Hybrid optimization scheme for intrusion detection using considerable feature selection

Abstract

The intrusion detection is an essential section in network security because of its immense volume of threats which bothers the computing systems. The real-time intrusion detection dataset comprises redundant or irrelevant features. The duplicate features make it quite challenging to locate the patterns for intrusion detection. Hybrid optimization scheme (HOS) is designed for combining adaptive artificial bee colony (AABC) with adaptive particle swarm optimization (APSO) for detecting intrusive activities. The schemes are aggregated for locating improved optimization-based outcomes, and the precision during categorization is acquired using tenfold cross-validation scheme. The main objective of the proposed method is to improve the rate of precision in intrusion activities in internetwork by choosing the relevant features. Effectiveness of the hybrid categorization scheme is accessed using an NSL-KDD dataset. Single feature selection method and random feature selection method are used to assess the proposed HOS intrusion detection approaches. The effectiveness of the designed scheme is evaluated with existing machine learning schemes such as Naive Bayes, AABC, APSO, and support vector machine, which outperform the HOS.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

References

  1. 1.

    Khammassi C, Krichen S (2017) A GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255–277

    Google Scholar 

  2. 2.

    Hosseini Bamakan SM, Wang H, Yingjie T, Shi Y (2016) An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199:90–102

    Google Scholar 

  3. 3.

    Eesa AS, Orman Z, Brifcani AMA (2015) A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst Appl 42(5):2670–2679

    Google Scholar 

  4. 4.

    Saurabh P, Verma B (2016) An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst Appl 60:311–320

    Google Scholar 

  5. 5.

    Aburomman AA, BinIbneReaz M (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput J 38:360–372

    Google Scholar 

  6. 6.

    Almseidin M, Alzubi M, Kovacs S, Alkasassbeh M (2017) Evaluation of machine learning algorithms for intrusion detection system. In: SISY 2017—IEEE 15th international symposium on intelligent systems and informatics: proceedings, no. January, pp 277–282

  7. 7.

    Li Y, Qiu R, Jing S (2018) Intrusion detection system using Online Sequence Extreme Learning Machine (OSELM) in advanced metering infrastructure of smart grid. PLoS ONE 13(2):1–16

    Google Scholar 

  8. 8.

    Priyanga BR, Kumari D (2018) A survey on anomaly detection using unsupervised learning techniques. Int J Creat Res Thoughts 6(2):2320–2882

    Google Scholar 

  9. 9.

    Bhalke NA, Paikrao RL (2017) A survey on attack detection system using unsupervised learning method. Int J Adv Res Comput Sci Softw Eng 7(1):274–277

    Google Scholar 

  10. 10.

    Repalle SA, Kolluru VR (2017) Intrusion detection system using ai and machine learning algorithm. Int Res J Eng Technol 4(12):1709–1715

    Google Scholar 

  11. 11.

    G. Chanakya, P. Kunal, S. Sumedh, W. Priyanka, and P. Mahalle (2017) Network intrusion prevention system using machine learning techniques. Int J Innov Res Comput Commun Eng (An ISO Certif. Organ.) 5(7):1–12

    Google Scholar 

  12. 12.

    Elrawy MF, Awad AI, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7(1):1–20

    Google Scholar 

  13. 13.

    Li J, Wang Y, Xiang Y, Meng W, Liu W-X, Li W (2018) A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J Parallel Distrib Comput 122:26–35

    Google Scholar 

  14. 14.

    Yahalom R, Elovici Y, Steren A, Nameri Y, Roytman M, Porgador A (2019) Improving the effectiveness of intrusion detection systems for hierarchical data. Knowl Based Syst 168:59–69

    Google Scholar 

  15. 15.

    Mishra P, Pilli ES, Varadharajan V, Tupakula U (2017) Intrusion detection techniques in cloud environment: a survey. J Netw Comput Appl 77(2016):18–47

    Google Scholar 

  16. 16.

    da Costa KAP, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157

    Google Scholar 

  17. 17.

    Kiran MS, Gündüz M (2013) A recombination-based hybridization of particle swarm optimization and artificial bee colony algorithm for continuous optimization problems. Appl Soft Comput J 13(4):2188–2203

    Google Scholar 

  18. 18.

    Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inf Secur Appl 44:80–88

    Google Scholar 

  19. 19.

    Al-Jarrah OY, Al-Hammdi Y, Yoo PD, Muhaidat S, Al-Qutayri M (2018) Semi-supervised multi-layered clustering model for intrusion detection. Digit Commun Netw 4(4):277–286

    Google Scholar 

  20. 20.

    Arivudainambi D, Varun VK, Sibi Chakkaravarthy S (2018) LION IDS: a meta-heuristics approach to detect DDoS attacks against software-defined networks. Neural Comput Appl 7:1–11

    Google Scholar 

  21. 21.

    Mahesh N, Vijayachitra S (2018) DECSA: hybrid dolphin echolocation and crow search optimization for cluster-based energy-aware routing in WSN. Neural Comput Appl 4:1–16

    Google Scholar 

  22. 22.

    Mirjalili S, Wang GG, Coelho LDS (2014) Binary optimization using hybrid particle swarm optimization and gravitational search algorithm. Neural Comput Appl 25(6):1423–1435

    Google Scholar 

  23. 23.

    Zawbaa HM, Emary E, Grosan C, Snasel V (2018) Large-dimensionality small-instance set feature selection: a hybrid bio-inspired heuristic approach. Swarm Evol Comput 42:29–42

    Google Scholar 

  24. 24.

    Mazini M, Shirazi B, Mahdavi I (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2018.03.011

    Google Scholar 

  25. 25.

    Hajimirzaei B, Navimipour NJ (2019) Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1):56–59

    Google Scholar 

  26. 26.

    ZorarpacI E, Özel SA (2016) A hybrid approach of differential evolution and artificial bee colony for feature selection. Expert Syst Appl 62:91–103

    Google Scholar 

  27. 27.

    Huda RK, Banka H (2018) Efficient feature selection and classification algorithm based on PSO and rough sets. Neural Comput Appl 9:1–17

    Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to S. Velliangiri.

Ethics declarations

Conflict of interest

The author declares that he has no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Velliangiri, S., Karthikeyan, P. Hybrid optimization scheme for intrusion detection using considerable feature selection. Neural Comput & Applic 32, 7925–7939 (2020). https://doi.org/10.1007/s00521-019-04477-2

Download citation

Keywords

  • Intrusion detection
  • AABC
  • APSO
  • Support vector machine
  • Hybrid optimization scheme