Feature selection for intrusion detection based on an improved rime optimization algorithm

被引:0
作者
Peng, Qingyuan [1 ]
Wang, Xiaofeng [1 ]
Tang, Ao [1 ]
机构
[1] School of Computer Science & Engineering, North Minzu University, Yinchuan
来源
MCB Molecular and Cellular Biomechanics | 2024年 / 21卷 / 03期
基金
中国国家自然科学基金;
关键词
Cauchy mutation; differential mutation; feature selection; intrusion detection; rime optimization algorithm;
D O I
10.62617/mcb599
中图分类号
学科分类号
摘要
With the rapid development of information technology, cybersecurity issues have become increasingly prominent, posing serious threats to national security, economic growth, and personal privacy. Intrusion detection systems have been widely applied to ensure network security and prevent malicious cyber-attacks. In intrusion detection, redundant and irrelevant features not only slow down the classification process but also hinder classifiers from making accurate decisions, resulting in decreased system performance. Addressing the problem of low accuracy in intrusion detection systems due to high-dimensional datasets, we propose a network intrusion detection method based on an enhanced Rime Optimization Algorithm for feature selection. Firstly, building upon the traditional Rime Optimization Algorithm, we introduce Cauchy mutation and differential mutation operations to improve both global and local search capabilities. Cauchy mutation introduces a heavy-tailed distribution to increase the probability of escaping local optima, while differential mutation, through the differential operator, further enhances solution diversity and algorithm convergence speed. Combining the two mutation operations, the optimization algorithm achieves a good balance between global search and local search, effectively avoids premature convergence and falling into local optimum, and effectively improves the feature selection results. Secondly, the improved Rime optimization algorithm (IRIME) was applied to the feature selection process of intrusion detection system, and it was combined with the decision tree classifier to construct a wrapper feature selection algorithm, which could directly optimize the classification task and avoid the mismatch between feature selection and classifier. The optimized algorithm can quickly select the most representative feature subset from the high-dimensional feature space, significantly reducing the computational cost. At the same time, the selected feature subset can more accurately reflect the inherent law of the data set, thereby improving the prediction accuracy of the classifier. Finally, NSL-KDD and UNSW-NB15 datasets were used for performance evaluation. Experimental results show that compared with several feature selection algorithms, the proposed method achieves the best binary classification performance after feature selection. Specifically, it is superior to other algorithms in terms of precision, accuracy, F1 score and recall of all evaluation metrics. © 2024 by author(s).
引用
收藏
相关论文
共 37 条
[21]  
Alazab M., Alhyari S., Awajan A., Abdallah A. B., Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance, Cluster Computing, 24, 1, pp. 83-101, (2021)
[22]  
Khurma R. A., Aljarah I., Sharieh A., Elaziz M. A., Damasevicius R., Krilavicius T., A review of the modification strategies of the nature inspired algorithms for feature selection problem, Mathematics, 10, 3, (2022)
[23]  
Xue Y., Tang T., Pang W., Liu A. X., Self-adaptive parameter and strategy based particle swarm optimization for large-scale feature selection problems with multiple classifiers, Applied Soft Computing, 88, (2020)
[24]  
Chen K., Xue B., Zhang M., Zhou F., Correlation-guided updating strategy for feature selection in classification with surrogate-assisted particle swarm optimization, IEEE Transactions on Evolutionary Computation, 26, 5, pp. 1015-1029, (2022)
[25]  
Bonab M. S., Ghaffari A., Gharehchopogh F. S., Alemi P., A wrapper-based feature selection for improving performance of intrusion detection systems, International Journal of Communication Systems, 33, 12, (2020)
[26]  
Zhou Y., Cheng G., Jiang S., Dai M., Building an efficient intrusion detection system based on feature selection and ensemble classifier, Computer Networks, 174, (2020)
[27]  
Fatani A., Dahou A., Al-Qaness M. A., Lu S., Elaziz M. A., Advanced feature extraction and selection approach using deep learning and aquila optimizer for IoT intrusion detection system, Sensors, 22, 1, (2022)
[28]  
Mojtahedi A., Sorouri F., Souha A. N., Molazadeh A., Mehr S. S., Feature selection-based intrusion detection system using genetic whale optimization algorithm and sample-based classification, (2022)
[29]  
Nazir A., Khan R. A., A novel combinatorial optimization based feature selection method for network intrusion detection, Computers & Security, 102, (2021)
[30]  
Maazalahi M., Hosseini S., K-means and meta-heuristic algorithms for intrusion detection systems, Cluster Computing, pp. 1-43, (2024)