Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization

被引:24
作者
Ghanem, Waheed A. H. M. [1 ,2 ,3 ]
Jantan, Aman [1 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
[2] Univ Aden, Fac Engn, Aden, Yemen
[3] Univ Aden, Fac Educ Saber, Aden, Yemen
关键词
Intrusion detection system (IDS); Neural network training; A multilayer perceptron (MLP); Swarm Intelligence (SI); Artificial Bee Colony Algorithm (ABC); Monarch Butterfly Optimization (MBO); PARTICLE SWARM OPTIMIZATION; INTRUSION DETECTION SYSTEM; SUPPORT VECTOR MACHINE; DECISION TREE; ALGORITHM; INTELLIGENCE; DESIGN;
D O I
10.1007/s11063-019-10120-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Arguably the most recurring issue concerning network security is building an approach that is capable of detecting intrusions into network systems. This issue has been addressed in numerous works using various approaches, of which the most popular one is to consider intrusions as anomalies with respect to the normal traffic in the network and classify network packets as either normal or abnormal. Improving the accuracy and efficiency of this classification is still an open problem to be solved. The study carried out in this article is based on a new approach for intrusion detection that is mainly implemented using the Hybrid Artificial Bee Colony algorithm (ABC) and Monarch Butterfly optimization (MBO). This approach is implemented for preparing an artificial neural system (ANN) in order to increase the precision degree of classification for malicious and non-malicious traffic in systems. The suggestion taken into consideration was to place side-by-side nine other metaheuristic algorithms that are used to evaluate the proposed approach alongside the related works. In the beginning the system is prepared in such a way that it selects the suitable biases and weights utilizing a hybrid (ABC) and (MBO). Subsequently the artificial neural network is retrained by using the information gained from the ideal weights and biases which are obtained from the hybrid algorithm (HAM) to get the intrusion detection approach able to identify new attacks. Three types of intrusion detection evaluation datasets namely KDD Cup 99, ISCX 2012, and UNSW-NB15 were used to compare and evaluate the proposed technique against the other algorithms. The experiment clearly demonstrated that the proposed technique provided significant enhancement compared to the other nine classification algorithms, and that it is more efficient with regards to network intrusion detection.
引用
收藏
页码:905 / 946
页数:42
相关论文
共 74 条
[1]   Solar energy forecasting based on hybrid neural network and improved metaheuristic algorithm [J].
Abedinia, Oveis ;
Amjady, Nima ;
Ghadimi, Noradin .
COMPUTATIONAL INTELLIGENCE, 2018, 34 (01) :241-260
[2]   Supervised Training of Spiking Neural Network by Adapting the E-MWO Algorithm for Pattern Classification [J].
Abusnaina, Ahmed A. ;
Abdullah, Rosni ;
Kattan, Ali .
NEURAL PROCESSING LETTERS, 2019, 49 (02) :661-682
[3]   Novelty Detection in Time Series Using Self-Organizing Neural Networks: A Comprehensive Evaluation [J].
Aguayo, Leonardo ;
Barreto, Guilherme A. .
NEURAL PROCESSING LETTERS, 2018, 47 (02) :717-744
[4]   A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks [J].
Alauthaman, Mohammad ;
Aslam, Nauman ;
Zhang, Li ;
Alasem, Rafe ;
Hossain, M. A. .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (11) :991-1004
[5]  
[Anonymous], P INT C COMP SCI ITS
[6]   Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm [J].
Asghari, Saied ;
Navimipour, Nima Jafari .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) :129-142
[7]   Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Shi, Yong .
KNOWLEDGE-BASED SYSTEMS, 2017, 126 :113-126
[8]  
Beyer H.-G., 2001, The theory of evolution strategies
[9]   An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection [J].
Catania, Carlos A. ;
Bromberg, Facundo ;
Garcia Garino, Carlos .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (02) :1822-1829
[10]   Molecularly Imprinted Quartz Crystal Microbalance Sensor (QCM) for Bilirubin Detection [J].
Cicek, Cigdem ;
Yilmaz, Fatma ;
Ozgur, Erdogan ;
Yavuz, Handan ;
Denizli, Adil .
CHEMOSENSORS, 2016, 4 (04)