Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms

被引:164
作者
Mazini, Mehrnaz [1 ]
Shirazi, Babak [2 ]
Mahdavi, Iraj [2 ]
机构
[1] Mazandaran Univ Sci & Technol, Dept Informat Technol, Babol Sar, Iran
[2] Mazandaran Univ Sci & Technol, Dept Ind Engn, Babol Sar, Iran
关键词
Anomaly network-based; Intrusion detection system; Feature selection; Artificial bee colony; AdaBoost; FEATURE-SELECTION; OPTIMIZATION;
D O I
10.1016/j.jksuci.2018.03.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) has been considered as the main component of a safe network. One of the problems of these security systems is false alarm report of intrusion to the network and intrusion detection accuracy that happens due to the high volume of network data. This paper proposes a new reliable hybrid method for an anomaly network-based IDS (A-NIDS) using artificial bee colony (ABC) and AdaBoost algorithms in order to gain a high detection rate (DR) with low false positive rate (FPR). ABC algorithm is used to feature selection and AdaBoost are used to evaluate and classify the features. Results of the simulation on NSL-KDD and ISCXIDS2012 datasets confirm that this reliable hybrid method has a significant difference from other IDS, which are accomplished according to the same dataset. It has demonstrated differently better performance in different attacks-based scenarios. The accuracy and detection rate of this method has been improved in comparison with legendary methods. (C) 2018 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:541 / 553
页数:13
相关论文
共 30 条
  • [1] Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system
    Al-Yaseen, Wathiq Laftah
    Othman, Zulaiha Ali
    Nazri, Mohd Zakree Ahmad
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 : 296 - 303
  • [2] Alfantookh AA, 2006, J KING SAUD UNIV-COM, V18, P27
  • [3] Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
    Aljawarneh, Shadi
    Aldwairi, Monther
    Yassein, Muneer Bani
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 152 - 160
  • [4] Bansal Jagdish Chand, 2013, International Journal of Advanced Intelligence Paradigms, V5, P123
  • [5] Monitoring and auditing mobile operating systems
    Carabas, Mihai
    Carabas, Costin
    Gheorghe, Laura
    Deaconescu, Razvan
    Tapus, Nicolae
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2016, 6 (01) : 54 - 63
  • [6] A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
    Eesa, Adel Sabry
    Orman, Zeynep
    Brifcani, Adnan Mohsin Abdulazeez
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) : 2670 - 2679
  • [7] A two-level hybrid approach for intrusion detection
    Guo, Chun
    Ping, Yuan
    Liu, Nian
    Luo, Shou-Shan
    [J]. NEUROCOMPUTING, 2016, 214 : 391 - 400
  • [8] Gupta M., 2015, Int. J. Comput. Appl, V111, P27, DOI DOI 10.5120/19576-1377
  • [9] Gyanchandani M., 2012, INT J SCI RES PUBLIC, V2, P1
  • [10] Hasani Seyed Reza, 2014, Journal of Computer Science, V10, P1015, DOI 10.3844/jcssp.2014.1015.1025