Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC

被引:21
作者
Boahen, Edward Kwadwo [1 ]
Bouya-Moko, Brunel Elvire [1 ]
Wang, Changda [1 ]
机构
[1] Jiangsu Univ, Dept Comp Sci & Technol, Zhenjiang, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Network anomaly; Controlled network; Intrusion detection system; Networks; Optimization; FOREST;
D O I
10.1016/j.cose.2021.102225
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network anomalies detection is a complementary technology for systems that detect security threats in networks based on package signatures. Controlled network environments have distinguished characteristics such as higher dimensionality, more robust regularity, and subtler fluctuation of its traffic that diminishes the performance of typical anomaly detection techniques comparable to that of a standard network. Previous research available recommends the optimization of methods to improve the accuracy rate of intrusion detection systems (IDS) with limitations of preserving vital data in the low-dimensional area and inconsistency in optimization goals resulting from decoupled model learning. Given the aforementioned challenge, this work proposes a new classification scheme based on an improved Particle Swarm Optimization algorithm, Gravitational Search Algorithm, and Random Forest classifier (PSOGSARFC). The PSOGSARFC is enhanced with a diversity enhancement strategy and used to optimize a random forest classifier in detecting anomalies in a controlled network environment using a benchmark dataset NSL-KDD & UNSW-NB15. Experimental results in light of the accuracy rates in anomaly detection confirm a better performance of 98.92% accuracy rate of the proposed classification scheme comparative to other related network anomaly detection schemes. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 26 条
[1]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[2]  
Ahmad I, 2014, 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), P68, DOI 10.1109/ITAIC.2014.7065007
[3]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[4]  
[Anonymous], 2009, NSL KDD DATASET
[5]   Data mining methods for knowledge discovery in multi-objective optimization: Part A - Survey [J].
Bandaru, Sunith ;
Ng, Amos H. C. ;
Deb, Kalyanmoy .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 70 :139-159
[6]   An intrusion detection scheme based on the ensemble of discriminant classifiers [J].
Bhati, Bhoopesh Singh ;
Rai, C. S. ;
Balamurugan, B. ;
Al-Turjman, Fadi .
COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
[7]   An improved ensemble based intrusion detection technique usingXGBoost [J].
Bhati, Bhoopesh Singh ;
Chugh, Garvit ;
Al-Turjman, Fadi ;
Bhati, Nitesh Singh .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06)
[8]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[9]  
Eberhart R., 1995, MHS 95, P39, DOI DOI 10.1109/MHS.1995.494215
[10]   An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons [J].
Ghanem, Waheed Ali H. M. ;
Jantan, Aman ;
Ghaleb, Sanaa Abduljabbar Ahmed ;
Nasser, Abdullah B. .
IEEE ACCESS, 2020, 8 :130452-130475