Skip to main content
Log in

Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Due to continued growth in both cyberattacks and network data size, organizations need to develop advanced ways to keep their networks and data secure the dynamic nature of evolving malicious attacks. Nowadays, large number of security mechanisms are installed in the network but it opens the possibility for adversaries to conduct malicious activity in the computer network. To detect potential attacks, intrusion detection systems are important security tools that can help to increase the security posture of computer network. In order to identify new malicious or anomalous attacks, this study developed an opposition self-adaptive grasshopper optimization algorithm based on mutation and perceptive concept. Moreover, reinforcement learning is utilized in support vector machine, named gain actor critic with support vector machine to increase the detection capabilities by identifying new cyberattacks. Extensive experiments are conducted on standard intrusion detection datasets such as NSL-KDD, AWID and CIC-IDS 2017 to measure the performance of the proposed method. It can more reliably detect and classify modern attacks with high accuracy and low false-positive rate. The comparative simulation results demonstrates that the proposed algorithm is more capable than basic grasshopper optimization algorithm and other used evolutionary techniques in terms of detection rate, false-positive rate and accuracy for solving IDS problems. The proposed model has provided high detection rate of 99.71%, accuracy of 99.23% and low false-positive rate of 0.009 in NSL-KDD with six optimal features; in AWID data, high detection rate of 99.11%, accuracy of 99.15% and low false-positive rate of 0.091 with eight optimal features, and high detection rate of 99.61%, accuracy of 99.35% and low false-positive rate of 0.052 in CIC-IDS 2017 data with eight optimal features.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Kaur S, Singh M (2019) Hybrid intrusion detection and signature generation using deep recurrent neural networks. Neural Comput Appl 9:1–19

    Google Scholar 

  2. Peng Z, Gurram P, Kwon H, Yin W (2015) Sparse kernel learning-based feature selection for anomaly detection. IEEE Trans Aerosp Electron Syst 51(3):1698–1716

    Google Scholar 

  3. Sadreazami H, Mohammadi A, Asif A, Plataniotis KN (2018) Distributed-graph-based statistical approach for intrusion detection in cyber-physical systems. IEEE Trans Signal Inf Process over Netw 4(1):137–147

    MathSciNet  Google Scholar 

  4. Wang Y, Lee L, Xue B, Member S, Wang L, Song M (2018) A posteriori hyperspectral anomaly detection for unlabeled classification. IEEE Trans Geosci Remote Sens 56(6):3091–3106

    Google Scholar 

  5. Weller-Fahy DJ, Borghetti BJ, Sodemann AA (2015) A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun Surv Tutor 17(1):70–91

    Google Scholar 

  6. Maciá-Pérez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martínez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca I (2011) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58(3):722–732

    Google Scholar 

  7. Ahmed M, Naser Mahmood A, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31

    Google Scholar 

  8. Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37–50

    Google Scholar 

  9. Saremi S, Mirjalili S, Lewis A (2017) Grasshopper optimisation algorithm: theory and application. Adv Eng Softw 105:30–47

    Google Scholar 

  10. Allen TT, Roychowdhury S, Liu E (2018) Reward-based Monte Carlo-Bayesian reinforcement learning for cyber preventive maintenance. Comput Ind Eng 126:578–594

    Google Scholar 

  11. Drugan MM (2019) Reinforcement learning versus evolutionary computation: a survey on hybrid algorithms. Swarm Evol Comput 44:228–246

    Google Scholar 

  12. Kim C, Park JS (2019) Designing online network intrusion detection using deep auto-encoder Q-learning. Comput Electron Eng 79:106460

    Google Scholar 

  13. Martinez C, Ramasso E, Perrin G, Rombaut M (2019) Adaptive early classification of temporal sequences using deep reinforcement learning. Knowl-Based Syst 190:105290

    Google Scholar 

  14. Dwivedi S, Vardhan M, Tripathi S (2020) An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Comput Netw 176:107251. https://doi.org/10.1016/j.comnet.2020.107251

    Article  Google Scholar 

  15. Dwivedi S, Vardhan M, Tripathi S, Kumar A (2020) Implementation of adaptive scheme in evolutionary technique for anomaly—based intrusion detection. Evol Intell 13(1):103–117

    Google Scholar 

  16. Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247

    Google Scholar 

  17. Ambusaidi M, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998

    MathSciNet  MATH  Google Scholar 

  18. Buczak A, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1175

    Google Scholar 

  19. Sedjelmaci H, Hadji M, Ansari N (2019) Cyber security game for intelligent transportation systems. IEEE Netw 33:216–222

    Google Scholar 

  20. Hajimirzaei B, Navimipour NJ (2018) Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5:56–59

    Google Scholar 

  21. Liang W, Li KC, Long J, Kui X, Zomaya AY (2020) An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans Ind Inform 16(3):2063–2071

    Google Scholar 

  22. Wang M, Lu Y, Qin J (2020) A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput Secur 88:101645

    Google Scholar 

  23. Caminero G, Lopez-Martin M, Carro B (2019) Adversarial environment reinforcement learning algorithm for intrusion detection. Comput Netw 159:96–109

    Google Scholar 

  24. Al-yaseen WL, Ali Z, Zakree M, Nazri A (2017) Real-time multi-agent system for an adaptive intrusion detection system. Pattern Recognit Lett 85:56–64

    Google Scholar 

  25. Liu J et al (2019) ANID-SEoKELM: adaptive network intrusion detection based on selective ensemble of kernel ELMs with random features. Knowl-Based Syst 177:104–116

    Google Scholar 

  26. Cruz T et al (2016) A Cybersecurity detection framework for supervisory control and data acquisition systems. IEEE Trans Ind Inform 12(6):2236–2246

    Google Scholar 

  27. Gu B, Sheng VS, Tay KY, Romano W, Li S (2014) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1–14

    MathSciNet  Google Scholar 

  28. Sentelle CG, Anagnostopoulos GC, Georgiopoulos M (2016) A simple method for solving the SVM regularization path for semidefinite kernels. IEEE Trans Neural Netw Learn Syst 27(4):709–722

    MathSciNet  Google Scholar 

  29. Aladeemy M, Adwan L, Booth A, Khasawneh MT, Poranki S (2020) New feature selection methods based on opposition-based learning and self-adaptive cohort intelligence for predicting patient no-shows. Appl Soft Comput J 86:105866

    Google Scholar 

  30. Nguyen MT, Kim K (2020) Genetic convolutional neural network for intrusion detection systems. Futur Gen Comput Syst 113:418–427

    Google Scholar 

  31. Li XK, Chen W, Zhang Q, Wu L (2020) Building auto-encoder intrusion detection system based on random forest feature selection. Comput Secur 95:101851

    Google Scholar 

  32. Zakeri A, Hokmabadi A (2018) Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Syst Appl 119:61–72

    Google Scholar 

  33. Mafarja M et al (2018) Evolutionary population dynamics and grasshopper optimization approaches for feature selection problems. Knowl-Based Syst 145:1–14

    Google Scholar 

  34. Rathore MM, Ahmad A, Paul A (2016) Real time intrusion detection system for ultra-high-speed big data environments. J Supercomput 72(9):3489–3510

    Google Scholar 

  35. Eesa AS, Orman Z, Brifcani AMA (2015) A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst Appl 42(5):2670–2679

    Google Scholar 

  36. Aamir R, Ashfaq R, Wang X, Zhexue J, Abbas H, He Y (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci (NY) 378:484–497

    Google Scholar 

  37. Emary E, Zawbaa HM, Grosan C (2017) Experienced gray wolf optimization through reinforcement learning and neural networks. IEEE Trans Neural Netw Learn Syst 29(3):681–694

    MathSciNet  Google Scholar 

  38. Sengupta N, Sen J, Sil J, Saha M (2013) Designing of on line intrusion detection system using rough set theory and Q-learning algorithm. Neurocomputing 111:161–168

    Google Scholar 

  39. Mahmud M, Kaiser MS, Hussain A, Vassanelli S (2018) Applications of deep learning and reinforcement learning to biological data. IEEE Trans Neural Netw Learn Syst 29(6):2063–2079

    MathSciNet  Google Scholar 

  40. Lopez-Martin M, Carro B, Sanchez-Esguevillas A (2020) Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst Appl 141:112963

    Google Scholar 

  41. Lin CJ, Chen CH (2011) Nonlinear system control using self-evolving neural fuzzy inference networks with reinforcement evolutionary learning. Appl Soft Comput J 11(8):5463–5476

    Google Scholar 

  42. Gupta S, Deep K (2019) A hybrid self-adaptive sine cosine algorithm with opposition based learning. Expert Syst Appl 119:210–230

    Google Scholar 

  43. Banitalebi A, Aziz MIA, Aziz ZA (2016) A self-adaptive binary differential evolution algorithm for large scale binary optimization problems. Inf Sci (NY) 367:487–511

    Google Scholar 

  44. Mafarja M, Aljarah I, Faris H, Hammouri AI, Al-Zoubi AM, Mirjalili S (2019) Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Syst Appl 117:267–286

    Google Scholar 

  45. Mazini M, Shirazi B, Mahdavi I (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J King Saud Univ Comput Inf Sci 31:541–553

    Google Scholar 

  46. Abdulhammed R, Faezipour M, Abuzneid A, Alessa A (2018) Enhancing wireless intrusion detection using machine learning classification with reduced attribute sets. In: 2018 14th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 2018, pp 524–529

  47. Sharafaldin I, Habibi Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th international conference on information systems security and privacy, pp 108–116

  48. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1–6

  49. Divekar A, Parekh M, Savla V, Mishra R, Shirole M (2018) Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives. In: International conference on computing, communication and security (ICCCS), pp 1–8

  50. Prasad M, Tripathi S, Dahal K (2020) An efficient feature selection based Bayesian and Rough set approach for intrusion detection. Appl Soft Comput J 87:105980

    Google Scholar 

  51. Elmasry W, Akbulut A, Zaim AH (2020) Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput Netw 168:107042

    Google Scholar 

  52. Garg S et al (2020) En-ABC: an ensemble artificial bee colony based anomaly detection scheme for cloud environment. J Parallel Distrib Comput 135:219–233

    Google Scholar 

  53. Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl-Based Syst 136:130–139

    Google Scholar 

  54. Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2015) Intrusion detection in 802. 11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutor 18(1):1–24

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alok Kumar Shukla.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shukla, A.K. Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm. Neural Comput & Applic 33, 7541–7561 (2021). https://doi.org/10.1007/s00521-020-05500-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-020-05500-7

Keywords

Navigation