An Enhanced Intrusion Detection System using Particle Swarm Optimization Feature Extraction Technique

被引:40
作者
Ogundokun, Roseline Oluwaseun [1 ,2 ,4 ]
Awotunde, Joseph Bamidele [3 ]
Sadiku, Peter [3 ]
Adeniyi, Emmanuel Abidemi [1 ,4 ]
Abiodun, Moses [1 ,4 ]
Dauda, Oladipo Idowu [3 ]
机构
[1] Landmark Univ Omu Aran, Dept Comp Sci, Omu Aran, Nigeria
[2] Landmark Univ SDG 11, Sustainable Cities & Communities Res Grp, Omu Aran, Nigeria
[3] Univ Ilorin, Dept Comp Sci, Ilorin, Nigeria
[4] Landmark Univ SDG 4, Qual Educ Res Grp, Ilorin, Nigeria
来源
10TH INTERNATIONAL YOUNG SCIENTISTS CONFERENCE IN COMPUTATIONAL SCIENCE (YSC2021) | 2021年 / 193卷
关键词
Intrusion detection system; Machine learning; Artificial intelligence; Classification; Cybersecurity; DECISION TREE;
D O I
10.1016/j.procs.2021.10.052
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the alarming growth of computer connectivity and the significant number of computer-related applications increased lately, the challenge of achieving cyber-security has become progressively difficult. It also needs an adequate defense mechanism against a variety of cyberattacks. Detecting inconsistencies and threats in a computer network, as well as designing intrusion detection systems (IDS) that can help with cyber-security. A useful data-driven intrusion detection system has been developed using artificial intelligence (AI), particularly machine learning (ML) techniques. In this study, two different classification techniques for intrusion detection (ID) with each having its unique use cases were compared. Particle Swarm Optimization (PSO) algorithm was employed for dimensionality reduction before employing the two classifiers for the classification procedure. This study considered the classification techniques to categorize the network anomalies. The two classifiers employed are PSO + Decision Tree (PSO+DT) and PSO + K-Nearest Neighbor (PSO+KNN). The results of the detection techniques were verified using KDD-CUP 99 dataset. The usefulness of success indicators such as specificity, recall, fl-score, accuracy, precision, and consistency on cyber-security databases for different categories of cyber-attacks was employed on the result of the implementation. The two classifiers were also compared to deduce which of the classifier achieves exceedingly in terms of accuracy, detection rate (DR), and false-positive rate (FPR). Finally, the system was compared with the existing IDS. The results show that PSO+KNN outperformed the PSO+DT classifier algorithm in terms of identifying network anomalies. (C) 2021 The Authors. Published by Elsevier B.V.
引用
收藏
页码:504 / 512
页数:9
相关论文
共 42 条
[1]   Performance Evaluation of ANOVA and RFE Algorithms for Classifying Microarray Dataset Using SVM [J].
Abdulsalam, Sulaiman Olaniyi ;
Mohammed, Abubakar Adamu ;
Ajao, Jumoke Falilat ;
Babatunde, Ronke S. ;
Ogundokun, Roseline Oluwaseun ;
Nnodim, Chiebuka T. ;
Arowolo, Micheal Olaolu .
INFORMATION SYSTEMS, EMCIS 2020, 2020, 402 :480-492
[2]  
Abu Taher K, 2019, 2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), P643, DOI [10.1109/ICREST.2019.8644161, 10.1109/icrest.2019.8644161]
[3]  
Adetunmbi A. O., 2007, J COMPUTER SCI ITS A, V14, P24
[4]  
Amor N. Ben, 2004, P ACM S APPL COMP, V1, P420, DOI 10.1145/967900.967989
[5]   The course of subjective and objective chemosensory dysfunction in hospitalized patients with COVID-19: a 6-month follow-up [J].
Bertlich, Mattis ;
Stihl, Clemens ;
Luesebrink, Enzo ;
Hellmuth, Johannes C. ;
Scherer, Clemens ;
Freytag, Saskia ;
Spiegel, Jennifer Lee ;
Stoycheva, Ivelina ;
Canis, Martin ;
Weiss, Bernhard G. ;
Ihler, Friedrich ;
Haubner, Frank .
EUROPEAN ARCHIVES OF OTO-RHINO-LARYNGOLOGY, 2021, 278 (12) :4855-4861
[6]   On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks [J].
Boppana, Rajendra V. ;
Su, Xu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) :1162-1174
[7]  
Budilaksono S., 2020, J PHYS C SERIES, V1471
[8]  
Ennert M., 2015, J APPL MATH COMP MEC, V14
[9]  
Iqbal A., 2019, International Journal of Computer Network & Information Security, V11
[10]  
Jain M, 2012, INT J EMERGING TECHN, V2, P258