Introduced a new method for enhancement of intrusion detection with random forest and PSO algorithm

被引:14
作者
Ajdani, Mahdi [1 ]
Ghaffary, Hamidreza [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Sci, Ferdows Branch, Ferdows, Iran
关键词
behavioral pattern allotment; data mining; PSO algorithm; random Forest algorithm;
D O I
10.1002/spy2.147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As computer networks expand, attacks and intrusions into these networks have increased. In addition to firewalls and other intrusion prevention equipment, other systems, such as IDS (Metrics), are designed to provide enhanced security in computer systems, including the purpose of monitoring intrusive and intrusive activities. Intrusive allocation system can be considered effective if the high intrusion rate is slightly misleading, and in this article a new way to classify it is abnormal (infiltration) in the host or network. UNSW-NB15 and KDD-Cup'99 Datasets Introducing Random Forest and PSO algorithm. In this paper, training data and label data used with the random forest algorithm. After creating a random forest algorithm, provide test data. We use the data stored in train step, which is actually a copy of the data, so that when performing the test step, the same training data can be compared with categorize using a PSO algorithm. In in order to show the accuracy of the proposed method, an example of the confusion matrix formed in the code that showed performance of all methods and modes studied is compared based on accuracy and time that the PSO algorithm has always been able to take less time, which is quite acceptable and predictable. Improves correct diagnosis of correct detection rate in that report was 75.94% and in the proposed method in this article it reached 97%. With the proposed method, learning speed has been greatly increased and accuracy is acceptable.
引用
收藏
页数:10
相关论文
共 19 条
[1]   Network Intrusion Detection System Using Random Forest and Decision Tree Machine Learning Techniques [J].
Bhavani, T. Tulasi ;
Rao, M. Kameswara ;
Reddy, A. Manohar .
FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 :637-643
[2]  
Budilaksono S., 2020, J PHYS C SERIES, V1471
[3]  
Dalal S., 2019, P 2 INT C ADV COMP S, P1
[4]   Improved PSO for optimizing the performance of intrusion detection systems [J].
Dickson, Anne ;
Thomas, Ciza .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (05) :6537-6547
[5]   CS-PSO based Intrusion Detection System in Cloud Environment [J].
Ghosh, Partha ;
Karmakar, Arnab ;
Sharma, Joy ;
Phadikar, Santanu .
EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 :261-269
[6]   Network Intrusion Detection Based on PSO-Xgboost Model [J].
Jiang, Hui ;
He, Zheng ;
Ye, Gang ;
Zhang, Huyin .
IEEE ACCESS, 2020, 8 :58392-58401
[7]   Building Auto-Encoder Intrusion Detection System based on random forest feature selection [J].
Li, XuKui ;
Chen, Wei ;
Zhang, Qianru ;
Wu, Lifa .
COMPUTERS & SECURITY, 2020, 95
[8]   A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems [J].
Masdari, Mohammad ;
Khezri, Hemn .
APPLIED SOFT COMPUTING, 2020, 92
[9]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[10]  
Moustafa N, 2015, 2015 4TH INTERNATIONAL WORKSHOP ON BUILDING ANALYSIS DATASETS AND GATHERING EXPERIENCE RETURNS FOR SECURITY (BADGERS), P25, DOI [10.1109/BADGERS.2015.14, 10.1109/BADGERS.2015.014]