Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems

被引:5
|
作者
Alkanhel, Reem [1 ]
Khafaga, Doaa Sami [2 ]
El-kenawy, El-Sayed M. [3 ]
Abdelhamid, Abdelaziz A. [4 ,5 ]
Ibrahim, Abdelhameed [6 ]
Amin, Rashid [7 ]
Abotaleb, Mostafa [8 ]
El-den, B. M. [6 ]
机构
[1] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[4] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[5] Shaqra Univ, Coll Comp & Informat Technol, Dept Comp Sci, Sahqra 11961, Saudi Arabia
[6] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
[7] Univ Engn & Technol, Dept Comp Sci, Taxila, Pakistan
[8] South Ural State Univ, Dept Syst Programming, Chelyabinsk 454080, Russia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Metaheuristics; grey wolf optimization; dipper throated optimization; dataset balancing; locality sensitive hashing; SMOTE; CYBER-ATTACK DETECTION; FEATURE-SELECTION; META-HEURISTICS; VOTING CLASSIFIER; 6LOWPAN NETWORKS; ENSEMBLE; INTERNET; THINGS; ALGORITHM; SECURITY;
D O I
10.32604/cmc.2023.033153
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a modern approach that enables connection with a wide variety of devices remotely. Due to the resource constraints and open nature of IoT nodes, the routing protocol for low power and lossy (RPL) networks may be vulnerable to several routing attacks. That's why a network intrusion detection system (NIDS) is needed to guard against routing assaults on RPL-based IoT networks. The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks. Therefore, we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique (LSH-SMOTE). The proposed optimiza-tion approach is based on a new hybrid between the grey wolf and dipper throated optimization algorithms. To prove the effectiveness of the proposed approach, a set of experiments were conducted to evaluate the performance of NIDS for three cases, namely, detection without dataset balancing, detection with SMOTE balancing, and detection with the proposed optimized LSH-SOMTE balancing. Experimental results showed that the proposed approach outperforms the other approaches and could boost the detection accuracy. In addition, a statistical analysis is performed to study the significance and stability of the proposed approach. The conducted experiments include seven different types of attack cases in the RPL-NIDS17 dataset. Based on the proposed approach, the achieved accuracy is (98.1%), sensitivity is (97.8%), and specificity is (98.8%).
引用
收藏
页码:2695 / 2709
页数:15
相关论文
共 50 条
  • [21] A Community Detection Algorithm by Utilizing Grey Wolf Optimization
    Han, Cong
    Chen, Mei
    Pan, Lina
    Chen, Xiaoyun
    2017 9TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION AND CONTROL (ICMIC 2017), 2017, : 567 - 572
  • [22] Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm
    Alweshah, Mohammed
    Alkhalaileh, Saleh
    Beseiso, Majdi
    Almiani, Muder
    Abdullah, Salwani
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (10) : 12278 - 12309
  • [23] Applying Improved Grey Wolf Optimizer Algorithm Integrated with Cuckoo Search to Feature Selection for Network Intrusion Detection
    Xu H.
    Fu Y.
    Liu X.
    Fang C.
    Su J.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2018, 50 (05): : 160 - 166
  • [24] Forecasting Energy Consumption Using a Novel Hybrid Dipper Throated Optimization and Stochastic Fractal Search Algorithm
    Khafaga, Doaa Sami
    El-kenawy, El-Sayed M.
    Alhussan, Amel Ali
    Eid, Marwa M.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02) : 2117 - 2132
  • [25] Efficient application mapping approach based on grey wolf optimization for network on chip
    Amin, Waqar
    Hussain, Fawad
    Anjum, Sheraz
    Saleem, Sharoon
    Baloch, Naveed Khan
    Bin Zikria, Yousaf
    Yu, Heejung
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 219
  • [26] Grey Wolf Optimization-Based Deep Neural Network for a Flexible Job Shop Scheduling Problem
    Mihoubi, Bachir
    Gaham, Mehdi
    Kouider, Ahmed
    PROGRAM OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATIC CONTROL, ICEEAC 2024, 2024,
  • [27] Intelligent Hybrid Anomaly Network Intrusion Detection System
    Eid, Heba F.
    Darwish, Ashraf
    Hassanien, Aboul Ella
    Kim, Tai-hoon
    COMMUNICATION AND NETWORKING, PT I, 2011, 265 : 209 - +
  • [28] A Hybrid Classification Approach for Intrusion Detection in IoT Network
    Choudhary, Sarika
    Kesswani, Nishtha
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2021, 80 (09): : 809 - 816
  • [29] A hybrid optimization approach for graph embedding: leveraging Node2Vec and grey wolf optimization
    Rabiei, Mahdi
    Fartash, Mahdi
    Nazari, Sara
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04)
  • [30] Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system
    Devi, E. M. Roopa
    Suganthe, R. C.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (04)