Probe Attack Detection Using an Improved Intrusion Detection System

被引:7
作者
Almazyad, Abdulaziz [1 ]
Halman, Laila [1 ]
Alsaeed, Alaa [1 ]
机构
[1] King Saud Univ, Coll Comp Sci, Dept Comp Engn, Riyadh 11421, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 03期
关键词
GWO; IDS; InSDN; LightGBM; probe attack; SDN;
D O I
10.32604/cmc.2023.033382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The novel Software Defined Networking (SDN) architecture poten-tially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive features. Nevertheless, such benefits lead to a more adverse environment entailing network breakdown, systems paralysis, and online banking fraudulence and robbery. As one of the most common and dangerous threats in SDN, probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities, which is then manipulated to undermine the entire system. Precision, high per-formance, and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time, optimize prediction performance, and provide a holistic understanding of machine learning data. As the extension of astute machine learning algorithms into an Intrusion Detection System (IDS) through SDN has garnered much scholarly attention within the past decade, this study recommended an effective IDS under the Grey-wolf optimizer (GWO) and Light Gradient Boosting Machine (Light-GBM) classifier for probe attack identification. The InSDN dataset was employed to train and test the proposed IDS, which is deemed to be a novel benchmarking dataset in SDN. The proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within SDN. The results revealed that the proposed IDS outperforms the state-of-the-art IDSs, as it achieved 99.8% accuracy, 99.7% recall, 99.99% precision, and 99.8% F-measure.
引用
收藏
页码:4769 / 4784
页数:16
相关论文
共 50 条
  • [41] A Hybrid Approach for Intrusion Detection System
    Hariyale, Neelam
    Rathore, Manjari Singh
    Prasad, Ritu
    Saurabh, Praneet
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 1, 2020, 1048 : 391 - 403
  • [42] VoIP Intrusion Detection System with Snort
    Ciz, Pavol
    Labaj, Ondrej
    Podhradsky, Pavol
    Londak, Juraj
    PROCEEDINGS ELMAR-2012, 2012, : 137 - 140
  • [43] Analysis of Modern Intrusion Detection System
    Titorenko, Aleksey A.
    Frolov, Alexey A.
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 142 - 143
  • [44] MODEL OF DISTRIBUTED INTRUSION DETECTION SYSTEM
    Trifonov, Vencisalv
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2010, 2 (02): : 67 - 72
  • [45] A Brief Introduction to Intrusion Detection System
    Mohamed, Ashara Banu
    Idris, Norbik Bashah
    Shanmugum, Bharanidharan
    TRENDS IN INTELLIGENT ROBOTICS, AUTOMATION, AND MANUFACTURING, 2012, 330 : 263 - 271
  • [46] Encrusted CRF in Intrusion Detection System
    Jinny, S. Vinila
    Kumari, J. Jaya
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 605 - 613
  • [47] A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS
    Panos, Christoforos
    Xenakis, Christos
    Stavrakakis, Ioannis
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 25 - 34
  • [48] Intrusion Detection System in Python']Python
    Wahal, Mrinal
    Choudhury, Tanupriya
    Arora, Manik
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 348 - 353
  • [49] CAN Intrusion Detection System Based on Data Augmentation and Improved Bi-LSTM
    Zhao, Haihang
    Cheng, Anyu
    Wang, Yi
    Wang, Shanshan
    Wang, Hongrong
    2024 IEEE THE 20TH ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS 2024, 2024, : 198 - 202
  • [50] A collaborative intrusion detection system using log server and neural networks
    Guan, Donghai
    Wang, Kejun
    Ye, Xiufen
    Feng, Weixing
    2005 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATIONS, VOLS 1-4, CONFERENCE PROCEEDINGS, 2005, : 874 - 877