Skip to main content
Erschienen in: Neural Computing and Applications 12/2020

07.09.2019 | Hybrid Artificial Intelligence and Machine Learning Technologies

Hybrid optimization scheme for intrusion detection using considerable feature selection

verfasst von: S. Velliangiri, P. Karthikeyan

Erschienen in: Neural Computing and Applications | Ausgabe 12/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The intrusion detection is an essential section in network security because of its immense volume of threats which bothers the computing systems. The real-time intrusion detection dataset comprises redundant or irrelevant features. The duplicate features make it quite challenging to locate the patterns for intrusion detection. Hybrid optimization scheme (HOS) is designed for combining adaptive artificial bee colony (AABC) with adaptive particle swarm optimization (APSO) for detecting intrusive activities. The schemes are aggregated for locating improved optimization-based outcomes, and the precision during categorization is acquired using tenfold cross-validation scheme. The main objective of the proposed method is to improve the rate of precision in intrusion activities in internetwork by choosing the relevant features. Effectiveness of the hybrid categorization scheme is accessed using an NSL-KDD dataset. Single feature selection method and random feature selection method are used to assess the proposed HOS intrusion detection approaches. The effectiveness of the designed scheme is evaluated with existing machine learning schemes such as Naive Bayes, AABC, APSO, and support vector machine, which outperform the HOS.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Khammassi C, Krichen S (2017) A GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255–277 Khammassi C, Krichen S (2017) A GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255–277
2.
Zurück zum Zitat Hosseini Bamakan SM, Wang H, Yingjie T, Shi Y (2016) An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199:90–102 Hosseini Bamakan SM, Wang H, Yingjie T, Shi Y (2016) An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199:90–102
3.
Zurück zum Zitat Eesa AS, Orman Z, Brifcani AMA (2015) A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst Appl 42(5):2670–2679 Eesa AS, Orman Z, Brifcani AMA (2015) A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst Appl 42(5):2670–2679
4.
Zurück zum Zitat Saurabh P, Verma B (2016) An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst Appl 60:311–320 Saurabh P, Verma B (2016) An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst Appl 60:311–320
5.
Zurück zum Zitat Aburomman AA, BinIbneReaz M (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput J 38:360–372 Aburomman AA, BinIbneReaz M (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput J 38:360–372
6.
Zurück zum Zitat Almseidin M, Alzubi M, Kovacs S, Alkasassbeh M (2017) Evaluation of machine learning algorithms for intrusion detection system. In: SISY 2017—IEEE 15th international symposium on intelligent systems and informatics: proceedings, no. January, pp 277–282 Almseidin M, Alzubi M, Kovacs S, Alkasassbeh M (2017) Evaluation of machine learning algorithms for intrusion detection system. In: SISY 2017—IEEE 15th international symposium on intelligent systems and informatics: proceedings, no. January, pp 277–282
7.
Zurück zum Zitat Li Y, Qiu R, Jing S (2018) Intrusion detection system using Online Sequence Extreme Learning Machine (OSELM) in advanced metering infrastructure of smart grid. PLoS ONE 13(2):1–16 Li Y, Qiu R, Jing S (2018) Intrusion detection system using Online Sequence Extreme Learning Machine (OSELM) in advanced metering infrastructure of smart grid. PLoS ONE 13(2):1–16
8.
Zurück zum Zitat Priyanga BR, Kumari D (2018) A survey on anomaly detection using unsupervised learning techniques. Int J Creat Res Thoughts 6(2):2320–2882 Priyanga BR, Kumari D (2018) A survey on anomaly detection using unsupervised learning techniques. Int J Creat Res Thoughts 6(2):2320–2882
9.
Zurück zum Zitat Bhalke NA, Paikrao RL (2017) A survey on attack detection system using unsupervised learning method. Int J Adv Res Comput Sci Softw Eng 7(1):274–277 Bhalke NA, Paikrao RL (2017) A survey on attack detection system using unsupervised learning method. Int J Adv Res Comput Sci Softw Eng 7(1):274–277
10.
Zurück zum Zitat Repalle SA, Kolluru VR (2017) Intrusion detection system using ai and machine learning algorithm. Int Res J Eng Technol 4(12):1709–1715 Repalle SA, Kolluru VR (2017) Intrusion detection system using ai and machine learning algorithm. Int Res J Eng Technol 4(12):1709–1715
11.
Zurück zum Zitat G. Chanakya, P. Kunal, S. Sumedh, W. Priyanka, and P. Mahalle (2017) Network intrusion prevention system using machine learning techniques. Int J Innov Res Comput Commun Eng (An ISO Certif. Organ.) 5(7):1–12 G. Chanakya, P. Kunal, S. Sumedh, W. Priyanka, and P. Mahalle (2017) Network intrusion prevention system using machine learning techniques. Int J Innov Res Comput Commun Eng (An ISO Certif. Organ.) 5(7):1–12
12.
Zurück zum Zitat Elrawy MF, Awad AI, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7(1):1–20 Elrawy MF, Awad AI, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7(1):1–20
13.
Zurück zum Zitat Li J, Wang Y, Xiang Y, Meng W, Liu W-X, Li W (2018) A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J Parallel Distrib Comput 122:26–35 Li J, Wang Y, Xiang Y, Meng W, Liu W-X, Li W (2018) A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J Parallel Distrib Comput 122:26–35
14.
Zurück zum Zitat Yahalom R, Elovici Y, Steren A, Nameri Y, Roytman M, Porgador A (2019) Improving the effectiveness of intrusion detection systems for hierarchical data. Knowl Based Syst 168:59–69 Yahalom R, Elovici Y, Steren A, Nameri Y, Roytman M, Porgador A (2019) Improving the effectiveness of intrusion detection systems for hierarchical data. Knowl Based Syst 168:59–69
15.
Zurück zum Zitat Mishra P, Pilli ES, Varadharajan V, Tupakula U (2017) Intrusion detection techniques in cloud environment: a survey. J Netw Comput Appl 77(2016):18–47 Mishra P, Pilli ES, Varadharajan V, Tupakula U (2017) Intrusion detection techniques in cloud environment: a survey. J Netw Comput Appl 77(2016):18–47
16.
Zurück zum Zitat da Costa KAP, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157 da Costa KAP, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157
17.
Zurück zum Zitat Kiran MS, Gündüz M (2013) A recombination-based hybridization of particle swarm optimization and artificial bee colony algorithm for continuous optimization problems. Appl Soft Comput J 13(4):2188–2203 Kiran MS, Gündüz M (2013) A recombination-based hybridization of particle swarm optimization and artificial bee colony algorithm for continuous optimization problems. Appl Soft Comput J 13(4):2188–2203
18.
Zurück zum Zitat Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inf Secur Appl 44:80–88 Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inf Secur Appl 44:80–88
19.
Zurück zum Zitat Al-Jarrah OY, Al-Hammdi Y, Yoo PD, Muhaidat S, Al-Qutayri M (2018) Semi-supervised multi-layered clustering model for intrusion detection. Digit Commun Netw 4(4):277–286 Al-Jarrah OY, Al-Hammdi Y, Yoo PD, Muhaidat S, Al-Qutayri M (2018) Semi-supervised multi-layered clustering model for intrusion detection. Digit Commun Netw 4(4):277–286
20.
Zurück zum Zitat Arivudainambi D, Varun VK, Sibi Chakkaravarthy S (2018) LION IDS: a meta-heuristics approach to detect DDoS attacks against software-defined networks. Neural Comput Appl 7:1–11 Arivudainambi D, Varun VK, Sibi Chakkaravarthy S (2018) LION IDS: a meta-heuristics approach to detect DDoS attacks against software-defined networks. Neural Comput Appl 7:1–11
21.
Zurück zum Zitat Mahesh N, Vijayachitra S (2018) DECSA: hybrid dolphin echolocation and crow search optimization for cluster-based energy-aware routing in WSN. Neural Comput Appl 4:1–16 Mahesh N, Vijayachitra S (2018) DECSA: hybrid dolphin echolocation and crow search optimization for cluster-based energy-aware routing in WSN. Neural Comput Appl 4:1–16
22.
Zurück zum Zitat Mirjalili S, Wang GG, Coelho LDS (2014) Binary optimization using hybrid particle swarm optimization and gravitational search algorithm. Neural Comput Appl 25(6):1423–1435 Mirjalili S, Wang GG, Coelho LDS (2014) Binary optimization using hybrid particle swarm optimization and gravitational search algorithm. Neural Comput Appl 25(6):1423–1435
23.
Zurück zum Zitat Zawbaa HM, Emary E, Grosan C, Snasel V (2018) Large-dimensionality small-instance set feature selection: a hybrid bio-inspired heuristic approach. Swarm Evol Comput 42:29–42 Zawbaa HM, Emary E, Grosan C, Snasel V (2018) Large-dimensionality small-instance set feature selection: a hybrid bio-inspired heuristic approach. Swarm Evol Comput 42:29–42
25.
Zurück zum Zitat Hajimirzaei B, Navimipour NJ (2019) Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1):56–59 Hajimirzaei B, Navimipour NJ (2019) Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1):56–59
26.
Zurück zum Zitat ZorarpacI E, Özel SA (2016) A hybrid approach of differential evolution and artificial bee colony for feature selection. Expert Syst Appl 62:91–103 ZorarpacI E, Özel SA (2016) A hybrid approach of differential evolution and artificial bee colony for feature selection. Expert Syst Appl 62:91–103
27.
Zurück zum Zitat Huda RK, Banka H (2018) Efficient feature selection and classification algorithm based on PSO and rough sets. Neural Comput Appl 9:1–17 Huda RK, Banka H (2018) Efficient feature selection and classification algorithm based on PSO and rough sets. Neural Comput Appl 9:1–17
Metadaten
Titel
Hybrid optimization scheme for intrusion detection using considerable feature selection
verfasst von
S. Velliangiri
P. Karthikeyan
Publikationsdatum
07.09.2019
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 12/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-019-04477-2

Weitere Artikel der Ausgabe 12/2020

Neural Computing and Applications 12/2020 Zur Ausgabe

Soft Computing Techniques: Applications and Challenges

Groundwater level forecasting using soft computing techniques

Hybrid Artificial Intelligence and Machine Learning Technologies

Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks

Soft Computing Techniques: Applications and Challenges

EEG data analysis with stacked differentiable neural computers

Premium Partner