Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

被引:5
作者
Khafaga, Doaa Sami [1 ]
Karim, Faten Khalid [1 ]
Abdelhamid, Abdelaziz A. [2 ,3 ]
El-kenawy, El-Sayed M. [4 ]
Alkahtani, Hend K. [1 ]
Khodadadi, Nima [5 ]
Hadwan, Mohammed [6 ]
Ibrahim, Abdelhameed [7 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
[2] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[3] Shaqra Univ, Coll Comp & Informat Technol, Dept Comp Sci, Shaqra 11961, Saudi Arabia
[4] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[5] Florida Int Univ, Dept Civil & Environm Engn, Miami, FL USA
[6] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
[7] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Voting classifier; whale optimization algorithm; dipper throated optimization; intrusion detection; internet-of-things; INDUSTRIAL INTERNET; IOT; ALGORITHM;
D O I
10.32604/cmc.2023.033513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Managing physical objects in the network's periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems' effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper throated optimizer (DTO) to improve the exploration process of the traditional WOA optimizer. The proposed voting classifier categorizes the network intrusions robustly and efficiently. To assess the proposed approach, a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack categorization. The dataset records are balanced using the locality-sensitive hashing (LSH) and Synthetic Minority Oversampling Technique (SMOTE). The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach's effectiveness, stability, and significance. The achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
引用
收藏
页码:3183 / 3198
页数:16
相关论文
共 46 条
  • [1] Robust Speech Emotion Recognition Using CNN plus LSTM Based on Stochastic Fractal Search Optimization Algorithm
    Abdelhamid, Abdel Aziza
    El-Kenawy, El-Sayed M.
    Alotaibi, Bandar
    Amer, Ghadam
    Abdelkader, Mahmoud Y.
    Ibrahim, Abdelhameed
    Eid, Marwa Metwally
    [J]. IEEE ACCESS, 2022, 10 : 49265 - 49284
  • [2] Optimized Two-Level Ensemble Model for Predicting the Parameters of Metamaterial Antenna
    Abdelhamid, Abdelaziz A.
    Alotaibi, Sultan R.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 917 - 933
  • [3] Robust Prediction of the Bandwidth of Metamaterial Antenna Using Deep Learning
    Abdelhamid, Abdelaziz A.
    Alotaibi, Sultan R.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 2305 - 2321
  • [4] A novel SVM-kNN-PSO ensemble method for intrusion detection system
    Aburomman, Abdulla Amin
    Reaz, Mamun Bin Ibne
    [J]. APPLIED SOFT COMPUTING, 2016, 38 : 360 - 372
  • [5] A Smart Home Energy Management System Using IoT and Big Data Analytics Approach
    Al-Ali, A. R.
    Zualkernan, Imran A.
    Rashid, Mohammed
    Gupta, Ragini
    AliKarar, Mazin
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2017, 63 (04) : 426 - 434
  • [6] Network Intrusion Detection Leveraging Machine Learning and Feature Selection
    Ali, Arshid
    Shaukat, Shahtaj
    Tayyab, Muhammad
    Khan, Muazzam A.
    Khan, Jan Sher
    Arshad
    Ahmad, Jawad
    [J]. 2020 IEEE 17TH INTERNATIONAL CONFERENCE ON SMART COMMUNITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEEHONET 2020), 2020, : 49 - 53
  • [7] TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
    Alsaedi, Abdullah
    Moustafa, Nour
    Tari, Zahir
    Mahmood, Abdun
    Anwar, Adnan
    [J]. IEEE ACCESS, 2020, 8 : 165130 - 165150
  • [8] Amin MS, 2017, INT J COMPUT SCI NET, V17, P231
  • [9] A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions
    Asharf, Javedz
    Moustafa, Nour
    Khurshid, Hasnat
    Debie, Essam
    Haider, Waqas
    Wahab, Abdul
    [J]. ELECTRONICS, 2020, 9 (07)
  • [10] Bansal A., 2018, INT C ADV COMPUTING, P372, DOI DOI 10.1007/978-981-13-1810-8_37