Skip to main content
Log in

An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

A Correction to this article was published on 23 September 2021

This article has been updated

Abstract

Recent development of cognitive computing driven evolutionary techniques improve the overall quality of service and user experience in wireless communication network. This Paper consists of a feature selection method based on improvement of Crow Search Algorithm which has been used in Intrusion Detection System to limit the size of the dataset with which the system is working with and getting better results. Since IDS deals with a large data, the crucial task of IDS is to keep efficient features which represents the whole data and there is no duplicity and irrelevancy. The previous model that was proposed used the crow search algorithm in the intrusion detection system (CSA-IDS) as a model to find the optimal feature’s subset and random forest as a judgement on features that are produced by the CSA-IDS. The KDD and UNSW datasets are used to evaluate the earlier proposed model. The proposed model achieved an accuracy of 99.84% for attack detection using UNSW datasets. Similarly, R2L and U2R attacks have detected accuracy of 99.97% for NSL-KDD dataset. The development of proposed model improve the overall communication services and feature selection in wireless communication network. The outcome proves that the subset of features that are obtained by using CSA-IDS fetches higher accuracy rate using a smaller number of features.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  1. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers and Security, 28(1–2), 18–28. https://doi.org/10.1016/j.cose.2008.08.003

    Article  Google Scholar 

  2. Hamed, T., Ernst, J. B., & Kremer, S. C. (2017). A survey and taxonomy on data and pre-processing techniques of intrusion detection systems. Computer and Network Security Essentials, 113–134.

  3. Ashfaq, R. A. R., Wang, X.-Z., Huang, J. Z., Abbas, H., & He, Y.-L. (2017). Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 378, 484–497. https://doi.org/10.1016/j.ins.2016.04.019

    Article  Google Scholar 

  4. DelaHoz, E., Ortiz, E. D. A., Ortega, J., & Prieto, B. (2015). PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing, 164, 71–81.

    Article  Google Scholar 

  5. Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science, 25, 152–160. https://doi.org/10.1016/j.jocs.2017.03.006

    Article  Google Scholar 

  6. Holland, J. (1975). Adaptation in natural and artificial system. University of Michigan Press.

    Google Scholar 

  7. Yang, X. S. (2010) A new metaheuristic bat-inspired algorithm. Trumpington Street, Cambridge CB2 1PZ, UK: Department of Engineering, University of Cambridge.

  8. Kennedy, J., & Eberhart, R. C. (1995). Particle swarm optimization. In: Proc of IEEE international conference on neural networks, 1942–8.

  9. Askarzadeh, A. (2016). A novel metaheuristic method for solving constrained engineering optimization problem: Crow search algorithm. Computers & Structures, 169, 1–12.

    Article  Google Scholar 

  10. Gupta, D., Sundaram, S., Khanna, A., Hassanien, A. E., & Albuquerque, V. H. C. D. (2018). Improved diagnosis of Parkinsons disease based on optimized crow search algorithm. Computers and Electrical Engineering, 68, 412–424.

    Article  Google Scholar 

  11. Gupta, D., Rodrigues, J. J. P. C., Sundaram, S., et al. (2018). Usability feature extraction using modified crow search algorithm: a novel approach. Neural Computing and Application. https://doi.org/10.1007/s00521-018-3688-6

    Article  Google Scholar 

  12. Gupta, D., Julka, A., Jain, S., Aggarwal, T., Khanna, A., & Albuquerque, V. H. C. D. (2018). Optimized cuttlefish algorithm for diagnosis of Parkinsons disease. Cognitive Systems Research, 52, 36–48.

    Article  Google Scholar 

  13. Khanna, A., Singh, A. K., & Swaroop, A. (2016). A token based solution to group local mutual exclusion problem in Mobile Ad Hoc networks. Arabian Journal for Science and Engineering, 41(12), 5181–5194.

    Article  MathSciNet  MATH  Google Scholar 

  14. Doss, S., Nayyar, A., Suseendran, G., Tanwar, S., Khanna, A., Son, L. H., & Thong, P. H. (2018). APD-JFAD: accurate prevention and detection of jelly fish attack in MANET. IEEE Access, 52, 123–132.

    Google Scholar 

  15. NSL-KDD dataset, [online] Available: http://nsl.cs.unb.ca/nsl-kdd/.

  16. Moustafa, N., Slay, J., & UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). (2015). Military Communications and Information Systems Conference (MilCIS). Canberra, ACT, 2015, 1–6.

  17. Tavallaee M., Bagheri E., Lu W., & Ghorbani A. (2009). A detailed analysis of the KDD CUP 99 data set. In: Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).

  18. Ingre, B., Yadav, A. (2015). Performance analysis of NSL-KDD dataset using ANN. In: 2015 International Conference on Signal Processing and Communication Engineering Systems, Guntur, 92–96.

  19. Moustafa, N., Creech, G., & Slay, J. (2018). Anomaly detection system using beta mixture models and outlier detection. Progress in Computing, Analytics and Networking, 125–135.

  20. Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., & Zhu, M. (2017). HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access, 6, 1792–1806.

    Article  Google Scholar 

  21. Ghugar, U., Pradhan, J., Bhoi, S. K., Sahoo, R. R., & Panda, S. K. (2018). PL-IDS: Physical layer trust based intrusion detection system for wireless sensor networks. International Journal of Information Technology, 10(4), 489–494.

    Article  Google Scholar 

  22. Arivudainambi, D., KA, V. K., & Chakkaravarthy, S. S. (2019). LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks. Neural Computing and Applications, 31(5), 1491–1501.

    Article  Google Scholar 

  23. Huang, S., & Lei, K. (2020). IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in Ad-hoc networks. Ad Hoc Networks, 105, 102177.

    Article  Google Scholar 

  24. https://en.wikipedia.org/wiki/Corvus28genus%29. https://doi.org/10.1016/j.neucom.2016.12.038.

  25. Rincon, P. Science/nature|crows and jays top bird IQ scale, BBC News.

  26. Sethuraman, J., Alzubi, J. A., Manikandan, R., Gheisari, M., & Kumar, A. (2019). Eccentric methodology with optimization to unearth hidden facts of search engine result pages. Recent Patents on Computer Science, 12(2), 110–119.

    Article  Google Scholar 

  27. Pedregosa, F., et al. (2011). Scikit-learn: Machine learning in Python. JMLR, 12, 2825–2830.

    MathSciNet  MATH  Google Scholar 

  28. Chen, T. M., Blasco, J., Alzubi, J., & Alzubi, O. (2014). Intrusion detection. IET Publishing, 1(1), 1–9.

    Google Scholar 

  29. Alweshah, M., Alzubi, O. A., Alzubi, J. A., & Alaqeel, S. (2016). Solving attribute reduction problem using wrapper genetic programming. International Journal of Computer Science and Network Security (IJCSNS), 16(5), 77.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aditya Khamparia.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: The author name Puneet Garg was incorrectly written as Punnet Garg. The original article has been corrected.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khanna, A., Rani, P., Garg, P. et al. An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System. Wireless Pers Commun 127, 2021–2038 (2022). https://doi.org/10.1007/s11277-021-08766-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08766-9

Keywords

Navigation