A hybrid machine learning framework for intrusion detection system in smart cities

被引:0
作者
Gill, Komal Singh [1 ]
Dhillon, Arwinder [1 ]
机构
[1] Lovely Profess Univ, Jalandhar, India
关键词
IDS; Machine learning; Recursive feature elimination; Self adaptive equilibrium optimizer particle swarm optimization; Stacked ensemble; NSL-KDD; CYBER SECURITY;
D O I
10.1007/s12530-024-09603-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart cities leverage technologies such as Cloud computing, the Internet of Things (IoT), artificial intelligence (AI), and data analytics to collect and analyze data on various aspects of city life, including transportation, energy usage, public safety, and environmental factors. In such an environment, security is important to protect the data collected by various devices and systems from unauthorized access or misuse. Intrusion Detection Systems (IDS) are critical components of cyber security, designed to identify and prevent malicious activities on computer networks. Machine learning (ML) techniques have emerged as a promising approach to enhance IDS performance by automating the detection of anomalies and reducing false positives. This paper provides an overview of IDS systems and reviews some of the most popular ML algorithms used in IDS. A REPOStack model is proposed, which is a hybrid of Recursive Feature Elimination (RFE), Self-Adaptive Equilibrium Optimizer with Particle Swarm Optimization (SAEO_PSO), and Probabilistic Stacked Ensemble of Adaboost, Support Vector Machine (SVM), Deep Neural Network (DNN), and XGBoost. Adboost, SVM, and DNN are used as base learners, and XGboost is used as a meta-learner. REPOStack is tested on benchmark datasets NSLKDD, UNSW-NB15, and CICIDS. The results show improved accuracy, sensitivity, precision, specificity, and F1 score.
引用
收藏
页码:2005 / 2019
页数:15
相关论文
共 32 条
  • [1] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [2] Network intrusion detection using oversampling technique and machine learning algorithms
    Ahmed, Hafiza Anisa
    Hameed, Anum
    Bawany, Narmeen Zakaria
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8 : 1 - 19
  • [3] Hyperparameter Search for Machine Learning Algorithms for Optimizing the Computational Complexity
    Ali, Yasser A.
    Awwad, Emad Mahrous
    Al-Razgan, Muna
    Maarouf, Ali
    [J]. PROCESSES, 2023, 11 (02)
  • [4] Alloghani M., 2020, A Systematic Review on Supervised and Unsupervised Machine Learning Algorithms for Data Science, P3, DOI [10.1007/, 10.1007/978-3-030-22475-21, DOI 10.1007/978-3-030-22475-21, 10.1007/978-3-030-22475-2_1, 10.1007/978-3-030-22475-2]
  • [5] The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems
    Apruzzese, Giovanni
    Pajola, Luca
    Conti, Mauro
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 5152 - 5169
  • [6] Improved equilibrium optimization based on Levy flight approach for feature selection
    Balakrishnan, K.
    Dhanalakshmi, R.
    Akila, M.
    Sinha, Bam Bahadur
    [J]. EVOLVING SYSTEMS, 2023, 14 (04) : 735 - 746
  • [7] A hybrid machine learning model for intrusion detection in VANET
    Bangui, Hind
    Ge, Mouzhi
    Buhnova, Barbora
    [J]. COMPUTING, 2022, 104 (03) : 503 - 531
  • [8] Chen T., 2015, R Package Version 4-2, V4, P1
  • [9] Analysis of KDD-Cup'99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT
    Choudhary, Sarika
    Kesswani, Nishtha
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1561 - 1573
  • [10] A modified equilibrium optimizer using opposition-based learning and novel update rules
    Fan, Qingsong
    Huang, Haisong
    Yang, Kai
    Zhang, Songsong
    Yao, Liguo
    Xiong, Qiaoqiao
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 170