Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection

被引:47
作者
Dwivedi, Shubhra [1 ]
Vardhan, Manu [1 ]
Tripathi, Sarsij [1 ]
机构
[1] NIT Raipur, Dept Comp Sci & Engn, Raipur, Chhattisgarh, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2021年 / 24卷 / 03期
基金
英国科研创新办公室;
关键词
Classification; Feature selection; Grasshopper optimization algorithm; Intrusion detection; UNSW-NB15 DATA SET; FEATURE-SELECTION; ENSEMBLE; NETWORK; MODEL;
D O I
10.1007/s10586-020-03229-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is one of the most crucial activities for security infrastructures in network environments, and it is widely used to detect, identify and track malicious threats. A common approach in intrusion detection systems (IDSs) specifically in anomaly detection is evolutionary algorithm that works as intrusion detector. Still, it has been challenging to design a precise and reliable IDS to determine security threats due to the large capacity of network data which contains redundant and irrelevant features. It does not only decrease the process of classification but also prevents a classifier from making precise decisions. To increase the accuracy and reduce the false alarm rate, in this study integration of ensemble feature selection (EFS) and grasshopper optimization algorithm (GOA), called EFSGOA is developed. Firstly, EFS method is applied to rank the features for selecting the top subset of relevant features. Afterward, GOA is utilized to identify significant features from the obtained reduced features set produced by EFS technique that can contribute to determine the type of attack. Furthermore, GOA utilizes support vector machine (SVM) as a fitness function to obtain the noteworthy features and to optimize penalty factor, kernel parameter, and tube size parameters of SVM for maximizing the classification performance. The experimental results demonstrate that EFSGOA method has performed better and obtained high detection rate of 99.69%, accuracy of 99.98% and low false alarm rate of 0.07 in NSL-KDD and high detection rate of 99.26%, accuracy of 99.89% and low false alarm rate of 0.097 in KDD Cup 99 data. Moreover, the proposed method has succeeded in achieving higher performance compared to other state-of-art techniques in terms of accuracy, detection rate, false alarm rate, and CPU time.
引用
收藏
页码:1881 / 1900
页数:20
相关论文
共 57 条
[1]   A proposed HTTP service based IDS [J].
Abd-Eldayem, Mohamed M. .
EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (01) :13-24
[2]  
Abdulhammed R., 2018, MACHINE LEARNING APP
[3]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[4]   A new hybrid approach for feature selection and support vector machine model selection based on self-adaptive cohort intelligence [J].
Aladeemy, Mohammed ;
Tutun, Salih ;
Khasawneh, Mohammad T. .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :118-131
[5]  
Ambusaidi MA, 2015, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, P295, DOI [10.1109/Trustcom-2015.387, 10.1109/Trustcom.2015.387]
[6]   An intelligent intrusion detection system for secure wireless communication using IPSO and negative selection classifier [J].
Bhuvaneswari, G. ;
Manikandan, G. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5) :12429-12441
[7]   Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset [J].
Bolon-Canedo, V. ;
Sanchez-Marono, N. ;
Alonso-Betanzos, A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) :5947-5957
[8]   Detecting network cyber-attacks using an integrated statistical approach [J].
Bouyeddou, Benamar ;
Harrou, Fouzi ;
Kadri, Benamar ;
Sun, Ying .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02) :1435-1453
[9]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[10]  
CHEN J, 2020, KNOWL BASED SYST, V203