Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms

被引:178
作者
Mazini, Mehrnaz [1 ]
Shirazi, Babak [2 ]
Mahdavi, Iraj [2 ]
机构
[1] Mazandaran Univ Sci & Technol, Dept Informat Technol, Babol Sar, Iran
[2] Mazandaran Univ Sci & Technol, Dept Ind Engn, Babol Sar, Iran
关键词
Anomaly network-based; Intrusion detection system; Feature selection; Artificial bee colony; AdaBoost; FEATURE-SELECTION; OPTIMIZATION;
D O I
10.1016/j.jksuci.2018.03.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) has been considered as the main component of a safe network. One of the problems of these security systems is false alarm report of intrusion to the network and intrusion detection accuracy that happens due to the high volume of network data. This paper proposes a new reliable hybrid method for an anomaly network-based IDS (A-NIDS) using artificial bee colony (ABC) and AdaBoost algorithms in order to gain a high detection rate (DR) with low false positive rate (FPR). ABC algorithm is used to feature selection and AdaBoost are used to evaluate and classify the features. Results of the simulation on NSL-KDD and ISCXIDS2012 datasets confirm that this reliable hybrid method has a significant difference from other IDS, which are accomplished according to the same dataset. It has demonstrated differently better performance in different attacks-based scenarios. The accuracy and detection rate of this method has been improved in comparison with legendary methods. (C) 2018 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:541 / 553
页数:13
相关论文
共 30 条
[1]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[2]  
Alfantookh AA, 2006, J KING SAUD UNIV-COM, V18, P27
[3]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[4]  
Bansal Jagdish Chand, 2013, International Journal of Advanced Intelligence Paradigms, V5, P123
[5]   Monitoring and auditing mobile operating systems [J].
Carabas, Mihai ;
Carabas, Costin ;
Gheorghe, Laura ;
Deaconescu, Razvan ;
Tapus, Nicolae .
INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2016, 6 (01) :54-63
[6]   A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems [J].
Eesa, Adel Sabry ;
Orman, Zeynep ;
Brifcani, Adnan Mohsin Abdulazeez .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) :2670-2679
[7]   A two-level hybrid approach for intrusion detection [J].
Guo, Chun ;
Ping, Yuan ;
Liu, Nian ;
Luo, Shou-Shan .
NEUROCOMPUTING, 2016, 214 :391-400
[8]  
Gupta M., 2015, Int. J. Comput. Appl, V111, P27, DOI DOI 10.5120/19576-1377
[9]  
Gyanchandani M., 2012, INT J SCI RES PUBLIC, V2, P1
[10]  
Hasani Seyed Reza, 2014, Journal of Computer Science, V10, P1015, DOI 10.3844/jcssp.2014.1015.1025