Probe Attack Detection Using an Improved Intrusion Detection System

被引:7
作者
Almazyad, Abdulaziz [1 ]
Halman, Laila [1 ]
Alsaeed, Alaa [1 ]
机构
[1] King Saud Univ, Coll Comp Sci, Dept Comp Engn, Riyadh 11421, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 03期
关键词
GWO; IDS; InSDN; LightGBM; probe attack; SDN;
D O I
10.32604/cmc.2023.033382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The novel Software Defined Networking (SDN) architecture poten-tially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive features. Nevertheless, such benefits lead to a more adverse environment entailing network breakdown, systems paralysis, and online banking fraudulence and robbery. As one of the most common and dangerous threats in SDN, probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities, which is then manipulated to undermine the entire system. Precision, high per-formance, and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time, optimize prediction performance, and provide a holistic understanding of machine learning data. As the extension of astute machine learning algorithms into an Intrusion Detection System (IDS) through SDN has garnered much scholarly attention within the past decade, this study recommended an effective IDS under the Grey-wolf optimizer (GWO) and Light Gradient Boosting Machine (Light-GBM) classifier for probe attack identification. The InSDN dataset was employed to train and test the proposed IDS, which is deemed to be a novel benchmarking dataset in SDN. The proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within SDN. The results revealed that the proposed IDS outperforms the state-of-the-art IDSs, as it achieved 99.8% accuracy, 99.7% recall, 99.99% precision, and 99.8% F-measure.
引用
收藏
页码:4769 / 4784
页数:16
相关论文
共 50 条
  • [31] Using Artificial Immune System on Implementation of Intrusion Detection Systems
    EshghiShargh, Aref
    2009 THIRD UKSIM EUROPEAN SYMPOSIUM ON COMPUTER MODELING AND SIMULATION (EMS 2009), 2009, : 164 - 168
  • [32] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [33] Scalable and Dynamic Network Intrusion Detection and Prevention System
    Mahrach, Safaa
    Mjihil, Oussama
    Haqiq, Abdelkrim
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017, 2018, 735 : 318 - 328
  • [34] Enhancing Online Intrusion Detection Systems via Attack Clustering
    Yavari, Sara
    Oteafy, Sharief
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 4650 - 4655
  • [35] Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology
    Ramu, Ch. Kodanda
    Rao, T. Srinivasa
    Rao, E. Uma Shankar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (31) : 75533 - 75555
  • [36] A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things
    Deshmukh-Bhosale, Snehal
    Sonavane, Santosh S.
    12TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2018), 2019, 32 : 840 - 847
  • [37] The design of an intrusion detection system in MANET using the IGWO-ANN classification algorithm
    Venketesh, R.
    Sasikala, K.
    International Journal of Networking and Virtual Organisations, 2024, 31 (01) : 22 - 42
  • [38] SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks
    Manso, Pedro
    Moura, Jose
    Serrao, Carlos
    INFORMATION, 2019, 10 (03)
  • [39] Research on Reconfigurable Intrusion Detection System
    Zhao Liang
    Zhang Xiao-hui
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 913 - 917
  • [40] Intrusion Detection System: Classification and Techniques
    Soniya, S. Sobin
    Vigila, S. Maria Celestin
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,