Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system

被引:66
作者
Al-Yaseen, Wathiq Laftah [1 ]
Idrees, Ali Kadhum [2 ]
Almasoudy, Faezah Hamad [3 ]
机构
[1] Al Furat Al Awsat Tech Univ, Kerbala Tech Inst, Kerbala 56001, Iraq
[2] Univ Babylon, Dept Comp Sci, Babylon, Iraq
[3] Univ Kerbala, Coll Agr, Dept Anim Prod, Karbala, Iraq
关键词
Intrusion detection system (IDS); Feature selection; Differential evolution (DE); Extreme learning machine (ELM); NSL-KDD; ALGORITHM; NETWORK; OPTIMIZATION; SECURITY; ATTACKS;
D O I
10.1016/j.patcog.2022.108912
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The intrusion detection system (IDS) has gained a rapid increase of interest due to its widely recognized potential in various security fields, however, it suffers from several challenges. Different network datasets have several redundant and irrelevant features that affect the decision of the IDS classifier. Therefore, it is essential to decrease these features to improve the system performance. In this paper, an efficient wrap-per feature selection method is proposed for improving the performance and decreasing the processing time of the IDS. The proposed approach employs a differential evaluation algorithm to select the useful features whilst the extreme learning machine classifier is applied after feature selection to evaluate the selected features. Many experiments are performed using the full NSL-KDD dataset to evaluate the per-formance of the proposed method. The results prove that the proposed approach can efficiently reduce the features, increase the accuracy, reduce the false alarm rates, and improve the processing time of the IDS in comparison to other recent related works.(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 38 条
[1]   An IWD-based feature selection method for intrusion detection system [J].
Acharya, Neha ;
Singh, Shailendra .
SOFT COMPUTING, 2018, 22 (13) :4407-4416
[2]   Building A Fast Intrusion Detection System For High-Speed-Networks: Probe and DoS Attacks Detection [J].
Ait Tchakoucht, Taha ;
Ezziyyani, Mostafa .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :521-530
[3]   A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms [J].
Almomani, Omar .
SYMMETRY-BASEL, 2020, 12 (06) :1-20
[4]  
Alsakran Faisal, 2020, Security in Computing and Communications: 7th International Symposium, SSCC 2019. Communications in Computer and Information Science (1208), P87, DOI 10.1007/978-981-15-4825-3_7
[5]  
[Anonymous], 2017, INDIAN J SCI TECHNOL, DOI DOI 10.17485/ijst/2017/v10i35/118951
[6]  
[Anonymous], 2016, TMA
[7]  
[Anonymous], 2015, P 21 ISSAT INT C REL
[8]  
Aydin L., 2020, Designing Engineering Structures Using Stochastic Optimization Methods, DOI [10.1201/9780429289576, DOI 10.1201/9780429289576]
[9]   Feature selection in machine learning: A new perspective [J].
Cai, Jie ;
Luo, Jiawei ;
Wang, Shulin ;
Yang, Sheng .
NEUROCOMPUTING, 2018, 300 :70-79
[10]   Extreme learning machine: algorithm, theory and applications [J].
Ding, Shifei ;
Zhao, Han ;
Zhang, Yanan ;
Xu, Xinzheng ;
Nie, Ru .
ARTIFICIAL INTELLIGENCE REVIEW, 2015, 44 (01) :103-115