Skip to main content

2024 | OriginalPaper | Buchkapitel

Multi-objective Optimal Feature Selection for Cyber Security Integrated with Deep Learning

verfasst von : Anupam Das, Subhajit Chakrabarty

Erschienen in: Proceedings of Third International Conference on Computing and Communication Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber security in the context of big data has emerged as a critical issue and an upcoming challenge in the research community. The security problems in big data are handled using machine learning algorithms. In recent years, artificial intelligence has been an emerging technology that machine imitates human behaviors. The Intrusion Detection System (IDS) is the major component for the detection of malicious activities or cyber attacks. In intrusion detection, Artificial intelligence engages a major role widely, which is the better way of building and adapting IDS. Nowadays, Neural Network algorithms are promising techniques for framing the novel artificial intelligence, which is used for real-time problems. The proposed cyber security model uses a cyber defense dataset and a secured network is created based on multi-objective criteria. Here, the optimal feature selection is performed on the basis of a multi-objective function, which focuses on the correlation and accuracy of attack detection using a meta-heuristic algorithm called Beetle Swarm Optimization (BSO). Further, the deep learning model called Recurrent Neural Network (RNN) is used for detecting the attack. The multi-objective-based optimal feature selection is helpful for enhancing the performance of cyber security with reduced redundancy and complexity.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kanimozhi, G.V., Prem Jacob, T.: Artificial Intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. In: ICT Express, vol. 5, no. 3, pp. 211–214, September 2019 Kanimozhi, G.V., Prem Jacob, T.: Artificial Intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. In: ICT Express, vol. 5, no. 3, pp. 211–214, September 2019
2.
Zurück zum Zitat Khouzani, M.H.R., Liu, Z., Malacaria, P.: Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. Eur. J. Oper. Res. 278, 894–903 (2019) Khouzani, M.H.R., Liu, Z., Malacaria, P.: Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. Eur. J. Oper. Res. 278, 894–903 (2019)
3.
Zurück zum Zitat Sabar, N.R., Yi, X., Song, A.: A bi-objective hyper-heuristic support vector machines for big data cyber-security. IEEE Access 6, 10421–10431 (2018) Sabar, N.R., Yi, X., Song, A.: A bi-objective hyper-heuristic support vector machines for big data cyber-security. IEEE Access 6, 10421–10431 (2018)
4.
Zurück zum Zitat Lai, K., Illindala, M., Subramaniam, K.: A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment. Appl. Energy 235, 204–218 (2019) Lai, K., Illindala, M., Subramaniam, K.: A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment. Appl. Energy 235, 204–218 (2019)
5.
Zurück zum Zitat Hamzeh, M., Vahidi, B., Nematollahi, A.F.: Optimizing configuration of cyber network considering graph theory structure and teaching–learning-based optimization (GT-TLBO). IEEE Trans. Indus. Inform. 15(4), 2083–2090 (2019) Hamzeh, M., Vahidi, B., Nematollahi, A.F.: Optimizing configuration of cyber network considering graph theory structure and teaching–learning-based optimization (GT-TLBO). IEEE Trans. Indus. Inform. 15(4), 2083–2090 (2019)
6.
Zurück zum Zitat Almohri, H.M.J., Watson, L.T., Yao, D., Ou, X.: Security optimization of dynamic networks with probabilistic graph modelling and linear programming. IEEE Trans. Depend. Sec. Comput. 13(4), 474–487 (2016)CrossRef Almohri, H.M.J., Watson, L.T., Yao, D., Ou, X.: Security optimization of dynamic networks with probabilistic graph modelling and linear programming. IEEE Trans. Depend. Sec. Comput. 13(4), 474–487 (2016)CrossRef
7.
Zurück zum Zitat Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., Smeraldi, F.: Decision support approaches for cyber security investment. Decis. Support Syst. 86, 13–23 (2016) Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., Smeraldi, F.: Decision support approaches for cyber security investment. Decis. Support Syst. 86, 13–23 (2016)
8.
Zurück zum Zitat Homer, J., Ou, X.: SAT-solving approaches to context-aware enterprise network security management. IEEE J. Sel. Areas Commun. 27(3), 315–322 (2009)CrossRef Homer, J., Ou, X.: SAT-solving approaches to context-aware enterprise network security management. IEEE J. Sel. Areas Commun. 27(3), 315–322 (2009)CrossRef
9.
Zurück zum Zitat Nandi, A.K., Medal, H.R., Vadlamani, S.: Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model. Comput. Oper. Res. 75, 118–131 (2016) Nandi, A.K., Medal, H.R., Vadlamani, S.: Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model. Comput. Oper. Res. 75, 118–131 (2016)
10.
Zurück zum Zitat Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Depend. Sec. Comput. 9(1), 61–74 (2012)CrossRef Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Depend. Sec. Comput. 9(1), 61–74 (2012)CrossRef
11.
Zurück zum Zitat Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. IEEE Syst. J. 7(3), 363–373 (2013)CrossRef Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. IEEE Syst. J. 7(3), 363–373 (2013)CrossRef
12.
Zurück zum Zitat Dezaki, H.H., Agah, M.M., Abyaneh, H.A., Haeri, H.: Sensitivity analysis of smart grids reliability due to indirect cyber-power interdependencies under various DG technologies, DG penetrations, and operation times. Energy Convers. Manag. 108, 377–391 (2016)CrossRef Dezaki, H.H., Agah, M.M., Abyaneh, H.A., Haeri, H.: Sensitivity analysis of smart grids reliability due to indirect cyber-power interdependencies under various DG technologies, DG penetrations, and operation times. Energy Convers. Manag. 108, 377–391 (2016)CrossRef
13.
Zurück zum Zitat Falahati, B., Fu, Y., Wu, L.: Reliability assessment of smart grid considering direct cyber-power interdependencies. IEEE Trans. Smart Grid 3(3), 1515–1524 (2012)CrossRef Falahati, B., Fu, Y., Wu, L.: Reliability assessment of smart grid considering direct cyber-power interdependencies. IEEE Trans. Smart Grid 3(3), 1515–1524 (2012)CrossRef
14.
Zurück zum Zitat Dezaki, H.H., Abyaneh, H.A., Haeri, H.: Impacts of direct cyber-power interdependencies on smart grid reliability under various penetration levels of microturbine/wind/solar distributed generations. IET Gener. Transm. Distrib. 10, 928–937 (2016)CrossRef Dezaki, H.H., Abyaneh, H.A., Haeri, H.: Impacts of direct cyber-power interdependencies on smart grid reliability under various penetration levels of microturbine/wind/solar distributed generations. IET Gener. Transm. Distrib. 10, 928–937 (2016)CrossRef
15.
Zurück zum Zitat Facchinetti, T., Della Vedova, M.L.: Real-time modeling for direct load control in cyber-physical power systems. In: IEEE Transactions on Industrial Informatics, vol. 7, no. 4, pp. 689–698, November 2011 Facchinetti, T., Della Vedova, M.L.: Real-time modeling for direct load control in cyber-physical power systems. In: IEEE Transactions on Industrial Informatics, vol. 7, no. 4, pp. 689–698, November 2011
16.
Zurück zum Zitat Chen, T. Zhu, Y., Teng, J.: Beetle swarm optimisation for solving investment portfolio problems. J. Eng. 2018(16), 1600–1605 (2018) Chen, T. Zhu, Y., Teng, J.: Beetle swarm optimisation for solving investment portfolio problems. J. Eng. 2018(16), 1600–1605 (2018)
17.
Zurück zum Zitat Li, F., Liu, M: A hybrid convolutional and recurrent neural network for hippocampus analysis in Alzheimer's disease. J. Neurosci. Methods 323, 108–118 (2019) Li, F., Liu, M: A hybrid convolutional and recurrent neural network for hippocampus analysis in Alzheimer's disease. J. Neurosci. Methods 323, 108–118 (2019)
18.
Zurück zum Zitat Bonyadi, M.R., Michalewicz, Z.: Analysis of stability, local convergence, and transformation sensitivity of a variant of the particle swarm optimization algorithm. IEEE Trans. Evol. Comput. 20(3), 370–385 (2016)CrossRef Bonyadi, M.R., Michalewicz, Z.: Analysis of stability, local convergence, and transformation sensitivity of a variant of the particle swarm optimization algorithm. IEEE Trans. Evol. Comput. 20(3), 370–385 (2016)CrossRef
19.
Zurück zum Zitat Wu, J., Yang, H.: Linear regression-based efficient svm learning for large-scale classification. IEEE Trans. Neural Netw. Learn. Syst. 26(10), 2357–2369 (2015)MathSciNetCrossRef Wu, J., Yang, H.: Linear regression-based efficient svm learning for large-scale classification. IEEE Trans. Neural Netw. Learn. Syst. 26(10), 2357–2369 (2015)MathSciNetCrossRef
20.
Zurück zum Zitat Zhang, S., Li, X., Zong, M., Zhu, X., Wang, R.: Efficient kNN classification with different numbers of nearest neighbors. IEEE Trans. Neural Netw. Learn. Syst. 29(5), 1774–1785 (2018)MathSciNetCrossRef Zhang, S., Li, X., Zong, M., Zhu, X., Wang, R.: Efficient kNN classification with different numbers of nearest neighbors. IEEE Trans. Neural Netw. Learn. Syst. 29(5), 1774–1785 (2018)MathSciNetCrossRef
21.
Zurück zum Zitat Niu, H., Bhowmick, C., Jagannathan, S.: Attack detection and approximation in nonlinear networked control systems using neural networks. IEEE Trans. Neural Netw. Learn. Syst. 31(1), 235–245 (2020)MathSciNetCrossRef Niu, H., Bhowmick, C., Jagannathan, S.: Attack detection and approximation in nonlinear networked control systems using neural networks. IEEE Trans. Neural Netw. Learn. Syst. 31(1), 235–245 (2020)MathSciNetCrossRef
22.
Zurück zum Zitat Nancy, P. Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S.V.N., Selvi, M., Arputharaj, K.: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun. 14(5), 888–895 (2020) Nancy, P. Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S.V.N., Selvi, M., Arputharaj, K.: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun. 14(5), 888–895 (2020)
23.
Zurück zum Zitat Joshi, A.S., Kulkarni, O., Kakandikar, G.M., Nandedkar, V.M.: Cuckoo search optimization—a review. Mater. Today: Proc. 4(8), 7262–7269 (2017) Joshi, A.S., Kulkarni, O., Kakandikar, G.M., Nandedkar, V.M.: Cuckoo search optimization—a review. Mater. Today: Proc. 4(8), 7262–7269 (2017)
Metadaten
Titel
Multi-objective Optimal Feature Selection for Cyber Security Integrated with Deep Learning
verfasst von
Anupam Das
Subhajit Chakrabarty
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0892-5_13