久精品国产亚洲网站| 看黄色毛片网站| 人人妻,人人澡人人爽秒播| 听说在线观看完整版免费高清| 国产精品不卡视频一区二区| 国产不卡一卡二| 久久国内精品自在自线图片| 97碰自拍视频| 给我免费播放毛片高清在线观看| 久久欧美精品欧美久久欧美| 久久久国产成人精品二区| 国产高潮美女av| 国产亚洲欧美98| 国产精品久久久久久亚洲av鲁大| 一级av片app| 亚洲av中文av极速乱| 国产v大片淫在线免费观看| 久久久午夜欧美精品| 一级av片app| 男人舔奶头视频| 老司机福利观看| 亚洲成人久久性| 桃色一区二区三区在线观看| 国产乱人视频| 色av中文字幕| 一级a爱片免费观看的视频| 亚洲第一电影网av| 一区福利在线观看| 青春草视频在线免费观看| www.色视频.com| 国产色婷婷99| 黑人高潮一二区| 亚洲欧美成人精品一区二区| 精品久久国产蜜桃| 成人高潮视频无遮挡免费网站| 黄色视频,在线免费观看| 成人高潮视频无遮挡免费网站| 日韩成人av中文字幕在线观看 | 国产一区二区亚洲精品在线观看| 国产又黄又爽又无遮挡在线| 丰满人妻一区二区三区视频av| 国产综合懂色| 91久久精品国产一区二区三区| 欧美潮喷喷水| 免费电影在线观看免费观看| 日韩在线高清观看一区二区三区| or卡值多少钱| 黄色日韩在线| 久久天躁狠狠躁夜夜2o2o| 特级一级黄色大片| 国模一区二区三区四区视频| 亚洲成人av在线免费| 99国产精品一区二区蜜桃av| 永久网站在线| 亚洲av免费高清在线观看| 国产熟女欧美一区二区| 最近2019中文字幕mv第一页| 久久精品人妻少妇| 色av中文字幕| 欧美bdsm另类| 成年av动漫网址| 亚洲国产欧洲综合997久久,| 国产成人a区在线观看| eeuss影院久久| 中文在线观看免费www的网站| 99热网站在线观看| 尤物成人国产欧美一区二区三区| 露出奶头的视频| 亚洲欧美成人精品一区二区| 综合色av麻豆| 国产黄片美女视频| 色播亚洲综合网| 寂寞人妻少妇视频99o| 在线免费十八禁| 悠悠久久av| 成人av在线播放网站| 亚洲激情五月婷婷啪啪| 欧美高清性xxxxhd video| 床上黄色一级片| 国产成人a区在线观看| 精品午夜福利在线看| 亚洲av成人精品一区久久| 少妇裸体淫交视频免费看高清| 欧美区成人在线视频| 午夜精品在线福利| 成人三级黄色视频| 精品午夜福利视频在线观看一区| 亚洲自偷自拍三级| 亚洲人成网站高清观看| 校园人妻丝袜中文字幕| 人妻夜夜爽99麻豆av| 亚洲成人久久爱视频| 男人舔女人下体高潮全视频| 欧洲精品卡2卡3卡4卡5卡区| 亚洲综合色惰| 中文字幕人妻熟人妻熟丝袜美| 中国国产av一级| 国产免费男女视频| 麻豆国产av国片精品| 日本-黄色视频高清免费观看| 欧美中文日本在线观看视频| 波多野结衣高清无吗| 又爽又黄a免费视频| 久久久精品94久久精品| 国产探花在线观看一区二区| 欧美在线一区亚洲| 日本成人三级电影网站| 少妇熟女欧美另类| 日韩人妻高清精品专区| 欧洲精品卡2卡3卡4卡5卡区| 久久这里只有精品中国| 国产精品不卡视频一区二区| 十八禁网站免费在线| 久久久久久久久中文| 免费观看人在逋| 亚洲色图av天堂| 最近2019中文字幕mv第一页| 你懂的网址亚洲精品在线观看 | 亚洲欧美日韩东京热| 日本免费a在线| 国产精品野战在线观看| 国产精品爽爽va在线观看网站| 九九在线视频观看精品| 一本一本综合久久| 一区福利在线观看| 99久国产av精品| 此物有八面人人有两片| 免费黄网站久久成人精品| 在线免费观看的www视频| 国产伦在线观看视频一区| 亚洲欧美日韩卡通动漫| 老熟妇仑乱视频hdxx| 亚洲va在线va天堂va国产| 色哟哟哟哟哟哟| 亚洲欧美精品综合久久99| eeuss影院久久| 亚洲丝袜综合中文字幕| 欧美性感艳星| 亚洲国产高清在线一区二区三| 一本一本综合久久| ponron亚洲| 最近2019中文字幕mv第一页| 国产黄片美女视频| 午夜激情福利司机影院| 欧美+亚洲+日韩+国产| 国产精品美女特级片免费视频播放器| 熟女电影av网| 啦啦啦啦在线视频资源| 草草在线视频免费看| 亚洲av中文字字幕乱码综合| 一区二区三区免费毛片| 在线观看av片永久免费下载| 别揉我奶头 嗯啊视频| 国产一区二区三区在线臀色熟女| 精品福利观看| 桃色一区二区三区在线观看| 日韩三级伦理在线观看| 一个人看视频在线观看www免费| 最近在线观看免费完整版| 婷婷六月久久综合丁香| 国产亚洲91精品色在线| 两性午夜刺激爽爽歪歪视频在线观看|