Skip to main content

Advertisement

Log in

A new machine learning method consisting of GA-LR and ANN for attack detection

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Advances in computer networks led to the generation of much data that computer networks must be capable of transmitting. The security of this volume of data is a major challenge for companies. Intrusion detection systems is one of the solutions that researchers introduced for this challenge. This research aims to introduce a new machine learning model for intrusion detection. The proposed model includes two stages of feature selection and attack identification. The feature selection stage uses genetic algorithm and logistic regression algorithm to find a correlated subset of features. In the attack detection phase, the ANN algorithm is used. ANN is trained by particle optimization (PSO) and gravitational search (GS) algorithms. To evaluate the proposed model, two sets of NSL-KDD and KDD Cup'99 are used and results are compared with ANN based on gradient descent (GD-ANN) and decision tree, ANN based on genetic algorithm (GA-ANN) methods, ANN based on GSPSO (GSPSO-ANN), ANN based on PSO (PSO-ANN) and ANN based on GS (GS-ANN) indicate the superiority of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information sciences,275, 314–347.

    Article  Google Scholar 

  2. Sultana, N., Chilamkurti, N., Peng, W., & Alhadad, R. (2019). Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications,12(2), 493–501.

    Article  Google Scholar 

  3. Wang, G., Hao, J., Ma, J., & Huang, L. (2010). A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Systems with Applications,37(9), 6225–6232.

    Article  Google Scholar 

  4. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security,28(1–2), 18–28.

    Article  Google Scholar 

  5. Mehdi, S. A., Khalid, J., & Khayam, S. A. (2011). Revisiting traffic anomaly detection using software defined networking. In International workshop on recent advances in intrusion detection (pp. 161–180). Springer, Berlin.

  6. Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., Tachtatzis, C., & Atkinson, R. (2016, May). Threat analysis of IoT networks using artificial neural network intrusion detection system. In International symposium on networks, computers and communications (ISNCC) (pp. 1–6). IEEE.

  7. Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems,82, 761–768.

    Article  Google Scholar 

  8. Dash, T. (2017). A study on intrusion detection using neural networks trained with evolutionary algorithms. Soft Computing,21(10), 2687–2700.

    Article  Google Scholar 

  9. Aslahi-Shahri, B. M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M. J., et al. (2016). A hybrid method consisting of GA and SVM for intrusion detection system. Neural Computing and Applications,27(6), 1669–1676.

    Article  Google Scholar 

  10. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In IEEE symposium on computational intelligence for security and defense applications (pp. 1–6). IEEE.

  11. Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., & Dai, K. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications,39(1), 424–430.

    Article  Google Scholar 

  12. Hashemi, V. M., Muda, Z., & Yassin, W. (2013). Improving intrusion detection using genetic algorithm. Information Technology Journal,12(11), 2167–2173.

    Article  Google Scholar 

  13. Elngar, A. A., et al. (2012). A fast accurate network intrusion detection system. International Journal of Computer Science and Information Security,10(9), 29.

    Google Scholar 

  14. Khammassi, C., & Krichen, S. (2017). A GA-LR wrapper approach for feature selection in network intrusion detection. Computers & Security,70, 255–277.

    Article  Google Scholar 

  15. Kuang, F., Zhang, S., Jin, Z., & Xu, W. (2015). A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Computing,19(5), 1187–1199.

    Article  Google Scholar 

  16. Zhang, Y., Li, P., & Wang, X. (2019). Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access,7, 31711–31722.

    Article  Google Scholar 

  17. Hassan, M. M., Gumaei, A., Alsanad, A., Alrubaian, M., & Fortino, G. (2020). A hybrid deep learning model for efficient intrusion detection in big data environment. Information Sciences,513, 386–396.

    Article  Google Scholar 

  18. Chen, T. M., Blasco, J., Alzubi, J., & Alzubi, O. (2014). Intrusion detection. IET Publishing,1(1), 1–9.

    Google Scholar 

  19. Nazir, S., Hamdoun, H., & Alzubi, J. (2015). Cyber attack challenges and resilience for smart grids. European Journal of Scientific Research,131(1), 111–120.

    Google Scholar 

  20. Alzubi, J. A. (2015). Optimal classifier ensemble design based on cooperative game theory. Research Journal of Applied Sciences, Engineering and Technology,11(12), 1336–1343.

    Article  Google Scholar 

  21. Alzubi, O., Alzubi, J., Tedmori, S., Rashaideh, H., & Almomani, O. (2018). Consensus-based combining method for classifier ensembles. International Arab Journal of Information Technology (IAJIT),15(1), 1–10.

    Google Scholar 

  22. Alzubi, J., Nayyar, A., & Kumar, A. (2018). Machine learning from theory to algorithms: an overview. Journal of Physics: Conference Series, IOP Publishing, 1142(1), 012012.

  23. Chandrashekar, G., & Sahin, F. (2014). A survey on feature selection methods. Computers & Electrical Engineering,40(1), 16–28.

    Article  Google Scholar 

Download references

Acknowledgements

The author would like to thank the WINE Editorial Board and the anonymous reviewers for their very helpful suggestions. Also, the author would like to extend their appreciation to Mr. Saman Rafiee Sardo and Mr. Behnam Mohammad Hassanizade for proof reading the manuscript and providing valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soodeh Hosseini.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hosseini, S. A new machine learning method consisting of GA-LR and ANN for attack detection. Wireless Netw 26, 4149–4162 (2020). https://doi.org/10.1007/s11276-020-02321-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-020-02321-3

Keywords

Navigation