Multi-objective evolutionary neural architecture search for network intrusion detection

被引:1
|
作者
Lin, Qiuzhen [1 ]
Liu, Zhihao [1 ]
Yang, Yeming [1 ]
Wong, Ka-Chun [2 ]
Lu, Yahui [1 ]
Li, Jianqiang [1 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Intrusion detection system; Neural architecture search; Multi-objective optimization; ALGORITHM;
D O I
10.1016/j.swevo.2024.101702
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network Intrusion Detection (NID) becomes significantly important for protecting the security of information systems, as the frequency and complexity of network attacks are increasing with the rapid development of the Internet. Recent research studies have proposed various neural network models for NID, but they need to manually design the network architectures based on expert knowledge, which is very time-consuming. To solve this problem, this paper proposes a Multi-objective Evolutionary Neural Architecture Search (MENAS) method, which can automatically design neural network models for NID. First, a comprehensive search space is designed and then a weight-sharing mechanism is used to construct a supernet for NID, allowing each subnet to inherit weights from the supernet for direct performance evaluation. Subsequently, the subnets are encoded as chromosomes for multi-objective evolutionary search, which simultaneously optimizes two objectives: enhancing the model's detection performance and reducing its complexity. To improve the search capability, a path-based crossover method is designed, which can iteratively refine the subnets' architectures by simultaneously optimizing their accuracy and complexity for NID. At last, our MENAS method has been validated through extensive experiments on three well-known NID datasets: NSL-KDD, UNSW-NB15, and CICIDS2017. The experiments show that our MENAS method obtains an average 1.45% improvement on accuracy and an average 68.70% reduction on floating-point operations through multi-objective optimization process on six scenarios, which outperforms some state-of-the-art NID methods.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Multi-Objective Neural Architecture Search for Light-Weight Model
    Li, Nannan
    Chen, Yaran
    Ding, Zixiang
    Zhao, Dongbin
    Pang, Zhonghua
    Qin, Ruisheng
    2019 CHINESE AUTOMATION CONGRESS (CAC2019), 2019, : 3794 - 3799
  • [32] CGP-NAS: Real-based solutions encoding for multi-objective evolutionary neural architecture search
    Garcia-Garcia, Cosijopii
    Escalante, Hugo Jair
    Morales-Reyes, Alicia
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2022, 2022, : 643 - 646
  • [33] Multi-objective Cuckoo Algorithm for Mobile Devices Network Architecture Search
    Zhang, Nan
    Wang, Jianzong
    Yang, Jian
    Qu, Xiaoyang
    Xiao, Jing
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2020, PT I, 2020, 12396 : 312 - 324
  • [34] Artificial neural network-based intrusion detection system using multi-objective genetic algorithm
    Patel, N. D.
    Mehtre, B. M.
    Wankar, Rajeev
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 21 (3-4) : 320 - 335
  • [35] A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems
    Gomez, J.
    Gil, C.
    Banos, R.
    Marquez, A. L.
    Montoya, F. G.
    Montoya, M. G.
    SOFT COMPUTING, 2013, 17 (02) : 255 - 263
  • [36] A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems
    J. Gómez
    C. Gil
    R. Baños
    A. L. Márquez
    F. G. Montoya
    M. G. Montoya
    Soft Computing, 2013, 17 : 255 - 263
  • [37] Multi-objective Mobile Network Anomaly Intrusion
    Edge, Kenneth S.
    Lamont, Gary B.
    Raines, Richard A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 187 - 192
  • [38] Neural network regularization and ensembling using multi-objective evolutionary algorithms
    Jin, Y
    Okabe, T
    Sendhoff, B
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 1 - 8
  • [39] Model Order Determination: A Multi-Objective Evolutionary Neural Network Scheme
    Ligeiro R.
    Carvalho J.P.
    SN Computer Science, 2022, 3 (3)
  • [40] Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
    Asgharzadeh, Hossein
    Ghaffari, Ali
    Masdari, Mohammad
    Gharehchopogh, Farhad Soleimanian
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 175 : 1 - 21