Abstract
Due to continued growth in both cyberattacks and network data size, organizations need to develop advanced ways to keep their networks and data secure the dynamic nature of evolving malicious attacks. Nowadays, large number of security mechanisms are installed in the network but it opens the possibility for adversaries to conduct malicious activity in the computer network. To detect potential attacks, intrusion detection systems are important security tools that can help to increase the security posture of computer network. In order to identify new malicious or anomalous attacks, this study developed an opposition self-adaptive grasshopper optimization algorithm based on mutation and perceptive concept. Moreover, reinforcement learning is utilized in support vector machine, named gain actor critic with support vector machine to increase the detection capabilities by identifying new cyberattacks. Extensive experiments are conducted on standard intrusion detection datasets such as NSL-KDD, AWID and CIC-IDS 2017 to measure the performance of the proposed method. It can more reliably detect and classify modern attacks with high accuracy and low false-positive rate. The comparative simulation results demonstrates that the proposed algorithm is more capable than basic grasshopper optimization algorithm and other used evolutionary techniques in terms of detection rate, false-positive rate and accuracy for solving IDS problems. The proposed model has provided high detection rate of 99.71%, accuracy of 99.23% and low false-positive rate of 0.009 in NSL-KDD with six optimal features; in AWID data, high detection rate of 99.11%, accuracy of 99.15% and low false-positive rate of 0.091 with eight optimal features, and high detection rate of 99.61%, accuracy of 99.35% and low false-positive rate of 0.052 in CIC-IDS 2017 data with eight optimal features.
Similar content being viewed by others
References
Kaur S, Singh M (2019) Hybrid intrusion detection and signature generation using deep recurrent neural networks. Neural Comput Appl 9:1–19
Peng Z, Gurram P, Kwon H, Yin W (2015) Sparse kernel learning-based feature selection for anomaly detection. IEEE Trans Aerosp Electron Syst 51(3):1698–1716
Sadreazami H, Mohammadi A, Asif A, Plataniotis KN (2018) Distributed-graph-based statistical approach for intrusion detection in cyber-physical systems. IEEE Trans Signal Inf Process over Netw 4(1):137–147
Wang Y, Lee L, Xue B, Member S, Wang L, Song M (2018) A posteriori hyperspectral anomaly detection for unlabeled classification. IEEE Trans Geosci Remote Sens 56(6):3091–3106
Weller-Fahy DJ, Borghetti BJ, Sodemann AA (2015) A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun Surv Tutor 17(1):70–91
Maciá-Pérez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martínez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca I (2011) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58(3):722–732
Ahmed M, Naser Mahmood A, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31
Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37–50
Saremi S, Mirjalili S, Lewis A (2017) Grasshopper optimisation algorithm: theory and application. Adv Eng Softw 105:30–47
Allen TT, Roychowdhury S, Liu E (2018) Reward-based Monte Carlo-Bayesian reinforcement learning for cyber preventive maintenance. Comput Ind Eng 126:578–594
Drugan MM (2019) Reinforcement learning versus evolutionary computation: a survey on hybrid algorithms. Swarm Evol Comput 44:228–246
Kim C, Park JS (2019) Designing online network intrusion detection using deep auto-encoder Q-learning. Comput Electron Eng 79:106460
Martinez C, Ramasso E, Perrin G, Rombaut M (2019) Adaptive early classification of temporal sequences using deep reinforcement learning. Knowl-Based Syst 190:105290
Dwivedi S, Vardhan M, Tripathi S (2020) An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Comput Netw 176:107251. https://doi.org/10.1016/j.comnet.2020.107251
Dwivedi S, Vardhan M, Tripathi S, Kumar A (2020) Implementation of adaptive scheme in evolutionary technique for anomaly—based intrusion detection. Evol Intell 13(1):103–117
Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247
Ambusaidi M, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998
Buczak A, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1175
Sedjelmaci H, Hadji M, Ansari N (2019) Cyber security game for intelligent transportation systems. IEEE Netw 33:216–222
Hajimirzaei B, Navimipour NJ (2018) Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5:56–59
Liang W, Li KC, Long J, Kui X, Zomaya AY (2020) An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans Ind Inform 16(3):2063–2071
Wang M, Lu Y, Qin J (2020) A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput Secur 88:101645
Caminero G, Lopez-Martin M, Carro B (2019) Adversarial environment reinforcement learning algorithm for intrusion detection. Comput Netw 159:96–109
Al-yaseen WL, Ali Z, Zakree M, Nazri A (2017) Real-time multi-agent system for an adaptive intrusion detection system. Pattern Recognit Lett 85:56–64
Liu J et al (2019) ANID-SEoKELM: adaptive network intrusion detection based on selective ensemble of kernel ELMs with random features. Knowl-Based Syst 177:104–116
Cruz T et al (2016) A Cybersecurity detection framework for supervisory control and data acquisition systems. IEEE Trans Ind Inform 12(6):2236–2246
Gu B, Sheng VS, Tay KY, Romano W, Li S (2014) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1–14
Sentelle CG, Anagnostopoulos GC, Georgiopoulos M (2016) A simple method for solving the SVM regularization path for semidefinite kernels. IEEE Trans Neural Netw Learn Syst 27(4):709–722
Aladeemy M, Adwan L, Booth A, Khasawneh MT, Poranki S (2020) New feature selection methods based on opposition-based learning and self-adaptive cohort intelligence for predicting patient no-shows. Appl Soft Comput J 86:105866
Nguyen MT, Kim K (2020) Genetic convolutional neural network for intrusion detection systems. Futur Gen Comput Syst 113:418–427
Li XK, Chen W, Zhang Q, Wu L (2020) Building auto-encoder intrusion detection system based on random forest feature selection. Comput Secur 95:101851
Zakeri A, Hokmabadi A (2018) Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Syst Appl 119:61–72
Mafarja M et al (2018) Evolutionary population dynamics and grasshopper optimization approaches for feature selection problems. Knowl-Based Syst 145:1–14
Rathore MM, Ahmad A, Paul A (2016) Real time intrusion detection system for ultra-high-speed big data environments. J Supercomput 72(9):3489–3510
Eesa AS, Orman Z, Brifcani AMA (2015) A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst Appl 42(5):2670–2679
Aamir R, Ashfaq R, Wang X, Zhexue J, Abbas H, He Y (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci (NY) 378:484–497
Emary E, Zawbaa HM, Grosan C (2017) Experienced gray wolf optimization through reinforcement learning and neural networks. IEEE Trans Neural Netw Learn Syst 29(3):681–694
Sengupta N, Sen J, Sil J, Saha M (2013) Designing of on line intrusion detection system using rough set theory and Q-learning algorithm. Neurocomputing 111:161–168
Mahmud M, Kaiser MS, Hussain A, Vassanelli S (2018) Applications of deep learning and reinforcement learning to biological data. IEEE Trans Neural Netw Learn Syst 29(6):2063–2079
Lopez-Martin M, Carro B, Sanchez-Esguevillas A (2020) Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst Appl 141:112963
Lin CJ, Chen CH (2011) Nonlinear system control using self-evolving neural fuzzy inference networks with reinforcement evolutionary learning. Appl Soft Comput J 11(8):5463–5476
Gupta S, Deep K (2019) A hybrid self-adaptive sine cosine algorithm with opposition based learning. Expert Syst Appl 119:210–230
Banitalebi A, Aziz MIA, Aziz ZA (2016) A self-adaptive binary differential evolution algorithm for large scale binary optimization problems. Inf Sci (NY) 367:487–511
Mafarja M, Aljarah I, Faris H, Hammouri AI, Al-Zoubi AM, Mirjalili S (2019) Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Syst Appl 117:267–286
Mazini M, Shirazi B, Mahdavi I (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J King Saud Univ Comput Inf Sci 31:541–553
Abdulhammed R, Faezipour M, Abuzneid A, Alessa A (2018) Enhancing wireless intrusion detection using machine learning classification with reduced attribute sets. In: 2018 14th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 2018, pp 524–529
Sharafaldin I, Habibi Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th international conference on information systems security and privacy, pp 108–116
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1–6
Divekar A, Parekh M, Savla V, Mishra R, Shirole M (2018) Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives. In: International conference on computing, communication and security (ICCCS), pp 1–8
Prasad M, Tripathi S, Dahal K (2020) An efficient feature selection based Bayesian and Rough set approach for intrusion detection. Appl Soft Comput J 87:105980
Elmasry W, Akbulut A, Zaim AH (2020) Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput Netw 168:107042
Garg S et al (2020) En-ABC: an ensemble artificial bee colony based anomaly detection scheme for cloud environment. J Parallel Distrib Comput 135:219–233
Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl-Based Syst 136:130–139
Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2015) Intrusion detection in 802. 11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutor 18(1):1–24
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shukla, A.K. Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm. Neural Comput & Applic 33, 7541–7561 (2021). https://doi.org/10.1007/s00521-020-05500-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-020-05500-7