Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

被引:6
作者
Khafaga, Doaa Sami [1 ]
Karim, Faten Khalid [1 ]
Abdelhamid, Abdelaziz A. [2 ,3 ]
El-kenawy, El-Sayed M. [4 ]
Alkahtani, Hend K. [1 ]
Khodadadi, Nima [5 ]
Hadwan, Mohammed [6 ]
Ibrahim, Abdelhameed [7 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
[2] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[3] Shaqra Univ, Coll Comp & Informat Technol, Dept Comp Sci, Shaqra 11961, Saudi Arabia
[4] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[5] Florida Int Univ, Dept Civil & Environm Engn, Miami, FL USA
[6] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
[7] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Voting classifier; whale optimization algorithm; dipper throated optimization; intrusion detection; internet-of-things; INDUSTRIAL INTERNET; IOT; ALGORITHM;
D O I
10.32604/cmc.2023.033513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Managing physical objects in the network's periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems' effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper throated optimizer (DTO) to improve the exploration process of the traditional WOA optimizer. The proposed voting classifier categorizes the network intrusions robustly and efficiently. To assess the proposed approach, a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack categorization. The dataset records are balanced using the locality-sensitive hashing (LSH) and Synthetic Minority Oversampling Technique (SMOTE). The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach's effectiveness, stability, and significance. The achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
引用
收藏
页码:3183 / 3198
页数:16
相关论文
共 46 条
[1]   Robust Speech Emotion Recognition Using CNN plus LSTM Based on Stochastic Fractal Search Optimization Algorithm [J].
Abdelhamid, Abdel Aziza ;
El-Kenawy, El-Sayed M. ;
Alotaibi, Bandar ;
Amer, Ghadam ;
Abdelkader, Mahmoud Y. ;
Ibrahim, Abdelhameed ;
Eid, Marwa Metwally .
IEEE ACCESS, 2022, 10 :49265-49284
[2]   Optimized Two-Level Ensemble Model for Predicting the Parameters of Metamaterial Antenna [J].
Abdelhamid, Abdelaziz A. ;
Alotaibi, Sultan R. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01) :917-933
[3]   Robust Prediction of the Bandwidth of Metamaterial Antenna Using Deep Learning [J].
Abdelhamid, Abdelaziz A. ;
Alotaibi, Sultan R. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02) :2305-2321
[4]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[5]   A Smart Home Energy Management System Using IoT and Big Data Analytics Approach [J].
Al-Ali, A. R. ;
Zualkernan, Imran A. ;
Rashid, Mohammed ;
Gupta, Ragini ;
AliKarar, Mazin .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2017, 63 (04) :426-434
[6]   Network Intrusion Detection Leveraging Machine Learning and Feature Selection [J].
Ali, Arshid ;
Shaukat, Shahtaj ;
Tayyab, Muhammad ;
Khan, Muazzam A. ;
Khan, Jan Sher ;
Arshad ;
Ahmad, Jawad .
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON SMART COMMUNITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEEHONET 2020), 2020, :49-53
[7]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[8]  
Amin MS, 2017, INT J COMPUT SCI NET, V17, P231
[9]   A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions [J].
Asharf, Javedz ;
Moustafa, Nour ;
Khurshid, Hasnat ;
Debie, Essam ;
Haider, Waqas ;
Wahab, Abdul .
ELECTRONICS, 2020, 9 (07)
[10]  
Bansal Ashu, 2018, Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I. Communications in Computer and Information Science (905), P372, DOI 10.1007/978-981-13-1810-8_37