Skip to main content

An Efficient Intrusion Detection Approach Using Enhanced Random Forest and Moth-Flame Optimization Technique

  • Conference paper
  • First Online:
Computational Intelligence in Pattern Recognition

Abstract

The recent advancements in the computer networks pave a sophisticated platform to the “Black hat” attackers, which poses a major challenge to network security. Intrusion detection is a significant research problem in network security which motivates the researchers to focus on the development of a robust Intrusion Detection System (IDS). Several research works in network infrastructure reveal the significance of Intrusion Detection Systems (IDS) in protecting the IT infrastructure against the ever-advancing nature of cyber attacks. In a similar manner, machine learning has a pivotal role in enhancing the performance of intrusion methodologies. Hence, this work presents Moth-Flame Optimization Algorithm-based Random Forest (MFOA-RF) to build an efficient intrusion detection methodology for networks, and it enhances the RF technique by tuning the parameter. The experiments were implemented using NSL-KDD Cup dataset and the results were validated in terms of classification accuracy and false alarm rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.exsystemusa.com/singlepost/2018/01/04/TOP-10-Cyber-Attacks-and-Critical-Vulnerabilities-of-2017

  2. Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)

    Article  MathSciNet  Google Scholar 

  3. Abellan, J., Mantas, C.J., Castellano, J.G.: A random forest approach using imprecise probabilities. Knowl. Based Syst. 134, 72–84 (2017)

    Article  Google Scholar 

  4. Mirjalili, S.: Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl. Based Syst. 89, 228–249 (2015)

    Article  Google Scholar 

  5. Zawbaa, H.M., Emary, E., Parv, B., Sharawi, M.: Feature selection approach based on moth-flame optimization algorithm. In: Evolutionary Computation (CEC), pp. 4612–4617 (2016)

    Google Scholar 

  6. Hamed, T., Dara, R., Kremer, S.C.: Network intrusion detection system based on recursive feature addition and bigram technique. Comput. Secur. 73, 137–155 (2018)

    Article  Google Scholar 

  7. Raman, M.G., Somu, N., Kirthivasan, K., Liscano, R., Sriram, V.S.: An efficient intrusion detection system based on hypergraph-Genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl. Based Syst. 134, 1–12 (2017)

    Google Scholar 

  8. Raman, M.G., Kirthivasan, K., Sriram, V.S.: Development of rough set–hypergraph technique for key feature identification in intrusion detection systems. Comput. Electr. Eng. 59, 189–200 (2017)

    Google Scholar 

  9. Hajisalem, V., Babaie, S.: A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput. Netw. 136, 37–50 (2018)

    Article  Google Scholar 

  10. Vijayanand, R., Devaraj, D., Kannapiran, B.: Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput. Secur. 77, 304–314 (2018)

    Article  Google Scholar 

  11. Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018)

    Article  Google Scholar 

  12. Karami, A.: An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Expert Syst. Appl. 108, 36–60 (2018)

    Article  Google Scholar 

  13. Raman, M.G., Somu, N., Kirthivasan, K., Sriram, V.S.: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw. 92, 89–97 (2017)

    Article  Google Scholar 

  14. Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

  15. Pervez, M.S., Farid, D.M.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In: Software, Knowledge, Information Management and Applications (SKIMA), pp. 1–6 (2014)

    Google Scholar 

  16. Joshi, A., Monnier, C., Betke, M., Sclaroff, S.: Comparing random forest approaches to segmenting and classifying gestures. Image Vis. Comput. 58, 86–95 (2017)

    Article  Google Scholar 

  17. Scornet, E., Biau, Gérard, Vert, J.P.: Consistency of random forests. Ann. Stat. 43(4), 1716–1741 (2015)

    Article  MathSciNet  Google Scholar 

  18. Raman, M.R., Kannan, K., Pal, S.K., Sriram, V.S.: Rough set-hypergraph-based feature selection approach for intrusion detection systems. Def. Sci. J. 66(6), 1–6 (2016)

    Article  Google Scholar 

  19. Somu, N., Raman, M.G., Kirthivasan, K., Sriram, V.S.: Hypergraph based feature selection technique for medical diagnosis. J. Med. Syst. 40(11), 239 (2016)

    Article  Google Scholar 

  20. Somu, N., Kirthivasan, K., Sriram, V.S.: A rough set-based hypergraph trust measure parameter selection technique for cloud service selection. J. Supercomput. 73(10), 4535–4559 (2017)

    Article  Google Scholar 

  21. Somu, N., Raman, M.G., Kirthivasan, K., Sriram, V.S.: A trust centric optimal service ranking approach for cloud service selection. Futur. Gener. Comput. Syst. 86, 234–252 (2018)

    Article  Google Scholar 

  22. Somu, N., Raman MG, Kalpana, V., Kirthivasan, K., Sriram V.S.: An improved robust heteroscedastic probabilistic neural network based trust prediction approach for cloud service selection. Neural Netw. 1–35 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Shankar Sriram .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chaithanya, P.S., Gauthama Raman, M.R., Nivethitha, S., Seshan, K.S., Sriram, V.S. (2020). An Efficient Intrusion Detection Approach Using Enhanced Random Forest and Moth-Flame Optimization Technique. In: Das, A., Nayak, J., Naik, B., Pati, S., Pelusi, D. (eds) Computational Intelligence in Pattern Recognition. Advances in Intelligent Systems and Computing, vol 999. Springer, Singapore. https://doi.org/10.1007/978-981-13-9042-5_75

Download citation

Publish with us

Policies and ethics