Advertisement

Crow-AFL: Crow Based Adaptive Fractional Lion Optimization Approach for the Intrusion Detection

  • R. GaneshanEmail author
  • Paul Rodrigues
Article
  • 11 Downloads

Abstract

Intrusion detection has played a major role in ensuring the cybersecurity in various networks. Literature works deal with several cyber attacks in the data through designing various supervised approaches, but have not considered the size of the database during the optimization. Since, the data increases in size exponentially, it is necessary to cluster the database before detecting the presence of an intruder in the system. This work has considered these challenges and thus, has introduced a Crow based Adaptive Fractional Lion (Crow-AFL) optimization approach. The proposed intrusion detection system clusters the database into several groups with the Crow-AFL and detects the presence of intrusion in the clusters with the use of the HSDT classifier. Then, the compact data is provided to the deep belief network trained with Crow-AFL for identifying the presence of intrusion in the entire database. The simulation of the proposed Crow-AFL algorithm is done with the DARPA’s KDD cup dataset 1999. The metrics, accuracy, TPR, and TNR, measure the performance of the proposed Crow-AFL algorithm, and it has shown better performance with the value of 96%, 95%, and 96%, respectively.

Keywords

Intrusion detection Cyber security Clusters DBN DARPA’s KDD cup dataset 1999 

Notes

References

  1. 1.
    Singh, S., & Silakari, S. (2009). A survey of cyber-attack detection systems. International Journal of Computer Science and Network Security,9(5), 1–10.Google Scholar
  2. 2.
    Acharya, N., & Singh, S. (2017). An IWD-based feature selection method for intrusion detection system. Soft Computing,22, 1–10.Google Scholar
  3. 3.
    Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior,48, 51–61.CrossRefGoogle Scholar
  4. 4.
    Boulaiche, A., & Adi, K. (2018). An auto-learning approach for network intrusion detection. Telecommunication Systems,68(2), 277–294.CrossRefGoogle Scholar
  5. 5.
    Zhang, H., Wang, Y., Chen, H., Zhao, Y., & Zhang, J. (2017). Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks. Optical Fiber Technology,39, 37–42.CrossRefGoogle Scholar
  6. 6.
    Orojloo, H., & Azgomi, M. A. (2017). A game-theoretic approach to model and quantify the security of cyber-physical systems. Computers in Industry,88, 44–57.CrossRefGoogle Scholar
  7. 7.
    Mitchell, R., & Chen, R. (2013). On survivability of mobile cyber physical systems with intrusion detection. Wireless Personal Communications,68(4), 1377–1391.CrossRefGoogle Scholar
  8. 8.
    Folino, G., & Pisani, F. S. (2016). Evolving meta-ensemble of classifiers for handling incomplete and unbalanced datasets in the cyber security domain. Applied Soft Computing,47, 179–190.CrossRefGoogle Scholar
  9. 9.
    Raman, M. G., Somu, N., Kirthivasan, K., Liscano, R., & Sriram, V. S. (2017). An efficient intrusion detection system based on hypergraph-Genetic algorithm for parameter optimization and feature selection in support vector machine. Knowledge-Based Systems,134, 1–12.CrossRefGoogle Scholar
  10. 10.
    Kuang, F., Xu, W., & Zhang, S. (2014). A novel hybrid KPCA and SVM with GA model for intrusion detection. Applied Soft Computing,18, 178–184.CrossRefGoogle Scholar
  11. 11.
    Wang, G., Hao, J., Ma, J., & Huang, L. (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications,37(9), 6225–6232.CrossRefGoogle Scholar
  12. 12.
    Sadhasivan, D. K., & Balasubramanian, K. (2017). A novel LWCSO-PKM-based feature optimization and classification of attack types in SCADA network. Arabian Journal for Science and Engineering,42(8), 3435–3449.CrossRefGoogle Scholar
  13. 13.
    Pajouh, H. H., Dastghaibyfard, G., & Hashemi, S. (2017). Two-tier network anomaly detection model: A machine learning approach. Journal of Intelligent Information Systems,48(1), 61–74.CrossRefGoogle Scholar
  14. 14.
    Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications,36(1), 16–24.CrossRefGoogle Scholar
  15. 15.
    Veeraiah, N., & Krishna, B. T. (2018). Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy Naïve Bayes rule. Multimedia Research,1(1), 27–32.Google Scholar
  16. 16.
    Powalkar, S., & Mukhedkar, M. M. (2015). Fast face recognition based on wavelet transform on PCA. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET),1(4), 21–24.Google Scholar
  17. 17.
    Tsai, C. F., Hsu, Y. F., Lin, C. Y., & Lin, W. Y. (2009). Intrusion detection by machine learning: A review. Expert Systems with Applications,36(1), 11994–12000.CrossRefGoogle Scholar
  18. 18.
    Huang, J., Zhu, Q., Yang, L., Cheng, D., & Wu, Q. (2017). A novel outlier cluster detection algorithm without top-n parameter. Knowledge-Based Systems,121, 32–40.CrossRefGoogle Scholar
  19. 19.
    Daga, B. S., Ghatol, A. A., & Thakare V. M. (2017). Silhouette based human fall detection using multimodal classifiers for content based video retrieval systems. In Proceedings of the international conference on intelligent computing, instrumentation and control technologies (ICICICT) (pp. 1409–1416).Google Scholar
  20. 20.
    Wu, M., Song, Z., & Moon, Y. B. (2019). Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. Journal of Intelligent Manufacturing,30(3),1111–1123.CrossRefGoogle Scholar
  21. 21.
    Bamakan, S. M. H., Wang, H., Yingjie, T., & Shi, Y. (2016). An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing,199, 90–102.CrossRefGoogle Scholar
  22. 22.
    Devi, R., Jha, R. K., Gupta, A., Jain, S., & Kumar, P. (2017). Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network. AEU-International Journal of Electronics and Communications,74, 94–106.CrossRefGoogle Scholar
  23. 23.
    Raman, M. G., Somu, N., Kirthivasan, K., & Sriram, V. S. (2017). A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Networks,92, 89–97.CrossRefGoogle Scholar
  24. 24.
    Wang, H., Gu, J., & Wang, S. (2017). An effective intrusion detection framework based on SVM with feature augmentation. Knowledge-Based Systems,136, 130–139.CrossRefGoogle Scholar
  25. 25.
    Azad, C., & Jha, V. K. (2017). Fuzzy min–max neural network and particle swarm optimization based intrusion detection system. Microsystem Technologies,23(4), 907–918.CrossRefGoogle Scholar
  26. 26.
    Moon, D., Im, H., Kim, I., & Park, J. H. (2015). DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. The Journal of Supercomputing,73(7), 2881–2895.CrossRefGoogle Scholar
  27. 27.
    Jing, L., & Bin, W. (2016). Network intrusion detection method based on relevance deep learning. In International conference on intelligent transportation, big data & smart city (ICITBS), Changsha, China (pp. 237–240).Google Scholar
  28. 28.
    Askarzadeh, A. (2016). A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Computers & Structures,169, 1–12.CrossRefGoogle Scholar
  29. 29.
    Chander, S., Vijaya, P., & Dhyani, P. (2018). Multi kernel and dynamic fractional lion optimization algorithm for data clustering. Alexandria Engineering Journal,57(1), 267-276.CrossRefGoogle Scholar
  30. 30.
    Chandanapalli, S. B., Sreenivasa Reddy, E., & Rajya Lakshmi, D. (2017). FTDT: Rough set integrated functional tangent decision tree for finding the status of aqua pond in aquaculture. Journal of Intelligent & Fuzzy Systems,32, 1821–1832.CrossRefGoogle Scholar
  31. 31.
    The UCI KDD Archive KDD Cup 1999 Data. Retrieved from October 2017 http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
  32. 32.
    Khan, I. A., Pi, D., Khan, Z. U., Hussain, Y., & Nawaz, A. (2019). HML-IDS: a hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems. IEEE Access,7, 89507–89521.CrossRefGoogle Scholar
  33. 33.
    Yang, Hongyu, & Wang, Fengyan. (2019). Wireless network intrusion detection based on improved convolutional neural network. IEEE Access,7, 64366–64374.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringKoneru Lakshmaiah Education FoundationVaddeswaramIndia
  2. 2.Department of Computer EngineeringCollege of Computer Science, King Khalid UniversityAbhaSaudi Arabia

Personalised recommendations