A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things

被引:33
作者
Sangaiah, Arun Kumar [1 ,5 ]
Javadpour, Amir [2 ,4 ]
Ja'fari, Forough [3 ]
Pinto, Pedro [4 ,6 ,7 ]
Zhang, Weizhe [2 ]
Balasubramanian, Sudha [5 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Dept Ind Engn & Management, Touliu, Yunlin, Taiwan
[2] Harbin Inst Technol, Dept Comp Sci & Technol Cyberspace Secur, Shenzhen, Peoples R China
[3] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[4] Inst Politecn Viana do Castelo, Electrotech & Telecommun Dept, ADiT Lab, P-4900347 Porto, Portugal
[5] VIT Univ, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
[6] Univ Maia, P-4475690 Maia, Portugal
[7] INESC TEC, P-4200465 Porto, Portugal
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2023年 / 26卷 / 01期
基金
中国国家自然科学基金;
关键词
Cloud computing; CoT; Intrusion detection; IDS classifier; Optimization algorithms; Ant-colony; Bee-colony; Artificial intelligence; CLASSIFICATION;
D O I
10.1007/s10586-022-03629-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing environments provide users with Internet-based services and one of their main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a defensive strategy in such environments is essential. Multiple parameters are used to evaluate the IDSs, the most important aspect of which is the feature selection method used for classifying the malicious and legitimate activities. We have organized this research to determine an effective feature selection method to increase the accuracy of the classifiers in detecting intrusion. A Hybrid Ant-Bee Colony Optimization (HABCO) method is proposed to convert the feature selection problem into an optimization problem. We examined the accuracy of HABCO with BHSVM, IDSML, DLIDS, HCRNNIDS, SVMTHIDS, ANNIDS, and GAPSAIDS. It is shown that HABCO has a higher accuracy compared with the mentioned methods.
引用
收藏
页码:599 / 612
页数:14
相关论文
共 27 条
[1]  
Adhao Rahul, 2021, Data Science and Security: Proceedings of IDSCS 2021. Lecture Notes in Networks and Systems (290), P310, DOI 10.1007/978-981-16-4486-3_34
[2]  
Alkhaldi SR., 2021, ACAD J RES SCI PUBLI, V2, P21
[3]   Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks [J].
Alzahrani, Abdulsalam O. ;
Alenazi, Mohammed J. E. .
FUTURE INTERNET, 2021, 13 (05)
[4]   Evidential classification and feature selection for cyber-threat hunting [J].
Beechey, Matthew ;
Kyriakopoulos, Konstantinos G. ;
Lambotharan, Sangarapillai .
KNOWLEDGE-BASED SYSTEMS, 2021, 226
[5]   An intelligent botnet blocking approach in software defined networks using honeypots [J].
Ja'fari, Forough ;
Mostafavi, Seyedakbar ;
Mizanian, Kiarash ;
Jafari, Emad .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) :2993-3016
[6]   DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments [J].
Javadpour, Amir ;
Pinto, Pedro ;
Ja'fari, Forough ;
Zhang, Weizhe .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01) :367-384
[7]   Resource Management in a Peer to Peer Cloud Network for IoT [J].
Javadpour, Amir ;
Wang, Guojun ;
Rezaei, Samira .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (03) :2471-2488
[8]   RETRACTED ARTICLE: Detecting straggler MapReduce tasks in big data processing infrastructure by neural network [J].
Javadpour, Amir ;
Wang, Guojun ;
Rezaei, Samira ;
Li, Kuan-Ching .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (09) :6969-6993
[10]   Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network [J].
Javadpour, Amir ;
Wang, Guojun ;
Xing, Xiaofei .
2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, :316-321