An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron

被引:11
作者
Alazab, Moutaz [1 ]
Abu Khurma, Ruba [2 ]
Castillo, Pedro A. [3 ]
Abu-Salih, Bilal [4 ]
Martin, Alejandro [5 ]
Camacho, David [5 ]
机构
[1] Al Balqa Appl Univ, Fac Artificial Intelligence, Amman, Jordan
[2] Middle East Univ, Fac Informat Technol, MEU Res Unit, Amman, Jordan
[3] Univ Granada, Dept Comp Engn Automat & Robot, Granada, Spain
[4] Univ Jordan, King Abdullah II School Informat Technol, Amman, Jordan
[5] Univ Politecn Madrid, Dept Comp Syst Engn, Madrid, Spain
关键词
Multi-layer perceptron (MLP); Harris Hawks optimization (HHO); Intrusion detection system (IDS); DETECTION SYSTEM; FEATURE-SELECTION; MACHINE; MALWARE;
D O I
10.1016/j.eij.2023.100423
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes an Intrusion Detection System (IDS) employing the Harris Hawks Optimization algorithm (HHO) to optimize Multilayer Perceptron learning by optimizing bias and weight parameters. HHO-MLP aims to select optimal parameters in its learning process to minimize intrusion detection errors in networks. HHO-MLP has been implemented using EvoloPy NN framework, an open-source Python tool specialized for training MLPs using evolutionary algorithms. For purposes of comparing the HHO model against other evolutionary methodologies currently available, specificity and sensitivity measures, accuracy measures, and mse and rmse measures have been calculated using KDD datasets. Experiments have demonstrated the HHO MLP method is effective at identifying malicious patterns. HHO-MLP has been tested against evolutionary algorithms like Butterfly Optimization Algorithm (BOA), Grasshopper Optimization Algorithms (GOA), and Black Widow Optimizations (BOW), with validation by Random Forest (RF), XGBoost. HHO-MLP showed superior performance by attaining top scores with accuracy rate of 93.17%, sensitivity level of 89.25%, and specificity percentage of 95.41%.
引用
收藏
页数:9
相关论文
共 38 条
[21]   Harris hawks optimization: Algorithm and applications [J].
Heidari, Ali Asghar ;
Mirjalili, Seyedali ;
Faris, Hossam ;
Aljarah, Ibrahim ;
Mafarja, Majdi ;
Chen, Huiling .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :849-872
[22]   Optimal Sink Node Placement in Large Scale Wireless Sensor Networks Based on Harris' Hawk Optimization Algorithm [J].
Houssein, Essam H. ;
Saad, Mohammed R. ;
Hussain, Kashif ;
Zhu, William ;
Shaban, Hassan ;
Hassaballah, M. .
IEEE ACCESS, 2020, 8 :19381-19397
[23]  
Kalaivani S, 2019, INT CONF ADVAN COMPU, P185, DOI [10.1109/icaccs.2019.8728450, 10.1109/ICACCS.2019.8728450]
[24]   Hybridization of K-Means and Firefly Algorithm for intrusion detection system [J].
Kaur A. ;
Pal S.K. ;
Singh A.P. .
International Journal of System Assurance Engineering and Management, 2018, 9 (04) :901-910
[25]   SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks [J].
Kumar, Prahlad ;
Bagga, Harnoor ;
Netam, Bhuneshwar Singh ;
Uduthalapally, Venkanna .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (01) :87-108
[26]   Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks [J].
Lin, Limei ;
Huang, Yanze ;
Xu, Li ;
Hsieh, Sun-Yuan .
IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (11) :2968-2981
[27]   APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition [J].
Marques, Rafael Salema ;
Al-Khateeb, Haider ;
Epiphaniou, Gregory ;
Maple, Carsten .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :700-715
[28]   Cyber intrusion detection by combined feature selection algorithm [J].
Mohammadi, Sara ;
Mirvaziri, Hamid ;
Ghazizadeh-Ahsaee, Mostafa ;
Karimipour, Hadis .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 :80-88
[29]   Effective approach toward Intrusion Detection System using data mining techniques [J].
Nadiammai, G. V. ;
Hemalatha, M. .
EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (01) :37-50
[30]   Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things [J].
Naik, Bighnaraj ;
Obaidat, Mohammad S. ;
Nayak, Janmenjoy ;
Pelusi, Danilo ;
Vijayakumar, Pandi ;
Islam, S. K. Hafizul .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) :1947-1956