Hybrid Firefly and Black Hole Algorithm Designed for XGBoost Tuning Problem: An Application for Intrusion Detection

被引:2
作者
Yong, Xin [1 ]
Gao, Yuelin [2 ]
机构
[1] North Minzu Univ, Sch Comp Sci & Engn, Yinchuan 750021, Ningxia, Peoples R China
[2] North Minzu Univ, Ningxia Prov Key Lab Intelligent Informat & Data P, Yinchuan 750021, Ningxia, Peoples R China
基金
中国国家自然科学基金;
关键词
Classification algorithms; Machine learning algorithms; Computer networks; Machine learning; Intrusion detection; Tuning; Support vector machines; Black hole algorithm; firefly algorithm; intrusion detection; XGBoost; MODEL;
D O I
10.1109/ACCESS.2023.3259981
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer networks have touched every aspect of human life, it cannot be overstated that cyber security is of great importance and significance. Intrusion detection techniques play an important role in the field of network security, but it also faces significant challenges. In this paper, we propose a Hybrid Firefly and Black Hole Algorithm (HFBHA) for parameter tuning of the XGBoost model and apply it to the study of intrusion detection systems. Firstly, the algorithm designs a double black hole mechanism by introducing the concept of the second black hole and adjusting the moving trajectory of the stars using the attraction of both black holes. Secondly, an improved initialization method of the stars is proposed, where a star that crosses the event horizon of the black hole has an opportunity to be replaced by a new star around the black hole. Finally, a combination of the firefly perturbation strategy and mutation operator is proposed to improve the global search capability of the algorithm. Both the effectiveness of the proposed method on the XBGoost parameter tuning problem and the feasibility of this strategy on intrusion detection applications are verified by comparison experiments based on the NSL-KDD dataset.
引用
收藏
页码:28551 / 28564
页数:14
相关论文
共 48 条
  • [1] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [2] A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
    Alazzam, Hadeel
    Sharieh, Ahmad
    Sabri, Khair Eddin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2020, 148 (148)
  • [3] Ali MH, 2018, IEEE ST CONF RES DEV
  • [4] Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
  • [5] A Survey of Random Forest Based Methods for Intrusion Detection Systems
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (03)
  • [6] [Anonymous], 2007, KDD CUP 1999
  • [7] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [8] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [9] Dhanabal L., 2015, Appl. Sci.
  • [10] Enache AC, 2014, INT CONF SYST THEO, P856, DOI 10.1109/ICSTCC.2014.6982526