Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems

被引:5
|
作者
Alkanhel, Reem [1 ]
Khafaga, Doaa Sami [2 ]
El-kenawy, El-Sayed M. [3 ]
Abdelhamid, Abdelaziz A. [4 ,5 ]
Ibrahim, Abdelhameed [6 ]
Amin, Rashid [7 ]
Abotaleb, Mostafa [8 ]
El-den, B. M. [6 ]
机构
[1] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[4] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[5] Shaqra Univ, Coll Comp & Informat Technol, Dept Comp Sci, Sahqra 11961, Saudi Arabia
[6] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
[7] Univ Engn & Technol, Dept Comp Sci, Taxila, Pakistan
[8] South Ural State Univ, Dept Syst Programming, Chelyabinsk 454080, Russia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Metaheuristics; grey wolf optimization; dipper throated optimization; dataset balancing; locality sensitive hashing; SMOTE; CYBER-ATTACK DETECTION; FEATURE-SELECTION; META-HEURISTICS; VOTING CLASSIFIER; 6LOWPAN NETWORKS; ENSEMBLE; INTERNET; THINGS; ALGORITHM; SECURITY;
D O I
10.32604/cmc.2023.033153
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a modern approach that enables connection with a wide variety of devices remotely. Due to the resource constraints and open nature of IoT nodes, the routing protocol for low power and lossy (RPL) networks may be vulnerable to several routing attacks. That's why a network intrusion detection system (NIDS) is needed to guard against routing assaults on RPL-based IoT networks. The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks. Therefore, we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique (LSH-SMOTE). The proposed optimiza-tion approach is based on a new hybrid between the grey wolf and dipper throated optimization algorithms. To prove the effectiveness of the proposed approach, a set of experiments were conducted to evaluate the performance of NIDS for three cases, namely, detection without dataset balancing, detection with SMOTE balancing, and detection with the proposed optimized LSH-SOMTE balancing. Experimental results showed that the proposed approach outperforms the other approaches and could boost the detection accuracy. In addition, a statistical analysis is performed to study the significance and stability of the proposed approach. The conducted experiments include seven different types of attack cases in the RPL-NIDS17 dataset. Based on the proposed approach, the achieved accuracy is (98.1%), sensitivity is (97.8%), and specificity is (98.8%).
引用
收藏
页码:2695 / 2709
页数:15
相关论文
共 50 条
  • [1] Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
    Khafaga, Doaa Sami
    El-kenawy, El-Sayed M.
    Karim, Faten Khalid
    Abotaleb, Mostafa
    Ibrahim, Abdelhameed
    Abdelhamid, Abdelaziz A.
    Elsheweikh, D. L.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4531 - 4545
  • [2] Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization
    Alzubi, Qusay M.
    Anbar, Mohammed
    Sanjalawe, Yousef
    Al-Betar, Mohammed Azmi
    Abdullah, Rosni
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 204
  • [3] Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
    Alkanhel, Reem
    El-kenawy, El-Sayed M.
    Abdelhamid, Abdelaziz A.
    Ibrahim, Abdelhameed
    Alohali, Manal Abdullah
    Abotaleb, Mostafa
    Khafaga, Doaa Sami
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 2677 - 2693
  • [4] Innovative Feature Selection Method Based on Hybrid Sine Cosine and Dipper Throated Optimization Algorithms
    Abdelhamid, Abdelaziz A.
    El-Kenawy, El-Sayed M.
    Ibrahim, Abdelhameed
    Eid, Marwa Metwally
    Khafaga, Doaa Sami
    Alhussan, Amel Ali
    Mirjalili, Seyedali
    Khodadadi, Nima
    Lim, Wei Hong
    Shams, Mahmoud Y.
    IEEE ACCESS, 2023, 11 : 79750 - 79776
  • [5] A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System
    Alzaqebah, Abdullah
    Aljarah, Ibrahim
    Al-Kadi, Omar
    Damasevicius, Robertas
    MATHEMATICS, 2022, 10 (06)
  • [6] Binary Optimization Using Hybrid Grey Wolf Optimization for Feature Selection
    Al-Tashi, Qasem
    Kadir, Said Jadid Abdul
    Rais, Helmi Md
    Mirjalili, Seyedali
    Alhussian, Hitham
    IEEE ACCESS, 2019, 7 : 39496 - 39508
  • [7] A hybrid LSTM random forest model with grey wolf optimization for enhanced detection of multiple bearing faults
    Djaballah, Said
    Saidi, Lotfi
    Meftah, Kamel
    Hechifa, Abdelmoumene
    Bajaj, Mohit
    Zaitsev, Ievgen
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [8] A novel combinatorial optimization based feature selection method for network intrusion detection
    Nazir, Anjum
    Khan, Rizwan Ahmed
    COMPUTERS & SECURITY, 2021, 102
  • [9] Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
    Alqahtany, Saad Said
    Shaikh, Asadullah
    Alqazzaz, Ali
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [10] Intrusion detection of industrial control system based on grey wolf optimization integrated random black hole
    Geng Z.
    Zeng R.
    Xu Y.
    Han Y.
    Gu X.
    Huagong Xuebao/CIESC Journal, 2020, 71 (03): : 1080 - 1087