Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System

被引:6
作者
Singh, Devendra Kumar [1 ]
Shrivastava, Manish [1 ]
机构
[1] Guru Ghasidas Univ, Dept Comp Sci & Engn, Bilaspur, India
关键词
classification; feature selection; teaching learning-based optimization; intrusion detection; LEARNING-BASED OPTIMIZATION; MICROARRAY DATA; NETWORK; CLASSIFICATION; MACHINE; DESIGN;
D O I
10.48084/etasr.4149
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Keeping computer reliability to confirm reliable, secure, and truthful correspondence of data between different enterprises is a major security issue. Ensuring information correspondence over the web or computer grids is always under threat of hackers or intruders. Many techniques have been utilized in intrusion detections, but all have flaws. In this paper, a new hybrid technique is proposed, which combines the Ensemble of Feature Selection (EFS) algorithm and Teaching Learning-Based Optimization (TLBO) techniques. In the proposed, EFS-TLBO method, the EFS strategy is applied to rank the features for choosing the ideal best subset of applicable information, and the TLBO is utilized to identify the most important features from the produced datasets. The TLBO algorithm uses the Extreme Learning Machine (ELM) to choose the most effective attributes and to enhance classification accuracy. The performance of the recommended technique is evaluated in a benchmark dataset. The experimental outcomes depict that the proposed model has high predictive accuracy, detection rate, false-positive rate, and requires less significant attributes than other techniques known from the literature.
引用
收藏
页码:7130 / 7134
页数:5
相关论文
共 37 条
[1]   A proposed HTTP service based IDS [J].
Abd-Eldayem, Mohamed M. .
EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (01) :13-24
[2]  
[Anonymous], NSL-KDD Datasets
[3]   Comparison of classification techniques applied for network intrusion detection and classification [J].
Aziz, Amira Sayed A. ;
EL-Ola Hanafi, Sanaa ;
Hassanien, Aboul Ella .
JOURNAL OF APPLIED LOGIC, 2017, 24 :109-118
[4]  
Barolli L., 2017, COMPLEX INTELLIGENT, V1st
[5]  
Basha SR, 2019, ENG TECHNOL APPL SCI, V9, P4974
[6]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[7]   Incorporating evolutionary computation for securing wireless network against cyberthreats [J].
Dwivedi, Shubhra ;
Vardhan, Manu ;
Tripathi, Sarsij .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (11) :8691-8728
[8]  
Fallahi N, 2016, IRAN CONF ELECTR ENG, P1948, DOI 10.1109/IranianCEE.2016.7585840
[9]   A hybrid approach for efficient anomaly detection using metaheuristic methods [J].
Ghanem, Tamer F. ;
Elkilani, Wail S. ;
Abdul-kader, Hatem M. .
JOURNAL OF ADVANCED RESEARCH, 2015, 6 (04) :609-619
[10]  
Gogoi P, 2012, COMM COM INF SC, V306, P322