Probe Attack Detection Using an Improved Intrusion Detection System

被引:7
|
作者
Almazyad, Abdulaziz [1 ]
Halman, Laila [1 ]
Alsaeed, Alaa [1 ]
机构
[1] King Saud Univ, Coll Comp Sci, Dept Comp Engn, Riyadh 11421, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 03期
关键词
GWO; IDS; InSDN; LightGBM; probe attack; SDN;
D O I
10.32604/cmc.2023.033382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The novel Software Defined Networking (SDN) architecture poten-tially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive features. Nevertheless, such benefits lead to a more adverse environment entailing network breakdown, systems paralysis, and online banking fraudulence and robbery. As one of the most common and dangerous threats in SDN, probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities, which is then manipulated to undermine the entire system. Precision, high per-formance, and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time, optimize prediction performance, and provide a holistic understanding of machine learning data. As the extension of astute machine learning algorithms into an Intrusion Detection System (IDS) through SDN has garnered much scholarly attention within the past decade, this study recommended an effective IDS under the Grey-wolf optimizer (GWO) and Light Gradient Boosting Machine (Light-GBM) classifier for probe attack identification. The InSDN dataset was employed to train and test the proposed IDS, which is deemed to be a novel benchmarking dataset in SDN. The proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within SDN. The results revealed that the proposed IDS outperforms the state-of-the-art IDSs, as it achieved 99.8% accuracy, 99.7% recall, 99.99% precision, and 99.8% F-measure.
引用
收藏
页码:4769 / 4784
页数:16
相关论文
共 50 条
  • [21] Sinkhole Attack Detection by Enhanced Reputation-Based Intrusion Detection System
    Mohammed, Fadwa Abdul-Bari Ahmed
    Mekky, Nagham E.
    Soliman, Hassan
    Hikal, Noha A.
    IEEE ACCESS, 2024, 12 : 86985 - 86996
  • [22] Network Intrusion Detection System based on Generative Adversarial Network for Attack Detection
    Das, Abhijit
    Balakrishnan, S. G.
    Pramod
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 757 - 766
  • [23] Improved kernel based intrusion detection system
    Kim, Byung-Joo
    Kim, Il Kon
    ARTIFICIAL NEURAL NETWORKS - ICANN 2006, PT 2, 2006, 4132 : 863 - 871
  • [24] Improved Genetic Algorithm for Intrusion Detection System
    Pal, Dheeraj
    Parashar, Amrita
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 835 - 839
  • [25] An improved intrusion detection system based on agent
    Dong, Bin
    Liu, Xiu-Ling
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3164 - 3167
  • [26] Improved hybrid intelligent intrusion detection system using AI technique
    Shanmugam, Bharanidharan
    Idris, Norbik Bashah
    NEURAL NETWORK WORLD, 2007, 17 (04) : 351 - 362
  • [27] A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm
    Farzadnia, Ehsan
    Shirazi, Hossein
    Nowroozi, Alireza
    COMPUTER JOURNAL, 2021, 64 (08): : 1193 - 1214
  • [28] An Improved Intrusion Detection Systems using BGAN
    Ahmad, Ramli
    Li, Li-Hua
    Sharma, Alok Kumar
    2022 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN, IEEE ICCE-TW 2022, 2022, : 13 - 14
  • [29] Adversarial Attack Detection Approach for Intrusion Detection Systems
    Degirmenci, Elif
    Ozcelik, Ilker
    Yazici, Ahmet
    IEEE ACCESS, 2024, 12 : 195996 - 196009
  • [30] Research of Data mining in Intrusion Detection System and the uncertainty of the attack
    Liu, Wei
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1305 - 1308