Skip to main content
Log in

Attack Detection with Optimal PSO Feature Selection with DTOHE Model

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The most fascinating task in the present world for the creation of online applications is network security. Additionally, since the number of cyberattacks on the internet has risen, new ways for more effective attack identification and avoidance must be established. This may be accomplished by suggesting fresh intrusion methods for identification. IDSs that use machine learning techniques are precise and successful in identifying networks assaults. The presence of redundant or unimportant characteristics in a big dataset may substantially decrease the effectiveness of machine learning models, leading to a sharp decline in quality. Thus, it is imperative to come up with a suitable feature removal technique which will cut down a few of the characteristics that do not have an important effect on the technique of classification. Additionally, when the models are trained on extremely unbalanced datasets, a lot of ML-based IDSs experience a rise in error rates as well as poor detection rate. In this article, we offer a study employing the DTOHE technique along with multiple feature selection methods, including GA, ACO, and PSO. We focused on binary classification configurations in our experiments, and the outcomes showed that the DTOHE with PSO feature selection approach elevated the evaluation precision for the binary categorization scheme from 88.13 to 90.85%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data Availability

The dataset produced and analyzed in this study can be obtained from the corresponding author upon request, subject to reasonable conditions.

References

  1. Wang Z. Deep learning-based intrusion detection with adversaries. IEEE Access. 2018;6:38367–84.

    Article  Google Scholar 

  2. Tama BA, Comuzzi M, Rhee KH. Tse-ids: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access. 2019;7:94497–507. https://doi.org/10.1109/ACCESS.2019.2928048.

    Article  Google Scholar 

  3. Hussen N, Elghamrawy SM, Salem M, El-Desouky AI. A fully streaming big data framework for cyber security based on optimized deep learning algorithm. IEEE Access. 2023;11:65675–88. https://doi.org/10.1109/ACCESS.2023.3281893.

    Article  Google Scholar 

  4. Pham TH, Raahemi B. Bio-inspired feature selection algorithms with their applications: a systematic literature review. IEEE Access. 2023;11:43733–58. https://doi.org/10.1109/ACCESS.2023.3272556.

    Article  Google Scholar 

  5. Kalakoti R, Nõmm S, Bahsi H. In-depth feature selection for the statistical machine learning-based botnet detection in IoT networks. IEEE Access. 2022;10:94518–35. https://doi.org/10.1109/ACCESS.2022.3204001.

    Article  Google Scholar 

  6. Saleh HM, Marouane H, Fakhfakh A. Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning. IEEE Access. 2024;12:3825–36. https://doi.org/10.1109/ACCESS.2023.3349248.

    Article  Google Scholar 

  7. Karimi Z, Torabi Z. Enhancing kNN-based intrusion detection with differential evolution with auto-enhanced population diversity. In: 2023 14th international conference on information and knowledge technology (IKT), Isfahan, Islamic Republic of Iran; 2023. p. 129–135. https://doi.org/10.1109/IKT62039.2023.10433038.

  8. Preethi P, Vasudevan I, Saravanan S, Krishna Prakash R, Devendhiran A. Leveraging network vulnerability detection using improved import vector machine and Cuckoo search based Grey Wolf Optimizer. 2023 1st international conference on optimization techniques for learning (ICOTL), Bengaluru, India; 2023. p. 1–7. https://doi.org/10.1109/ICOTL59758.2023.10435119.

  9. Dasari S, Kaluri R. An effective classification of DDoS attacks in a distributed network by adopting hierarchical machine learning and hyperparameters optimization techniques. IEEE Access. 2024;12:10834–45. https://doi.org/10.1109/ACCESS.2024.3352281.

    Article  Google Scholar 

  10. Ben Said R, Sabir Z, Askerzade I. CNN-BiLSTM: a hybrid deep learning approach for network intrusion detection system in software-defined networking with hybrid feature selection. IEEE Access. 2023;11:138732–47. https://doi.org/10.1109/ACCESS.2023.3340142.

    Article  Google Scholar 

  11. Wei N, Zheng L, Chen Y, Zhu R, Ren S, Zhang X. Fuzzy logic intelligent space routing convolutional decision and optimization scheme. IEEE Access. 2023;11:139509–20. https://doi.org/10.1109/ACCESS.2023.3338858.

    Article  Google Scholar 

  12. Noori MS, Sahbudin RKZ, Sali A, Hashim F. Feature drift aware for intrusion detection system using developed variable length particle swarm optimization in data stream. IEEE Access. 2023;11:128596–617. https://doi.org/10.1109/ACCESS.2023.3333000.

    Article  Google Scholar 

  13. Alajmi M, Mengash HA, Alqahtani H, Aljameel SS, Hamza MA, Salama AS. Automated threat detection using flamingo search algorithm with optimal deep learning on cyber-physical system environment. IEEE Access. 2023;11:127669–78. https://doi.org/10.1109/ACCESS.2023.3332213.

    Article  Google Scholar 

  14. Rabash AJ, Nazri MZA, Shapii A, Hasan MK. Non-dominated sorting genetic algorithm-based dynamic feature selection for intrusion detection system. IEEE Access. 2023;11:125080–93. https://doi.org/10.1109/ACCESS.2023.3328395.

    Article  Google Scholar 

  15. Almuqren L, Alqahtani H, Aljameel SS, Salama AS, Yaseen I, Alneil AA. Hybrid metaheuristics with machine learning based botnet detection in cloud assisted internet of things environment. IEEE Access. 2023;11:115668–76. https://doi.org/10.1109/ACCESS.2023.3322369.

    Article  Google Scholar 

  16. Bakro M, et al. Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model. IEEE Access. 2024;12:8846–74. https://doi.org/10.1109/ACCESS.2024.3353055.

    Article  Google Scholar 

  17. Shanbhag A, Vincent S, Gowda SBB, Kumar OP, Francis SAJ. Leveraging metaheuristics for feature selection with machine learning classification for malicious packet detection in computer networks. IEEE Access. 2024;12:21745–64. https://doi.org/10.1109/ACCESS.2024.3362246.

    Article  Google Scholar 

  18. Tripathi G, Singh VK, Sharma V, Vinodbhai MV. Weighted feature selection for machine learning based accurate intrusion detection in communication networks. IEEE Access. 2024;12:20973–82. https://doi.org/10.1109/ACCESS.2024.3362794.

    Article  Google Scholar 

  19. Maci A, Tamma N, Coscia A. Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection. 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), Houston, TX, USA; 2024. p. 1–7. https://doi.org/10.1109/ICAIC60265.2024.10433827.

  20. Fuhnwi GS, Revelle M, Izurieta C. Improving network intrusion detection performance : an empirical evaluation using extreme gradient boosting (XGBoost) with recursive feature elimination. 2024 IEEE 3rd international conference on AI in cybersecurity (ICAIC), Houston, TX, USA; 2024. p. 1–8. https://doi.org/10.1109/ICAIC60265.2024.10433805.

Download references

Acknowledgements

The authors acknowledged the Quaid-E-Millath Government College for Women (Autonomous), Chennai, Tamilnadu, India for supporting the research work by providing the facilities.

Funding

No funding received for this research.

Author information

Authors and Affiliations

Authors

Contributions

This research work owes its realization to the collaborative efforts of all authors, whose collective contributions played a pivotal role in shaping its outcomes significantly.

Corresponding author

Correspondence to Jasmine Samraj.

Ethics declarations

Conflict of interest

No conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advances in Computational Approaches for Image Processing, Wireless Networks, Cloud Applications and Network Security” guest edited by P. Raviraj, Maode Ma and Roopashree H R.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Samraj, J., Abirami, K. Attack Detection with Optimal PSO Feature Selection with DTOHE Model. SN COMPUT. SCI. 5, 562 (2024). https://doi.org/10.1007/s42979-024-02911-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-02911-4

Keywords

Navigation