Toward support-vector machine-based ant colony optimization algorithms for intrusion detection

被引:13
作者
Alqarni, Ahmed Abdullah [1 ]
机构
[1] Al Baha Univ, Dept Comp Sci & Informat Technol, Al Baha, Saudi Arabia
关键词
Machine learning; Computation algorithms; Network traffic analysis; Cybersecurity; MODEL;
D O I
10.1007/s00500-023-07906-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the major challenges of network traffic analysis is intrusion detection. Intrusion detection systems (IDSs) are designed to detect malicious activities that attempt to compromise the confidentiality, integrity, and assurance of computer systems. Intrusion detection system has become the most widely employed security technology. The novelty of the proposed research is to develop a system for IDSs. In this research, a support-vector machine (SVM) with ant colony optimization (ACO) is proposed to detect an intrusion. Standard data sets, namely Knowledge Discovery and Data Mining (KDD) Cup '99 and Network Security Laboratory (NSL)-KDD, were utilized to test the results of the proposed system. One of the greatest challenges in a network analysis dataset is dimensionality. To handle dimensionality reduction, the ant colony optimization algorithm was applied. In the ACO method, significant subset features are selected from the entire dataset. These subset features have proceeded the SVM machine learning algorithm for detection intrusion. The empirical results point out that the SVM with ACO has obtained superior accuracy. It is concluded that the SVM-ACO model can more efficiently protect a network system from intrusion.
引用
收藏
页码:6297 / 6305
页数:9
相关论文
共 25 条
[1]   Modeling of Compressive Strength of Sustainable Self-Compacting Concrete Incorporating Treated Palm Oil Fuel Ash Using Artificial Neural Network [J].
Al-Mughanam, Tawfiq ;
Aldhyani, Theyazn H. H. ;
Alsubari, Belal ;
Al-Yaari, Mohammed .
SUSTAINABILITY, 2020, 12 (22) :1-13
[2]  
Aldhyani T. H. H., 2017, INT J COMPUT SCI APP, V14, P130
[3]   RETRACTED: Water Quality Prediction Using Artificial Intelligence Algorithms (Retracted Article) [J].
Aldhyani, Theyazn H. H. ;
Al-Yaari, Mohammed ;
Alkahtani, Hasan ;
Maashi, Mashael .
APPLIED BIONICS AND BIOMECHANICS, 2020, 2020
[4]   Intelligent Hybrid Model to Enhance Time Series Models for Predicting Network Traffic [J].
Aldhyani, Theyazn H. H. ;
Alrasheedi, Melfi ;
Alqarni, Ahmed Abdullah ;
Alzahrani, Mohammed Y. ;
Bamhdi, Alwi M. .
IEEE ACCESS, 2020, 8 :130431-130451
[5]   RETRACTED: Adaptive Anomaly Detection Framework Model Objects in Cyberspace (Retracted article. See vol. 2023, 2023) [J].
Alkahtani, Hasan ;
Aldhyani, Theyazn H. H. ;
Al-Yaari, Mohammed .
APPLIED BIONICS AND BIOMECHANICS, 2020, 2020
[6]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[7]  
[Anonymous], 2017, International Journal of Computer Applications, DOI DOI 10.5120/IJCA2017914079
[8]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95
[9]  
Bassey J, 2019, 2019 FOURTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P98, DOI [10.1109/FMEC.2019.8795319, 10.1109/fmec.2019.8795319]
[10]  
Bose S., 2007, P IEEE INT C SIGN PR, V22-24, P360, DOI DOI 10.1109/ICSCN.2007.350763