Feature Selection-based Intrusion Detection System Using Genetic Whale
Optimization Algorithm and Sample-based Classification
- URL: http://arxiv.org/abs/2201.00584v1
- Date: Mon, 3 Jan 2022 11:05:02 GMT
- Title: Feature Selection-based Intrusion Detection System Using Genetic Whale
Optimization Algorithm and Sample-based Classification
- Authors: Amir Mojtahedi, Farid Sorouri, Alireza Najafi Souha, Aidin Molazadeh,
Saeedeh Shafaei Mehr
- Abstract summary: A network intrusion detection system using feature selection based on a combination of Whale optimization algorithm (WOA) and genetic algorithm (GA) and sample-based classification is proposed.
The proposed method is based on the combination of feature selection based on Whale optimization algorithm and genetic algorithm with KNN classification in terms of accuracy criteria, has better results than other previous methods.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Preventing and detecting intrusions and attacks on wireless networks has
become an important and serious challenge. On the other hand, due to the
limited resources of wireless nodes, the use of monitoring nodes for permanent
monitoring in wireless sensor networks in order to prevent and detect intrusion
and attacks in this type of network is practically non-existent. Therefore, the
solution to overcome this problem today is the discussion of remote-control
systems and has become one of the topics of interest in various fields. Remote
monitoring of node performance and behavior in wireless sensor networks, in
addition to detecting malicious nodes within the network, can also predict
malicious node behavior in future. In present research, a network intrusion
detection system using feature selection based on a combination of Whale
optimization algorithm (WOA) and genetic algorithm (GA) and sample-based
classification is proposed. In this research, the standard data set KDDCUP1999
has been used in which the characteristics related to healthy nodes and types
of malicious nodes are stored based on the type of attacks in the network. The
proposed method is based on the combination of feature selection based on Whale
optimization algorithm and genetic algorithm with KNN classification in terms
of accuracy criteria, has better results than other previous methods. Based on
this, it can be said that the Whale optimization algorithm and the genetic
algorithm have extracted the features related to the class label well, and the
KNN method has been able to well detect the misconduct nodes in the intrusion
detection data set in wireless networks.
Related papers
- Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers [1.6001193161043425]
Botnets are computer networks controlled by malicious actors that present significant cybersecurity challenges.
This research addresses the sophisticated adversarial manipulations posed by attackers, aiming to undermine machine learning-based botnet detection systems.
We introduce a flow-based detection approach, leveraging machine learning and deep learning algorithms trained on the ISCX and ISOT datasets.
arXiv Detail & Related papers (2024-09-01T08:53:21Z) - Unveiling the Power of Sparse Neural Networks for Feature Selection [60.50319755984697]
Sparse Neural Networks (SNNs) have emerged as powerful tools for efficient feature selection.
We show that SNNs trained with dynamic sparse training (DST) algorithms can achieve, on average, more than $50%$ memory and $55%$ FLOPs reduction.
Our findings show that feature selection with SNNs trained with DST algorithms can achieve, on average, more than $50%$ memory and $55%$ FLOPs reduction.
arXiv Detail & Related papers (2024-08-08T16:48:33Z) - Detection-Rate-Emphasized Multi-objective Evolutionary Feature Selection for Network Intrusion Detection [21.104686670216445]
We propose DR-MOFS to model the feature selection problem in network intrusion detection as a three-objective optimization problem.
In most cases, the proposed method can outperform previous methods, i.e., lead to fewer features, higher accuracy and detection rate.
arXiv Detail & Related papers (2024-06-13T14:42:17Z) - LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in
Beyond 5G [9.63617966257402]
Intrusion detection signifies a central approach to ensuring the security of the communication network.
A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node.
Results validate the better performance, low time computations, and low complexity.
arXiv Detail & Related papers (2022-10-06T05:32:03Z) - A Systematic Evaluation of Node Embedding Robustness [77.29026280120277]
We assess the empirical robustness of node embedding models to random and adversarial poisoning attacks.
We compare edge addition, deletion and rewiring strategies computed using network properties as well as node labels.
We found that node classification suffers from higher performance degradation as opposed to network reconstruction.
arXiv Detail & Related papers (2022-09-16T17:20:23Z) - Mixture GAN For Modulation Classification Resiliency Against Adversarial
Attacks [55.92475932732775]
We propose a novel generative adversarial network (GAN)-based countermeasure approach.
GAN-based aims to eliminate the adversarial attack examples before feeding to the DNN-based classifier.
Simulation results show the effectiveness of our proposed defense GAN so that it could enhance the accuracy of the DNN-based AMC under adversarial attacks to 81%, approximately.
arXiv Detail & Related papers (2022-05-29T22:30:32Z) - Large-Scale Sequential Learning for Recommender and Engineering Systems [91.3755431537592]
In this thesis, we focus on the design of an automatic algorithms that provide personalized ranking by adapting to the current conditions.
For the former, we propose novel algorithm called SAROS that take into account both kinds of feedback for learning over the sequence of interactions.
The proposed idea of taking into account the neighbour lines shows statistically significant results in comparison with the initial approach for faults detection in power grid.
arXiv Detail & Related papers (2022-05-13T21:09:41Z) - Data-Driven Random Access Optimization in Multi-Cell IoT Networks with
NOMA [78.60275748518589]
Non-orthogonal multiple access (NOMA) is a key technology to enable massive machine type communications (mMTC) in 5G networks and beyond.
In this paper, NOMA is applied to improve the random access efficiency in high-density spatially-distributed multi-cell wireless IoT networks.
A novel formulation of random channel access management is proposed, in which the transmission probability of each IoT device is tuned to maximize the geometric mean of users' expected capacity.
arXiv Detail & Related papers (2021-01-02T15:21:08Z) - Malicious Requests Detection with Improved Bidirectional Long Short-term
Memory Neural Networks [8.379440129896548]
We formulate the problem of detecting malicious requests as a temporal sequence classification problem.
We propose a novel deep learning model namely Convolutional Neural Network-Bidirectional Long Short-term Memory-Convolutional Neural Network (CNN-BiLSTM-CNN)
Experimental results on HTTP dataset CSIC 2010 have demonstrated the effectiveness of the proposed method.
arXiv Detail & Related papers (2020-10-26T02:27:44Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.