Crow-AFL: Crow Based Adaptive Fractional Lion Optimization Approach for the Intrusion Detection
- 11 Downloads
Abstract
Intrusion detection has played a major role in ensuring the cybersecurity in various networks. Literature works deal with several cyber attacks in the data through designing various supervised approaches, but have not considered the size of the database during the optimization. Since, the data increases in size exponentially, it is necessary to cluster the database before detecting the presence of an intruder in the system. This work has considered these challenges and thus, has introduced a Crow based Adaptive Fractional Lion (Crow-AFL) optimization approach. The proposed intrusion detection system clusters the database into several groups with the Crow-AFL and detects the presence of intrusion in the clusters with the use of the HSDT classifier. Then, the compact data is provided to the deep belief network trained with Crow-AFL for identifying the presence of intrusion in the entire database. The simulation of the proposed Crow-AFL algorithm is done with the DARPA’s KDD cup dataset 1999. The metrics, accuracy, TPR, and TNR, measure the performance of the proposed Crow-AFL algorithm, and it has shown better performance with the value of 96%, 95%, and 96%, respectively.
Keywords
Intrusion detection Cyber security Clusters DBN DARPA’s KDD cup dataset 1999Notes
References
- 1.Singh, S., & Silakari, S. (2009). A survey of cyber-attack detection systems. International Journal of Computer Science and Network Security,9(5), 1–10.Google Scholar
- 2.Acharya, N., & Singh, S. (2017). An IWD-based feature selection method for intrusion detection system. Soft Computing,22, 1–10.Google Scholar
- 3.Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior,48, 51–61.CrossRefGoogle Scholar
- 4.Boulaiche, A., & Adi, K. (2018). An auto-learning approach for network intrusion detection. Telecommunication Systems,68(2), 277–294.CrossRefGoogle Scholar
- 5.Zhang, H., Wang, Y., Chen, H., Zhao, Y., & Zhang, J. (2017). Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks. Optical Fiber Technology,39, 37–42.CrossRefGoogle Scholar
- 6.Orojloo, H., & Azgomi, M. A. (2017). A game-theoretic approach to model and quantify the security of cyber-physical systems. Computers in Industry,88, 44–57.CrossRefGoogle Scholar
- 7.Mitchell, R., & Chen, R. (2013). On survivability of mobile cyber physical systems with intrusion detection. Wireless Personal Communications,68(4), 1377–1391.CrossRefGoogle Scholar
- 8.Folino, G., & Pisani, F. S. (2016). Evolving meta-ensemble of classifiers for handling incomplete and unbalanced datasets in the cyber security domain. Applied Soft Computing,47, 179–190.CrossRefGoogle Scholar
- 9.Raman, M. G., Somu, N., Kirthivasan, K., Liscano, R., & Sriram, V. S. (2017). An efficient intrusion detection system based on hypergraph-Genetic algorithm for parameter optimization and feature selection in support vector machine. Knowledge-Based Systems,134, 1–12.CrossRefGoogle Scholar
- 10.Kuang, F., Xu, W., & Zhang, S. (2014). A novel hybrid KPCA and SVM with GA model for intrusion detection. Applied Soft Computing,18, 178–184.CrossRefGoogle Scholar
- 11.Wang, G., Hao, J., Ma, J., & Huang, L. (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications,37(9), 6225–6232.CrossRefGoogle Scholar
- 12.Sadhasivan, D. K., & Balasubramanian, K. (2017). A novel LWCSO-PKM-based feature optimization and classification of attack types in SCADA network. Arabian Journal for Science and Engineering,42(8), 3435–3449.CrossRefGoogle Scholar
- 13.Pajouh, H. H., Dastghaibyfard, G., & Hashemi, S. (2017). Two-tier network anomaly detection model: A machine learning approach. Journal of Intelligent Information Systems,48(1), 61–74.CrossRefGoogle Scholar
- 14.Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications,36(1), 16–24.CrossRefGoogle Scholar
- 15.Veeraiah, N., & Krishna, B. T. (2018). Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy Naïve Bayes rule. Multimedia Research,1(1), 27–32.Google Scholar
- 16.Powalkar, S., & Mukhedkar, M. M. (2015). Fast face recognition based on wavelet transform on PCA. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET),1(4), 21–24.Google Scholar
- 17.Tsai, C. F., Hsu, Y. F., Lin, C. Y., & Lin, W. Y. (2009). Intrusion detection by machine learning: A review. Expert Systems with Applications,36(1), 11994–12000.CrossRefGoogle Scholar
- 18.Huang, J., Zhu, Q., Yang, L., Cheng, D., & Wu, Q. (2017). A novel outlier cluster detection algorithm without top-n parameter. Knowledge-Based Systems,121, 32–40.CrossRefGoogle Scholar
- 19.Daga, B. S., Ghatol, A. A., & Thakare V. M. (2017). Silhouette based human fall detection using multimodal classifiers for content based video retrieval systems. In Proceedings of the international conference on intelligent computing, instrumentation and control technologies (ICICICT) (pp. 1409–1416).Google Scholar
- 20.Wu, M., Song, Z., & Moon, Y. B. (2019). Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. Journal of Intelligent Manufacturing,30(3),1111–1123.CrossRefGoogle Scholar
- 21.Bamakan, S. M. H., Wang, H., Yingjie, T., & Shi, Y. (2016). An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing,199, 90–102.CrossRefGoogle Scholar
- 22.Devi, R., Jha, R. K., Gupta, A., Jain, S., & Kumar, P. (2017). Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network. AEU-International Journal of Electronics and Communications,74, 94–106.CrossRefGoogle Scholar
- 23.Raman, M. G., Somu, N., Kirthivasan, K., & Sriram, V. S. (2017). A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Networks,92, 89–97.CrossRefGoogle Scholar
- 24.Wang, H., Gu, J., & Wang, S. (2017). An effective intrusion detection framework based on SVM with feature augmentation. Knowledge-Based Systems,136, 130–139.CrossRefGoogle Scholar
- 25.Azad, C., & Jha, V. K. (2017). Fuzzy min–max neural network and particle swarm optimization based intrusion detection system. Microsystem Technologies,23(4), 907–918.CrossRefGoogle Scholar
- 26.Moon, D., Im, H., Kim, I., & Park, J. H. (2015). DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. The Journal of Supercomputing,73(7), 2881–2895.CrossRefGoogle Scholar
- 27.Jing, L., & Bin, W. (2016). Network intrusion detection method based on relevance deep learning. In International conference on intelligent transportation, big data & smart city (ICITBS), Changsha, China (pp. 237–240).Google Scholar
- 28.Askarzadeh, A. (2016). A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Computers & Structures,169, 1–12.CrossRefGoogle Scholar
- 29.Chander, S., Vijaya, P., & Dhyani, P. (2018). Multi kernel and dynamic fractional lion optimization algorithm for data clustering. Alexandria Engineering Journal,57(1), 267-276.CrossRefGoogle Scholar
- 30.Chandanapalli, S. B., Sreenivasa Reddy, E., & Rajya Lakshmi, D. (2017). FTDT: Rough set integrated functional tangent decision tree for finding the status of aqua pond in aquaculture. Journal of Intelligent & Fuzzy Systems,32, 1821–1832.CrossRefGoogle Scholar
- 31.The UCI KDD Archive KDD Cup 1999 Data. Retrieved from October 2017 http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
- 32.Khan, I. A., Pi, D., Khan, Z. U., Hussain, Y., & Nawaz, A. (2019). HML-IDS: a hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems. IEEE Access,7, 89507–89521.CrossRefGoogle Scholar
- 33.Yang, Hongyu, & Wang, Fengyan. (2019). Wireless network intrusion detection based on improved convolutional neural network. IEEE Access,7, 64366–64374.CrossRefGoogle Scholar