A Many Objective-Based Feature Selection Model for Anomaly Detection in Cloud Environment

被引:16
作者
Zhang, Zhixia [1 ]
Wen, Jie [1 ]
Zhang, Jiangjiang [1 ]
Cai, Xingjuan [1 ]
Xie, Liping [1 ]
机构
[1] Taiyuan Univ Sci & Technol, Complex Syst & Computat Intelligence Lab, Taiyuan 030024, Peoples R China
关键词
Cloud computing; intrusion detection system; feature selection; many-objective optimization; network anomaly detection; SWARM OPTIMIZATION ALGORITHM; INTRUSION DETECTION; EVOLUTIONARY ALGORITHM; SEARCH ALGORITHM; DDOS ATTACKS; HYBRID; SYSTEM; CLASSIFICATION; DECOMPOSITION; MECHANISMS;
D O I
10.1109/ACCESS.2020.2981373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing technology (CCT), the processing of network traffic data becomes particularly important. However, the existing intrusion detection systems (IDS) are not efficient enough in analyzing network traffic data for anomaly detection. Therefore, this paper proposes a new data processing model for network anomaly detection. The model can simultaneously optimize the number of features (NF), accuracy, recall, false alarm rate (FAR) and precision. In order to better solve the model, an integrating dominance algorithm (MaOEA-ABC) with adaptive selection probability is proposed. In model, firstly, MaOEA-ABC is used to obtain the optimal feature subset by optimizing the above five objectives. Then, K-Nearest Neighbor (KNN) is used for network anomaly classification according to the optimal feature subset. Finally, MaOEA-ABC is compared with the existing standard MaOEAs algorithm (NSGA-III, EFR-RR, MaOEA-RD and PICEAg). The experimental results show that the approach can reduce the number of features on the basis of ensuring accuracy and FAR, thereby reducing the cost of detection.
引用
收藏
页码:60218 / 60231
页数:14
相关论文
共 73 条
[1]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], 2006, INT C NETW SERV JUL
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], [No title captured]
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], [No title captured]
[8]  
[Anonymous], [No title captured]
[9]   Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation [J].
Balamurugan, V. ;
Saravanan, R. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6) :13027-13039
[10]   Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems [J].
Bostani, Hamid ;
Sheikhan, Mansour .
SOFT COMPUTING, 2017, 21 (09) :2307-2324