CHAMELEON: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection

被引:30
作者
Chohra, Aniss [1 ]
Shirani, Paria [2 ]
Karbab, ElMouatez Billah [1 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Secur Res Ctr, Gina Cody Sch Engn & Comp Sci, Montreal, PQ, Canada
[2] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Feature selection; Swarm intelligence; Particle swarm optimization (PSO); Ensemble methods; Internet of things (IoT); Network anomaly detection; Deep learning; GENETIC ALGORITHM; NEURAL-NETWORK; SYSTEM;
D O I
10.1016/j.cose.2022.102684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an optimization approach by leveraging swarm intelligence and ensemble methods to solve the non-deterministic feature selection problem. The proposed approach is validated on two benchmark datasets, namely, NSL-KDD and UNSW-NB15, in addition to a third dataset, called IoT-Zeek dataset, which consists of Zeek network-based intrusion detection connection logs. We build the IoT-Zeek dataset by employing ensemble classification and deep learning models using publicly available malicious and benign threat intelligence on the Zeek connection logs of IoT devices. Moreover, we deploy and validate a deep learning-based anomaly detection model using autoencoders on each of the aforementioned datasets by utilizing the selected features obtained from the proposed optimization approach. The obtained results demonstrate that our approach outperform the existing state-of-the-art machine learning models in terms of f(1) score results, with 92.092% f(1) score on NSL-KDD dataset, 92.904 f(1) score on UNSW-NB15 dataset, and 97.302 f(1) score on IoT-Zeek dataset. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 59 条
  • [41] A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection
    Nkenyereye, Lewis
    Tama, Bayu Adhi
    Lim, Sunghoon
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (02): : 2217 - 2227
  • [42] Genetic algorithm-based heuristic for feature selection in credit risk assessment
    Oreski, Stjepan
    Oreski, Goran
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 2052 - 2064
  • [43] Bro: a system for detecting network intruders in real-time
    Paxson, V
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (23-24): : 2435 - 2463
  • [44] Pengfei Xiong, 2020, Innovative Mobile and Internet Services in Ubiquitous Computing. Proceedings of the 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2020). Advances in Intelligent Systems and Computing (AISC 1195), P384, DOI 10.1007/978-3-030-50399-4_37
  • [45] A tree-based stacking ensemble technique with feature selection for network intrusion detection
    Rashid, Mamunur
    Kamruzzaman, Joarder
    Imam, Tasadduq
    Wibowo, Santoso
    Gordon, Steven
    [J]. APPLIED INTELLIGENCE, 2022, 52 (09) : 9768 - 9781
  • [46] Roy A., 2021, P INT C COMMUNICATIO, P429
  • [47] Roy S., FUTURE GENERAT COMPU, V127, P276
  • [48] Ensemble learning: A survey
    Sagi, Omer
    Rokach, Lior
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2018, 8 (04)
  • [49] A Survey on semi-supervised feature selection methods
    Sheikhpour, Razieh
    Sarram, Mehdi Agha
    Gharaghani, Sajjad
    Chahooki, Mohammad Ali Zare
    [J]. PATTERN RECOGNITION, 2017, 64 : 141 - 158
  • [50] Shen Y, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P905