Skip to main content
Log in

An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Over the past ten years, there has been a significant increase in computer network intrusions, partly due to a thriving black market for cybercrime and the availability of advanced tools for committing such breaches. The most effective method for stopping unwanted intrusions and identifying abnormal network behavioral patterns is an intrusion detection system (IDS). In IDS, transfer learning techniques are frequently employed. An ML-based IDS experiences problems with data imbalance and a greater false detection ratio due to a small training dataset. These ID systems can quickly and automatically recognize harmful threats. The network requires a complex security solution because dangerous threats constantly develop and appear. As a result, developing an efficient and intelligent ID system is a substantial scientific challenge. We suggested an effective ensemble strategy that improved the spotted hyena optimization algorithm (ISHO) and the honey badger algorithm (HBA) to address the data imbalance and overfitting problem. The dataset is balanced by increasing the number of data samples and the detection precision. The Squeeze-and-Excitation (SE)-Deep Residual Network 152 (SE-ResNet152) approach is utilized to remove the less critical features. Every iterative phase includes using a list of decision trees, which monitor the performance of the categorizer and prevent overfitting issues. We use the datasets UNSW-NB15, CSE-CIC IDS 2018, and CICIDS2019 to simulate and assess the model. Compared to other approaches, the proposed approach performs well on three datasets and obtains above 99% accuracy, precision, recall, and F-measure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

Not applicable.

References

  1. Zhou, X., Liang, W., Li, W., Yan, K., Shimizu, S., Kevin, I., Wang, K.: Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system. IEEE Internet Things J. 9(12), 9310–9319 (2021)

    Article  Google Scholar 

  2. Sarhan, M., Layeghy, S., Portmann, M.: Towards a standard feature set for network intrusion detection system datasets. In: Mobile Networks and Applications, pp. 1–14 (2022).

  3. Alzahrani, A.O., Alenazi, M.J.: Designing a network intrusion detection system based on machine learning for software-defined networks. Future Internet 13(5), 111 (2021)

    Article  Google Scholar 

  4. Choi, H., Kim, M., Lee, G., Kim, W.: Unsupervised learning approach for network intrusion detection system using autoencoders. J. Supercomput.Supercomput. 75, 5597–5621 (2019)

    Article  Google Scholar 

  5. Ashiku, L., Dagli, C.: Network intrusion detection system using deep learning. Procedia Comput. Sci. 185, 239–247 (2021)

    Article  Google Scholar 

  6. Devan, P., Khare, N.: An efficient XGBoost–DNN-based classification model for network intrusion detection system. Neural Comput. Appl.Comput. Appl. 32, 12499–12514 (2020)

    Article  Google Scholar 

  7. Liu, J., Gao, Y., Hu, F.: A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM. Comput. Secur.. Secur. 106, 102289 (2021)

    Article  Google Scholar 

  8. Pawlicki, M., Choraś, M., Kozik, R.: Defending network intrusion detection systems against adversarial evasion attacks. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 110, 148–154 (2020)

    Article  Google Scholar 

  9. Alhajjar, E., Maxwell, P., Bastian, N.: Adversarial machine learning in network intrusion detection systems. Expert Syst. Appl. 186, 115782 (2021)

    Article  Google Scholar 

  10. Wang, H., Cao, Z., Hong, B.: A network intrusion detection system based on a convolutional neural network. J. Intell. Fuzzy Syst. 38(6), 7623–7637 (2020)

    Article  Google Scholar 

  11. Mebawondu, J.O., Alowolodu, O.D., Mebawondu, J.O., Adetunmbi, A.O.: Network intrusion detection system using supervised learning paradigm. Sci. Afr. 9, e00497 (2020)

    Google Scholar 

  12. Gao, Y., Wu, H., Song, B., Jin, Y., Luo, X., Zeng, X.: A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc networks. IEEE Access 7, 154560–154571 (2019)

    Article  Google Scholar 

  13. Zhang, W., Han, D., Li, K.C., Massetto, F.I.: Wireless sensor network intrusion detection system based on MK-ELM. Soft. Comput.Comput. 24, 12361–12374 (2020)

    Article  Google Scholar 

  14. Sakr, M.M., Tawfeeq, M.A., El-Sisi, A.B.: Network intrusion detection system based PSO-SVM for cloud computing. Int. J. Comput. Netw. Inf. Secur. 11(3), 22 (2019)

    Google Scholar 

  15. Mendonça, R.V., Teodoro, A.A., Rosa, R.L., Saadi, M., Melgarejo, D.C., Nardelli, P.H., Rodríguez, D.Z.: Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access 9, 61024–61034 (2021)

    Article  Google Scholar 

  16. Aliyu, I., Feliciano, M.C., Van Engelenburg, S., Kim, D.O., Lim, C.G.: A blockchain-based federated forest for SDN-enabled in-vehicle network intrusion detection system. IEEE Access 9, 102593–102608 (2021)

    Article  Google Scholar 

  17. Moualla, S., Khorzom, K., Jafar, A.: Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Comput. Intell. Neurosci.. Intell. Neurosci. 2021, 1–13 (2021)

    Article  Google Scholar 

  18. Musafer, H., Abuzneid, A., Faezipour, M., Mahmood, A.: An enhanced design of sparse autoencoder for latent features extraction based on trigonometric simplexes for network intrusion detection systems. Electronics 9(2), 259 (2020)

    Article  Google Scholar 

  19. Sohi, S.M., Seifert, J.P., Ganji, F.: RNNIDS: enhancing network intrusion detection systems through deep learning. Comput. Secur.. Secur. 102, 102151 (2021)

    Article  Google Scholar 

  20. Lee, J., Park, K.: GAN-based imbalanced data intrusion detection system. Pers. Ubiquit. Comput.Ubiquit. Comput. 25, 121–128 (2021)

    Article  Google Scholar 

  21. Huang, S., Lei, K.: IGAN-IDS: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw.Netw. 105, 102177 (2020)

    Article  Google Scholar 

  22. Fu, Y., Du, Y., Cao, Z., Li, Q., Xiang, W.: A deep learning model for network intrusion detection with imbalanced data. Electronics 11(6), 898 (2022)

    Article  Google Scholar 

  23. Zhang, H., Huang, L., Wu, C.Q., Li, Z.: An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Comput. Netw.. Netw. 177, 107315 (2020)

    Article  Google Scholar 

  24. Cui, J., Zong, L., Xie, J., Tang, M.: A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl. Intell.Intell. 53(1), 272–288 (2023)

    Article  Google Scholar 

  25. Babu, K.S., Rao, Y.N.: MCGAN: modified conditional generative adversarial network (MCGAN) for class imbalance problems in network intrusion detection system. Appl. Sci. 13(4), 2576 (2023)

    Article  Google Scholar 

  26. Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with the deep hierarchical network. IEEE Access 8, 32464–32476 (2020)

    Article  Google Scholar 

  27. Kunang, Y.N., Nurmaini, S., Stiawan, D., Suprapto, B.Y.: Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J. Inf. Secur. Appl. 58, 102804 (2021)

    Google Scholar 

  28. Prakash, P.J., Lalitha, B.: Optimized ensemble classifier based network intrusion detection system for RPL-based internet of things. Wireless Pers. Commun.Commun. 125(4), 3603–3626 (2022)

    Article  Google Scholar 

  29. Rao, Y.N., Suresh Babu, K.: An imbalanced generative adversarial network-based approach for network intrusion detection in an imbalanced dataset. Sensors 23(1), 550 (2023)

    Article  Google Scholar 

  30. Dina, A.S., Manivannan, D.: Intrusion detection based on machine learning techniques in computer networks. Internet Things 16, 100462 (2021)

    Article  Google Scholar 

  31. Mazini, M., Shirazi, B., Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J. King Saud Univ. Comput. Inf. Sci. 31(4), 541–553 (2019)

    Google Scholar 

  32. Ding, H., Chen, L., Dong, L., Fu, Z., Cui, X.: Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 131, 240–254 (2022)

    Article  Google Scholar 

  33. Guezzaz, A., Benkirane, S., Azrour, M., Khurram, S.: A reliable network intrusion detection approach using a decision tree with enhanced data quality. Secur. Commun. Netw. 2021, 1–8 (2021)

    Article  Google Scholar 

  34. Kanna, P.R., Santhi, P.: Hybrid intrusion detection using mapreduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst. Appl. 194, 116545 (2022)

    Article  Google Scholar 

  35. Khan, M.A.: HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system. Processes 9(5), 834 (2021)

    Article  Google Scholar 

  36. Bu, S.J., Cho, S.B.: Genetic algorithm-based deep learning ensemble for detecting database intrusion via insider attack. In: Hybrid Artificial Intelligent Systems: 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedings 14 (pp. 145–156). Springer (2019).

  37. Qureshi, A.U.H., Larijani, H., Mtetwa, N., Javed, A., Ahmad, J.: RNN-ABC: a new swarm optimization-based technique for anomaly detection. Computers 8(3), 59 (2019)

    Article  Google Scholar 

  38. Althubiti, S.A., Jones, E.M., Roy, K.: LSTM for anomaly-based network intrusion detection. In: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–3. IEEE (2018).

  39. Liu, X., Li, K., Wang, W., Yan, Y., Sha, Y., Chen, J., Qin, J.: Improved RBF network intrusion detection model based on edge computing with multi-algorithm fusion. Int. J. Comput. Commun. Control 16(4) (2021).

  40. Hu, Z., Wang, L., Qi, L., Li, Y., Yang, W.: A novel wireless network intrusion detection method based on adaptive synthetic sampling and an improved convolutional neural network. IEEE Access 8, 195741–195751 (2020)

    Article  Google Scholar 

  41. Tama, B.A., Comuzzi, M., Rhee, K.H.: TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497–94507 (2019)

    Article  Google Scholar 

  42. Safaldin, M., Otair, M., Abualigah, L.: Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput.Intell. Humaniz. Comput. 12, 1559–1576 (2021)

    Article  Google Scholar 

Download references

Acknowledgements

We declare that this manuscript is original, has not been published before, and is not currently being considered for publication elsewhere.

Author information

Authors and Affiliations

Authors

Contributions

The author confirms sole responsibility for the following: study conception and design, data collection, analysis and interpretation of results, and manuscript preparation.

Corresponding author

Correspondence to Koteswararao Ch.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethics approval

This material is the author's original work, which has not been published elsewhere. The paper reflects the author's research and analysis truthfully and completely.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saikam, J., Ch, K. An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152. Int. J. Inf. Secur. 23, 1037–1054 (2024). https://doi.org/10.1007/s10207-023-00777-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00777-w

Keywords

Navigation