Fuzzy and Real-Coded Chemical Reaction Optimization for Intrusion Detection in Industrial Big Data Environment

被引:24
作者
Ding, Weiping [1 ]
Nayak, Janmenjoy [2 ]
Naik, Bighnaraj [3 ]
Pelusi, Danilo [4 ]
Mishra, Manohar [5 ]
机构
[1] Nantong Univ, Sch Informat Sci & Technol, Nantong 226019, Peoples R China
[2] Aditya Inst Technol & Management, Dept Comp Sci & Engn, Tekkali 532201, India
[3] Veer Surendra Sai Univ Technol VSSUT, Dept Comp Applicat, Burla 768018, Odisha, India
[4] Univ Teramo, Fac Commun Sci, I-64100 Teramo, Italy
[5] Siksha O Anusandhan Univ, Inst Tech Educ & Res, Bhubaneswar 751030, India
关键词
Big Data; Intrusion detection; Feature extraction; Chemicals; Data models; Computational modeling; Complexity theory; Fuzzy C-means; IDS; real-coded chemical reaction optimization; flexible mutual information feature selection; Apache spark; ALGORITHM;
D O I
10.1109/TII.2020.3007419
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analysis and modeling of the intrusion detection system is an important phenomenon for any communication network, which helps to monitor the network traffic and avoid suspicious activity in the Big Data environment. The machine learning approach for modeling the intrusion detection system requires analysis of large network data, which may include some irrelevant features resulting in unnecessary computational and analytical burden. In this article, a fuzzy and real coded chemical reaction optimization-based cluster analysis approach with feature selection is proposed for the intrusion detection system in a Big Data platform. The proposed cluster analysis model is achieved through Fuzzy C-Mean (FCM) with real-coded chemical reaction optimization, which boosts FCM to start with optimized cluster centers. Also, the use of the Flexible Mutual Information Feature Selection approach helps this model to avoid the processing of a large number of features, which drastically affects processing elements.
引用
收藏
页码:4298 / 4307
页数:10
相关论文
共 35 条
  • [1] Adám N, 2017, 2017 IEEE 15TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI), P159, DOI 10.1109/SAMI.2017.7880294
  • [2] Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection
    Al-Jarrah, Omar Y.
    Alhussein, Omar
    Yoo, Paul D.
    Muhaidat, Sami
    Taha, Kamal
    Kim, Kwangjo
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (08) : 1796 - 1806
  • [3] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998
  • [4] [Anonymous], 2018, Apache Spark - Unified Analytics Engine for Big Data
  • [5] Fuzziness based semi-supervised learning approach for intrusion detection system
    Ashfaq, Rana Aamir Raza
    Wang, Xi-Zhao
    Huang, Joshua Zhexue
    Abbas, Haider
    He, Yu-Lin
    [J]. INFORMATION SCIENCES, 2017, 378 : 484 - 497
  • [6] Gene expression profile classification: A review
    Asyali, Musa H.
    Colak, Dilek
    Demirkaya, Omer
    Inan, Mehmet S.
    [J]. CURRENT BIOINFORMATICS, 2006, 1 (01) : 55 - 73
  • [7] Bailey M, 2017, 2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), P615, DOI 10.1109/SNPD.2017.8022786
  • [8] USING MUTUAL INFORMATION FOR SELECTING FEATURES IN SUPERVISED NEURAL-NET LEARNING
    BATTITI, R
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 1994, 5 (04): : 537 - 550
  • [9] FCM - THE FUZZY C-MEANS CLUSTERING-ALGORITHM
    BEZDEK, JC
    EHRLICH, R
    FULL, W
    [J]. COMPUTERS & GEOSCIENCES, 1984, 10 (2-3) : 191 - 203
  • [10] Britel M., 2018, P INT C EL CONTR OPT, P1