Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

被引:5
作者
Khafaga, Doaa Sami [1 ]
Karim, Faten Khalid [1 ]
Abdelhamid, Abdelaziz A. [2 ,3 ]
El-kenawy, El-Sayed M. [4 ]
Alkahtani, Hend K. [1 ]
Khodadadi, Nima [5 ]
Hadwan, Mohammed [6 ]
Ibrahim, Abdelhameed [7 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
[2] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[3] Shaqra Univ, Coll Comp & Informat Technol, Dept Comp Sci, Shaqra 11961, Saudi Arabia
[4] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[5] Florida Int Univ, Dept Civil & Environm Engn, Miami, FL USA
[6] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
[7] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Voting classifier; whale optimization algorithm; dipper throated optimization; intrusion detection; internet-of-things; INDUSTRIAL INTERNET; IOT; ALGORITHM;
D O I
10.32604/cmc.2023.033513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Managing physical objects in the network's periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems' effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper throated optimizer (DTO) to improve the exploration process of the traditional WOA optimizer. The proposed voting classifier categorizes the network intrusions robustly and efficiently. To assess the proposed approach, a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack categorization. The dataset records are balanced using the locality-sensitive hashing (LSH) and Synthetic Minority Oversampling Technique (SMOTE). The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach's effectiveness, stability, and significance. The achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
引用
收藏
页码:3183 / 3198
页数:16
相关论文
共 46 条
[31]   An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things [J].
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4815-4830
[32]  
Mustafa N., 2019, TON IOT DATASET
[33]  
Panigrahi R., 2018, INT J ENG TECHNOL, V7, P479, DOI [10.14419/ijet.v7i3.24.22797, DOI 10.14419/IJET.V7I3.24.22797]
[34]   Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution [J].
Qayyum, Abdullah ;
Ahmad, Jawad ;
Boulila, Wadii ;
Rubaiee, Saeed ;
Arshad ;
Masood, Fawad ;
Khan, Fawad ;
Buchanan, William J. .
IEEE ACCESS, 2020, 8 :140876-140895
[35]  
Raschka S, 2015, PYTHON MACHINE LEARN
[36]  
Robert L., 2016, US ELECT INFORM SHAR, V1, P1
[37]  
Salam A, 2019, 2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P398, DOI [10.1109/WF-IoT.2019.8767358, 10.1109/wf-iot.2019.8767358]
[38]   Dynamic Voting Classifier for Risk Identification in Supply Chain 4.0 [J].
Salamai, Abdullah Ali ;
El-kenawy, El-Sayed M. ;
Abdelhameed, Ibrahim .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (03) :3749-3766
[39]   Detecting the Security Level of Various Cryptosystems Using Machine Learning Models [J].
Shafique, Arslan ;
Ahmed, Jameel ;
Boulila, Wadii ;
Ghandorh, Hamzah ;
Ahmad, Jawad ;
Rehman, Mujeeb Ur .
IEEE ACCESS, 2021, 9 :9383-9393
[40]  
Vaca F.D., 2018, NCA 2018 2018 IEEE 1, DOI DOI 10.1109/NCA.2018.8548315