Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization

被引:14
|
作者
Alkanhel, Reem [1 ]
El-kenawy, El-Sayed M. [2 ]
Abdelhamid, Abdelaziz A. [3 ,4 ]
Ibrahim, Abdelhameed [5 ]
Alohali, Manal Abdullah [6 ]
Abotaleb, Mostafa [7 ]
Khafaga, Doaa Sami [8 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[2] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[3] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[4] Shaqra Univ, Coll Comp & Informat Technol, Dept Comp Sci, Shaqra 11961, Saudi Arabia
[5] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
[6] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Informat Syst Dept, POB 84428, Riyadh 11671, Saudi Arabia
[7] South Ural State Univ, Dept Syst Programming, Chelyabinsk 454080, Russia
[8] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Feature selection; grey wolf optimization; dipper throated; optimization; intrusion detection; internet-of-things (IoT); DETECTION SYSTEM; META-HEURISTICS; MODEL; CLASSIFICATION; ALGORITHM; COVID-19;
D O I
10.32604/cmc.2023.033273
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Applications of internet-of-things (IoT) are increasingly being used in many facets of our daily life, which results in an enormous volume of data. Cloud computing and fog computing, two of the most common technologies used in IoT applications, have led to major security concerns. Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient. Several artificial intelligence (AI) based security solutions, such as intrusion detection systems (IDS), have been proposed in recent years. Intelligent technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection (FS) techniques to increase classifica-tion accuracy by minimizing the number of features selected. On the other hand, metaheuristic optimization algorithms have been widely used in feature selection in recent decades. In this paper, we proposed a hybrid optimization algorithm for feature selection in IDS. The proposed algorithm is based on grey wolf (GW), and dipper throated optimization (DTO) algorithms and is referred to as GWDTO. The proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better performance. On the employed IoT-IDS dataset, the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in the literature to validate its superiority. In addition, a statistical analysis is performed to assess the stability and effectiveness of the proposed approach. Experimental results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
引用
收藏
页码:2677 / 2693
页数:17
相关论文
共 50 条
  • [31] Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
    Ayo, Femi Emmanuel
    Folorunso, Sakinat Oluwabukonla
    Abayomi-Alli, Adebayo A.
    Adekunle, Adebola Olayinka
    Awotunde, Joseph Bamidele
    INFORMATION SECURITY JOURNAL, 2020, 29 (06): : 267 - 283
  • [32] A hybrid feature selection and aggregation strategy-based stacking ensemble technique for network intrusion detection
    Huang, Yongqing
    Chen, Guoqing
    Gou, Jin
    Fan, Zongwen
    Liao, Yongxin
    APPLIED INTELLIGENCE, 2025, 55 (01)
  • [33] Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems
    Mhawi, Doaa N.
    Aldallal, Ammar
    Hassan, Soukeana
    SYMMETRY-BASEL, 2022, 14 (07):
  • [34] Selection and detection of network intrusion feature based on BPSO-SVM
    College of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
    不详
    Jisuanji Gongcheng, 2006, 8 (37-39):
  • [35] Majority Voting and Feature Selection Based Network Intrusion Detection System
    Patil, Dharmaraj R.
    Pattewar, Tareek M.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (06):
  • [36] Healthcare Intrusion Detection using Hybrid Correlation-based Feature Selection-Bat Optimization Algorithm with Convolutional Neural Network
    Bella, H. Kanakadurga
    Vasundra, S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (01) : 671 - 679
  • [37] Hybrid feature selection for modeling intrusion detection systems
    Chebrolu, S
    Abraham, A
    Thomas, JP
    NEURAL INFORMATION PROCESSING, 2004, 3316 : 1020 - 1025
  • [38] A Cascaded Feature Selection Approach in Network Intrusion Detection
    Sun, Yong
    Liu, Feng
    2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 119 - 124
  • [39] The Research of Intrusion Detection Feature Selection Method in Network
    Ye, Zheng-wang
    2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 30, 2014, 30 : 306 - 309
  • [40] A Quantum Feature Selection Method for Network Intrusion Detection
    Li, Mingze
    Zhang, Hongliang
    Fan, Lei
    Han, Zhu
    2022 IEEE 19TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2022), 2022, : 281 - 289