Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems

被引:5
作者
Alkanhel, Reem [1 ]
Khafaga, Doaa Sami [2 ]
El-kenawy, El-Sayed M. [3 ]
Abdelhamid, Abdelaziz A. [4 ,5 ]
Ibrahim, Abdelhameed [6 ]
Amin, Rashid [7 ]
Abotaleb, Mostafa [8 ]
El-den, B. M. [6 ]
机构
[1] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[4] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[5] Shaqra Univ, Coll Comp & Informat Technol, Dept Comp Sci, Sahqra 11961, Saudi Arabia
[6] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
[7] Univ Engn & Technol, Dept Comp Sci, Taxila, Pakistan
[8] South Ural State Univ, Dept Syst Programming, Chelyabinsk 454080, Russia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Metaheuristics; grey wolf optimization; dipper throated optimization; dataset balancing; locality sensitive hashing; SMOTE; CYBER-ATTACK DETECTION; FEATURE-SELECTION; META-HEURISTICS; VOTING CLASSIFIER; 6LOWPAN NETWORKS; ENSEMBLE; INTERNET; THINGS; ALGORITHM; SECURITY;
D O I
10.32604/cmc.2023.033153
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a modern approach that enables connection with a wide variety of devices remotely. Due to the resource constraints and open nature of IoT nodes, the routing protocol for low power and lossy (RPL) networks may be vulnerable to several routing attacks. That's why a network intrusion detection system (NIDS) is needed to guard against routing assaults on RPL-based IoT networks. The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks. Therefore, we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique (LSH-SMOTE). The proposed optimiza-tion approach is based on a new hybrid between the grey wolf and dipper throated optimization algorithms. To prove the effectiveness of the proposed approach, a set of experiments were conducted to evaluate the performance of NIDS for three cases, namely, detection without dataset balancing, detection with SMOTE balancing, and detection with the proposed optimized LSH-SOMTE balancing. Experimental results showed that the proposed approach outperforms the other approaches and could boost the detection accuracy. In addition, a statistical analysis is performed to study the significance and stability of the proposed approach. The conducted experiments include seven different types of attack cases in the RPL-NIDS17 dataset. Based on the proposed approach, the achieved accuracy is (98.1%), sensitivity is (97.8%), and specificity is (98.8%).
引用
收藏
页码:2695 / 2709
页数:15
相关论文
共 50 条
  • [41] A Hybrid of Grey Wolf Optimization and Genetic Algorithm for Optimization of Hybrid Wind and Solar Renewable Energy System
    Diriba Kajela Geleta
    Mukhdeep Singh Manshahia
    Journal of the Operations Research Society of China, 2022, 10 : 749 - 762
  • [42] A Hybrid of Grey Wolf Optimization and Genetic Algorithm for Optimization of Hybrid Wind and Solar Renewable Energy System
    Geleta, Diriba Kajela
    Manshahia, Mukhdeep Singh
    JOURNAL OF THE OPERATIONS RESEARCH SOCIETY OF CHINA, 2022, 10 (04) : 749 - 762
  • [43] Wind Power Curve Modeling With Hybrid Copula and Grey Wolf Optimization
    Wei, Danxiang
    Wang, Jianzhou
    Li, Zhiwu
    Wang, Rui
    IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2022, 13 (01) : 265 - 276
  • [44] Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
    Ayo, Femi Emmanuel
    Folorunso, Sakinat Oluwabukonla
    Abayomi-Alli, Adebayo A.
    Adekunle, Adebola Olayinka
    Awotunde, Joseph Bamidele
    INFORMATION SECURITY JOURNAL, 2020, 29 (06): : 267 - 283
  • [45] A hybrid Grey Wolf Optimization and Particle Swarm Optimization with C4.5 approach for prediction of Rheumatoid Arthritis
    Sundaramurthy, Shanmugam
    Jayavel, Preethi
    APPLIED SOFT COMPUTING, 2020, 94
  • [46] Intrusion detection and prevention systems in industrial IoT network
    Sharma, Sangeeta
    Kumar, Ashish
    Rathore, Navdeep Singh
    Sharma, Shivanshu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [47] Intrusion Detection System Using Hybrid Convolutional Neural Network
    Samha, Amani K.
    Malik, Nidhi
    Sharma, Deepak
    Kavitha, S.
    Dutta, Papiya
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (6) : 1719 - 1731
  • [48] A hybrid machine learning method for increasing the performance of network intrusion detection systems
    Achmad Akbar Megantara
    Tohari Ahmad
    Journal of Big Data, 8
  • [49] Hybrid Relabeled Model for Network Intrusion Detection
    Patel, Bhumika
    Somani, Zaheenabanu
    Ajila, Samuel A.
    Lung, Chung-Horng
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 872 - 877
  • [50] Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures
    Francisco Colom, Jose
    Gil, David
    Mora, Higinio
    Volckaert, Bruno
    Manuel Jimeno, Antonio
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 76 - 86