Intrusion detection model using gene expression programming to optimize parameters of convolutional neural network for energy internet

被引:12
作者
Deng, Song [1 ]
Yuan, Xinya [1 ]
Li, Qianliang [1 ]
Zhang, Jie [1 ]
Sun, Mengfei [1 ]
Fu, Xiong [2 ]
Yang, Lechan [3 ]
机构
[1] Nanjing Univ Post & Telecommun, Inst Adv Technol, Nanjing 210003, Peoples R China
[2] Nanjing Univ Post & Telecommun, Sch Comp Sci, Nanjing 210003, Peoples R China
[3] Jinling Inst Technol, Dept Soft Engn, Nanjing, Peoples R China
关键词
Gene expression programming; Convolutional neural network; Parameter optimization; Intrusion detection; SYSTEM; SECURITY;
D O I
10.1016/j.asoc.2022.109960
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The open, interconnected, and shared operational characteristics of the energy Internet introduce more sophisticated cybersecurity attacks. How to accurately detect these cyber attacks is crucial for energy Internet security protection. Existing machine learning-based intrusion detection algorithms cannot cope with the continuous increase of network traffic and features in the energy Internet. And convolutional neural networks (CNN) can be a good solution for the descending and optimal selection of high-dimensional intrusion features. Unfortunately, traditional convolutional neural networks have complex structures with many parameters and are prone to fall into local optimality. To fill the gap of CNN, in this paper, we use a gene expression programming (GEP) to optimize the parameters of CNN and propose an intrusion detection algorithm based on GEP-CNN (GCNN-IDS). Our key idea is to avoid the convolutional neural network from falling into local optimum by designing a new code on GEP and fitness function to optimize the parameters of the CNN using the global search capability of GEP. The experimental results on two benchmark datasets and a real dataset substantiate that the detection accuracy of the optimized CNN-based intrusion detection algorithm (ICNN-IDS) reaches up to 0.9143 under different parameter combinations; meanwhile, compared with other algorithms, the detection accuracy, precision, recall, F1 and false detection rate of the intrusion detection model proposed in this paper reach 0.9897, 0.99, 0.98, 0.97 and 0.0126, respectively.(c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页数:11
相关论文
共 47 条
  • [1] Nearest cluster-based intrusion detection through convolutional neural networks
    Andresini, Giuseppina
    Appice, Annalisa
    Malerba, Donato
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 216
  • [2] Azizjon Meliboev, 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), P218, DOI 10.1109/ICAIIC48513.2020.9064976
  • [3] LR-HIDS: logistic regression host-based intrusion detection system for cloud environments
    Besharati, Elham
    Naderan, Marjan
    Namjoo, Ehsan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) : 3669 - 3692
  • [4] Intrusion detection approach based on optimised artificial neural network
    Choras, Michal
    Pawlicki, Marek
    [J]. NEUROCOMPUTING, 2021, 452 : 705 - 715
  • [5] Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection
    Ding, Derui
    Han, Qing-Long
    Wang, Zidong
    Ge, Xiaohua
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (10): : 6466 - 6476
  • [6] A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique
    ElSayed, Mahmoud Said
    Le-Khac, Nhien-An
    Albahar, Marwan Ali
    Jurcut, Anca
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 191
  • [7] Erlacher F, 2018, IEEE IFIP NETW OPER
  • [8] Ferreira C., 2002, ADV COMPLEX SYST, V5, P389, DOI [DOI 10.1142/S0219525902000626, 10.1142/S0219525902000626]
  • [9] Cyber-physical security for on-going smart grid initiatives: a survey
    Hossain, Md Musabbir
    Peng, Chen
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (03) : 233 - 244
  • [10] CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack
    Hu, Yifan
    Zhu, Peidong
    Xun, Peng
    Liu, Bo
    Kang, Wenjie
    Xiong, Yinqiao
    Shi, Weiheng
    [J]. COMPUTERS & SECURITY, 2021, 111