Feature selection for intrusion detection based on an improved rime optimization algorithm

被引:0
作者
Peng, Qingyuan [1 ]
Wang, Xiaofeng [1 ]
Tang, Ao [1 ]
机构
[1] School of Computer Science & Engineering, North Minzu University, Yinchuan
来源
MCB Molecular and Cellular Biomechanics | 2024年 / 21卷 / 03期
基金
中国国家自然科学基金;
关键词
Cauchy mutation; differential mutation; feature selection; intrusion detection; rime optimization algorithm;
D O I
10.62617/mcb599
中图分类号
学科分类号
摘要
With the rapid development of information technology, cybersecurity issues have become increasingly prominent, posing serious threats to national security, economic growth, and personal privacy. Intrusion detection systems have been widely applied to ensure network security and prevent malicious cyber-attacks. In intrusion detection, redundant and irrelevant features not only slow down the classification process but also hinder classifiers from making accurate decisions, resulting in decreased system performance. Addressing the problem of low accuracy in intrusion detection systems due to high-dimensional datasets, we propose a network intrusion detection method based on an enhanced Rime Optimization Algorithm for feature selection. Firstly, building upon the traditional Rime Optimization Algorithm, we introduce Cauchy mutation and differential mutation operations to improve both global and local search capabilities. Cauchy mutation introduces a heavy-tailed distribution to increase the probability of escaping local optima, while differential mutation, through the differential operator, further enhances solution diversity and algorithm convergence speed. Combining the two mutation operations, the optimization algorithm achieves a good balance between global search and local search, effectively avoids premature convergence and falling into local optimum, and effectively improves the feature selection results. Secondly, the improved Rime optimization algorithm (IRIME) was applied to the feature selection process of intrusion detection system, and it was combined with the decision tree classifier to construct a wrapper feature selection algorithm, which could directly optimize the classification task and avoid the mismatch between feature selection and classifier. The optimized algorithm can quickly select the most representative feature subset from the high-dimensional feature space, significantly reducing the computational cost. At the same time, the selected feature subset can more accurately reflect the inherent law of the data set, thereby improving the prediction accuracy of the classifier. Finally, NSL-KDD and UNSW-NB15 datasets were used for performance evaluation. Experimental results show that compared with several feature selection algorithms, the proposed method achieves the best binary classification performance after feature selection. Specifically, it is superior to other algorithms in terms of precision, accuracy, F1 score and recall of all evaluation metrics. © 2024 by author(s).
引用
收藏
相关论文
共 37 条
[1]  
Sun N., Ding M., Jiang J., Et al., Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives, IEEE Communications Surveys & Tutorials, 25, 3, pp. 1748-1774, (2023)
[2]  
Mohammadi S., Mirvaziri H., Ghazizadeh-Ahsaee M., Karimipour H., Cyber intrusion detection by combined feature selection algorithm, Journal of Information Security and Applications, 44, pp. 80-88, (2019)
[3]  
Solorio-Fernandez S., Carrasco-Ochoa J. A., Martinez-Trinidad J. F., A review of unsupervised feature selection methods, Artificial Intelligence Review, 53, 2, pp. 907-948, (2020)
[4]  
Valls J. M., Aler R., Galvan I. M., Camacho D., Supervised data transformation and dimensionality reduction with a 3-layer multi-layer perceptron for classification problems, Journal of Ambient Intelligence and Humanized Computing, 12, 4, pp. 10515-10527, (2021)
[5]  
Abu Khurma R., Aljarah I., Sharieh A., Abd Elaziz M., Damasevicius R., Krilavicius T., A review of the modification strategies of the nature inspired algorithms for feature selection problem, Mathematics, 10, 3, (2022)
[6]  
Khurma R. A., Aljarah I., Sharieh A., Rank based moth flame optimisation for feature selection in the medical application, Proc. of the IEEE congress on evolutionary computation, pp. 1-8, (2020)
[7]  
Martin A., Lara-Cabrera R., Camacho D., Android malware detection through hybrid features fusion and ensemble classifiers: the AndroPyTool framework and the OmniDroid dataset, Information Fusion, 52, 4, pp. 128-142, (2019)
[8]  
Alyasseri Z. A. A., Khader A. T., Al-Betar M. A., Yang X. S., Et al., Multi-objective flower pollination algorithm: a new technique for EEG signal denoising, Neural Computing and Applications, 35, pp. 7943-7962, (2022)
[9]  
Fierrez J., Morales A., Vera-Rodriguez R., Camacho D., Multiple classifiers in biometrics. part 1: Fundamentals and review, Information Fusion, 44, pp. 57-64, (2018)
[10]  
Khurma R. A., Alsawalqah H., Aljarah I., Elaziz M. A., Damasevicius R., An enhanced evolutionary software defect prediction method using island moth flame optimization, Mathematics, 9, 15, (2021)