BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm

被引:2
作者
Abed-alguni, Bilal H. [1 ]
Alzboun, Basil M. [1 ]
Alawad, Noor Aldeen [1 ]
机构
[1] Yarmouk Univ, Dept Comp Sci, Irbid, Jordan
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 10期
关键词
Intrusion detection framework; High-dimensional feature selection; Binary opposition Prairie dog optimization algorithm; Cellular automata; Mixed opposition-based learning; HYBRID WHALE OPTIMIZATION; FEATURE-SELECTION; CUCKOO SEARCH; ATTACKS;
D O I
10.1007/s10586-024-04674-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection datasets are highly likely to contain numerous redundant, irrelevant, and noisy features that slow the performance of the machine learning techniques and classifiers that may be applied to them. The feature selection approach is used for reducing the number of features in intrusion detection datasets and eliminating those that are not important. One of the most powerful structured population approaches is the Cellular Automata approach, which is used to enhance the diversity and convergence of population-based optimization algorithms. In this work, the Cellular Automata approach, Mixed opposition-based learning, and the K-Nearest Neighbor classifier are incorporated with the Prairie dog optimization algorithm (PDO) in a new intrusion detection framework called Binary Opposition Cellular Prairie dog optimization algorithm (BOC-PDO). The proposed framework contains four key features. First, the Cellular Automata model is utilized to enhance the population of feasible solutions in the PDO. Second, four S-shaped and four V-shaped Binary Transfer Functions are used to convert the continuous solutions in BOC-PDO to binary ones. Third, the Mixed opposition-based learning approach is used at the end of the optimization loop of BOC-PDO to improve capacity for exploration. Fourth, the K-Nearest Neighbor classifier is used as the main learning model in BOC-PDO. Eleven famous intrusion detection datasets were employed in the evaluation of the effectiveness of BOC-PDO compared to eight popular binary optimization algorithms and four machine learning approaches. According to the overall simulation results, BOC-PDO scored the highest accuracy, best objective value, and fewest selected features for each of the eleven intrusion detection datasets. Besides, the reliability and consistency of the simulation results of BOC-PDO compared to the other tested algorithms were established using Friedman and Wilcoxon statistical tests.
引用
收藏
页码:14417 / 14449
页数:33
相关论文
共 97 条
  • [61] Crayfish optimization algorithm
    Jia, Heming
    Rao, Honghua
    Wen, Changsheng
    Mirjalili, Seyedali
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (SUPPL 2) : 1919 - 1979
  • [62] Stability of feature selection algorithm: A review
    Khaire, Utkarsh Mahadeo
    Dhanalakshmi, R.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (04) : 1060 - 1073
  • [63] Emperor penguin optimizer: A comprehensive review based on state-of-the-art meta-heuristic algorithms
    Khalid, Othman Waleed
    Isa, Nor Ashidi Mat
    Sakim, Harsa Amylia Mat
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2023, 63 : 487 - 526
  • [64] BAOA: Binary Arithmetic Optimization Algorithm With K-Nearest Neighbor Classifier for Feature Selection
    Khodadadi, Nima
    Khodadadi, Ehsan
    Al-Tashi, Qasem
    El-Kenawy, El-Sayed M.
    Abualigah, Laith
    Abdulkadir, Said Jadid
    Alqushaibi, Alawi
    Mirjalili, Seyedali
    [J]. IEEE ACCESS, 2023, 11 : 94094 - 94115
  • [65] Lim S.L.O., 2019, 2019 IEEE C SUST UT
  • [66] Taming the 0/1 knapsack problem with monogamous pairs genetic algorithm
    Lim, Ting Yee
    Al-Betar, Mohammed Azmi
    Khader, Ahamad Tajudin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2016, 54 : 241 - 250
  • [67] Augmented whale feature selection for IoT attacks: Structure, analysis and applications
    Mafarja, Majdi
    Heidari, Ali Asghar
    Habib, Maria
    Faris, Hossam
    Thaher, Thaer
    Aljarah, Ibrahim
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 112 (112): : 18 - 40
  • [68] Hybrid Whale Optimization Algorithm with simulated annealing for feature selection
    Mafarja, Majdi M.
    Mirjalili, Seyedali
    [J]. NEUROCOMPUTING, 2017, 260 : 302 - 312
  • [69] Model granularity in engineering design - Concepts and framework
    Maier J.F.
    Eckert C.M.
    John Clarkson P.
    [J]. Design Science, 2017, 3
  • [70] Feature Selection Algorithms in Intrusion Detection System: A Survey
    Maza, Sofiane
    Touahria, Mohamed
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (10): : 5079 - 5099