Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC

被引:18
作者
Boahen, Edward Kwadwo [1 ]
Bouya-Moko, Brunel Elvire [1 ]
Wang, Changda [1 ]
机构
[1] Jiangsu Univ, Dept Comp Sci & Technol, Zhenjiang, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Network anomaly; Controlled network; Intrusion detection system; Networks; Optimization; FOREST;
D O I
10.1016/j.cose.2021.102225
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network anomalies detection is a complementary technology for systems that detect security threats in networks based on package signatures. Controlled network environments have distinguished characteristics such as higher dimensionality, more robust regularity, and subtler fluctuation of its traffic that diminishes the performance of typical anomaly detection techniques comparable to that of a standard network. Previous research available recommends the optimization of methods to improve the accuracy rate of intrusion detection systems (IDS) with limitations of preserving vital data in the low-dimensional area and inconsistency in optimization goals resulting from decoupled model learning. Given the aforementioned challenge, this work proposes a new classification scheme based on an improved Particle Swarm Optimization algorithm, Gravitational Search Algorithm, and Random Forest classifier (PSOGSARFC). The PSOGSARFC is enhanced with a diversity enhancement strategy and used to optimize a random forest classifier in detecting anomalies in a controlled network environment using a benchmark dataset NSL-KDD & UNSW-NB15. Experimental results in light of the accuracy rates in anomaly detection confirm a better performance of 98.92% accuracy rate of the proposed classification scheme comparative to other related network anomaly detection schemes. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 26 条
  • [1] Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection
    Ahmad, Iftikhar
    Basheri, Mohammad
    Iqbal, Muhammad Javed
    Rahim, Aneel
    [J]. IEEE ACCESS, 2018, 6 : 33789 - 33795
  • [2] Ahmad I, 2014, 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), P68, DOI 10.1109/ITAIC.2014.7065007
  • [3] Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
    Aljawarneh, Shadi
    Aldwairi, Monther
    Yassein, Muneer Bani
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 152 - 160
  • [4] [Anonymous], 2009, NSL-KDD dataset
  • [5] Data mining methods for knowledge discovery in multi-objective optimization: Part A - Survey
    Bandaru, Sunith
    Ng, Amos H. C.
    Deb, Kalyanmoy
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 70 : 139 - 159
  • [6] An intrusion detection scheme based on the ensemble of discriminant classifiers
    Bhati, Bhoopesh Singh
    Rai, C. S.
    Balamurugan, B.
    Al-Turjman, Fadi
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
  • [7] An improved ensemble based intrusion detection technique usingXGBoost
    Bhati, Bhoopesh Singh
    Chugh, Garvit
    Al-Turjman, Fadi
    Bhati, Nitesh Singh
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06):
  • [8] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [9] Eberhart R., 2002, MHS95 6 INT S MICROM, DOI DOI 10.1109/MHS.1995.494215
  • [10] An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons
    Ghanem, Waheed Ali H. M.
    Jantan, Aman
    Ghaleb, Sanaa Abduljabbar Ahmed
    Nasser, Abdullah B.
    [J]. IEEE ACCESS, 2020, 8 : 130452 - 130475