Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization

被引:15
|
作者
Alkanhel, Reem [1 ]
El-kenawy, El-Sayed M. [2 ]
Abdelhamid, Abdelaziz A. [3 ,4 ]
Ibrahim, Abdelhameed [5 ]
Alohali, Manal Abdullah [6 ]
Abotaleb, Mostafa [7 ]
Khafaga, Doaa Sami [8 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[2] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[3] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[4] Shaqra Univ, Coll Comp & Informat Technol, Dept Comp Sci, Shaqra 11961, Saudi Arabia
[5] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
[6] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Informat Syst Dept, POB 84428, Riyadh 11671, Saudi Arabia
[7] South Ural State Univ, Dept Syst Programming, Chelyabinsk 454080, Russia
[8] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Feature selection; grey wolf optimization; dipper throated; optimization; intrusion detection; internet-of-things (IoT); DETECTION SYSTEM; META-HEURISTICS; MODEL; CLASSIFICATION; ALGORITHM; COVID-19;
D O I
10.32604/cmc.2023.033273
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Applications of internet-of-things (IoT) are increasingly being used in many facets of our daily life, which results in an enormous volume of data. Cloud computing and fog computing, two of the most common technologies used in IoT applications, have led to major security concerns. Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient. Several artificial intelligence (AI) based security solutions, such as intrusion detection systems (IDS), have been proposed in recent years. Intelligent technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection (FS) techniques to increase classifica-tion accuracy by minimizing the number of features selected. On the other hand, metaheuristic optimization algorithms have been widely used in feature selection in recent decades. In this paper, we proposed a hybrid optimization algorithm for feature selection in IDS. The proposed algorithm is based on grey wolf (GW), and dipper throated optimization (DTO) algorithms and is referred to as GWDTO. The proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better performance. On the employed IoT-IDS dataset, the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in the literature to validate its superiority. In addition, a statistical analysis is performed to assess the stability and effectiveness of the proposed approach. Experimental results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
引用
收藏
页码:2677 / 2693
页数:17
相关论文
共 50 条
  • [21] Feature selection for intrusion detection based on an improved rime optimization algorithm
    Peng, Qingyuan
    Wang, Xiaofeng
    Tang, Ao
    MCB Molecular and Cellular Biomechanics, 2024, 21 (03):
  • [22] A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection
    Zhao, Fei
    Zhao, Jiyong
    Niu, Xinxin
    Luo, Shoushan
    Xin, Yang
    APPLIED SCIENCES-BASEL, 2018, 8 (09):
  • [23] Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
    Ayo, Femi Emmanuel
    Folorunso, Sakinat Oluwabukonla
    Abayomi-Alli, Adebayo A.
    Adekunle, Adebola Olayinka
    Awotunde, Joseph Bamidele
    INFORMATION SECURITY JOURNAL, 2020, 29 (06): : 267 - 283
  • [24] Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
    Khafaga, Doaa Sami
    El-kenawy, El-Sayed M.
    Karim, Faten Khalid
    Abotaleb, Mostafa
    Ibrahim, Abdelhameed
    Abdelhamid, Abdelaziz A.
    Elsheweikh, D. L.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4531 - 4545
  • [25] Hybrid optimization scheme for intrusion detection using considerable feature selection
    S. Velliangiri
    P. Karthikeyan
    Neural Computing and Applications, 2020, 32 : 7925 - 7939
  • [26] Metaheuristic Optimization-Based Feature Selection for Imagery and Arithmetic Tasks: An fNIRS Study
    Zafar, Amad
    Hussain, Shaik Javeed
    Ali, Muhammad Umair
    Lee, Seung Won
    SENSORS, 2023, 23 (07)
  • [27] A hybrid bat based feature selection approach for intrusion detection
    Mohamed, Amine Laamari (laamari.med.a@gmail.com), 1600, Springer Verlag (472): : 230 - 238
  • [28] An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection
    Hassan, Ibrahim Hayatu
    Abdullahi, Mohammed
    Aliyu, Mansur Masama
    Yusuf, Sahabi Ali
    Abdulrahim, Abdulrazaq
    INTELLIGENT SYSTEMS WITH APPLICATIONS, 2022, 16
  • [29] Enhancing intrusion detection with feature selection and neural network
    Wu, Chunhui
    Li, Wenjuan
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (07) : 3087 - 3105
  • [30] Supervised feature selection techniques in network intrusion detection: A critical review
    Di Mauro, M.
    Galatro, G.
    Fortino, G.
    Liotta, A.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 101