A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

被引:30
作者
Almomani, Omar [1 ]
机构
[1] World Islamic Sci & Educ Univ, Dept Comp Network & Informat Syst, Amman 11947, Jordan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 01期
关键词
IDS; metaheuristic algorithms; PSO; MVO; GWO; MFO; WOA; FFA; BAT; SVM; J48; RF; UNSW-NB15; dataset; OPTIMIZATION ALGORITHM; CLASSIFIER; ATTACKS; MISUSE;
D O I
10.32604/cmc.2021.016113
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has two objectives; The first one is to reduce the number of selected features for Network IDS. This objective was met through the hybridization of bioinspired metaheuristic algorithms with each other in a hybrid model. The algorithms used in this paper are particle swarm optimization (PSO), multiverse optimizer (MVO), grey wolf optimizer (GWO), moth-flame optimization (MFO), whale optimization algorithm (WOA), firefly algorithm (FFA), and bat algorithm (BAT). The second objective is to detect the generic attack using machine learning classifiers. This objective was met through employing the support vector machine (SVM), C4.5 (J48) decision tree, and random forest (RF) classifiers. UNSW-NB15 dataset used for assessing the effectiveness of the proposed hybrid model. UNSW-NB15 dataset has nine attacks type. The generic attack is the highest among them. Therefore, the proposed model aims to identify generic attacks. My data showed that J48 is the best classifier compared to SVM and RF for the time needed to build the model. In terms of features reduction for the classification, my data show that the MFO-WOA and FFA-GWO models reduce the features to 15 features with close accuracy, sensitivity and F-measure of all features, whereas MVO-BAT model reduces features to 24 features with the same accuracy, sensitivity and F-measure of all features for all classifiers.
引用
收藏
页码:409 / 429
页数:21
相关论文
共 44 条
  • [1] Abu Khurma R, 2020, ALGO INTELL SY, P131, DOI 10.1007/978-981-32-9990-0_8
  • [2] An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks
    Adil, Muhammad
    Almaiah, Mohammed Amin
    Alsayed, Alhuseen Omar
    Almomani, Omar
    [J]. SENSORS, 2020, 20 (08)
  • [3] Al Hwaitat AK, 2020, INT J ADV COMPUT SC, V11, P614
  • [4] Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system
    Al-Yaseen, Wathiq Laftah
    Othman, Zulaiha Ali
    Nazri, Mohd Zakree Ahmad
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 : 296 - 303
  • [5] Asynchronous accelerating multi-leader salp chains for feature selection
    Aljarah, Ibrahim
    Mafarja, Majdi
    Heidari, Ali Asghar
    Faris, Hossam
    Zhang, Yong
    Mirjalili, Seyedali
    [J]. APPLIED SOFT COMPUTING, 2018, 71 : 964 - 979
  • [6] An enhanced J48 classification algorithm for the anomaly intrusion detection systems
    Aljawarneh, Shadi
    Yassein, Muneer Bani
    Aljundi, Mohammed
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10549 - 10565
  • [7] Almomani O., 2020, J THEOR APPL INF TEC, V98, P937
  • [8] A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms
    Almomani, Omar
    [J]. SYMMETRY-BASEL, 2020, 12 (06): : 1 - 20
  • [9] Alzubi O, 2018, INT ARAB J INF TECHN, V15, P76
  • [10] A hybrid method consisting of GA and SVM for intrusion detection system
    Aslahi-Shahri, B. M.
    Rahmani, R.
    Chizari, M.
    Maralani, A.
    Eslami, M.
    Golkar, M. J.
    Ebrahimi, A.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2016, 27 (06) : 1669 - 1676