Abstract
Advances in computer networks led to the generation of much data that computer networks must be capable of transmitting. The security of this volume of data is a major challenge for companies. Intrusion detection systems is one of the solutions that researchers introduced for this challenge. This research aims to introduce a new machine learning model for intrusion detection. The proposed model includes two stages of feature selection and attack identification. The feature selection stage uses genetic algorithm and logistic regression algorithm to find a correlated subset of features. In the attack detection phase, the ANN algorithm is used. ANN is trained by particle optimization (PSO) and gravitational search (GS) algorithms. To evaluate the proposed model, two sets of NSL-KDD and KDD Cup'99 are used and results are compared with ANN based on gradient descent (GD-ANN) and decision tree, ANN based on genetic algorithm (GA-ANN) methods, ANN based on GSPSO (GSPSO-ANN), ANN based on PSO (PSO-ANN) and ANN based on GS (GS-ANN) indicate the superiority of the proposed method.
Similar content being viewed by others
References
Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information sciences,275, 314–347.
Sultana, N., Chilamkurti, N., Peng, W., & Alhadad, R. (2019). Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications,12(2), 493–501.
Wang, G., Hao, J., Ma, J., & Huang, L. (2010). A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Systems with Applications,37(9), 6225–6232.
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security,28(1–2), 18–28.
Mehdi, S. A., Khalid, J., & Khayam, S. A. (2011). Revisiting traffic anomaly detection using software defined networking. In International workshop on recent advances in intrusion detection (pp. 161–180). Springer, Berlin.
Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., Tachtatzis, C., & Atkinson, R. (2016, May). Threat analysis of IoT networks using artificial neural network intrusion detection system. In International symposium on networks, computers and communications (ISNCC) (pp. 1–6). IEEE.
Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems,82, 761–768.
Dash, T. (2017). A study on intrusion detection using neural networks trained with evolutionary algorithms. Soft Computing,21(10), 2687–2700.
Aslahi-Shahri, B. M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M. J., et al. (2016). A hybrid method consisting of GA and SVM for intrusion detection system. Neural Computing and Applications,27(6), 1669–1676.
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In IEEE symposium on computational intelligence for security and defense applications (pp. 1–6). IEEE.
Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., & Dai, K. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications,39(1), 424–430.
Hashemi, V. M., Muda, Z., & Yassin, W. (2013). Improving intrusion detection using genetic algorithm. Information Technology Journal,12(11), 2167–2173.
Elngar, A. A., et al. (2012). A fast accurate network intrusion detection system. International Journal of Computer Science and Information Security,10(9), 29.
Khammassi, C., & Krichen, S. (2017). A GA-LR wrapper approach for feature selection in network intrusion detection. Computers & Security,70, 255–277.
Kuang, F., Zhang, S., Jin, Z., & Xu, W. (2015). A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Computing,19(5), 1187–1199.
Zhang, Y., Li, P., & Wang, X. (2019). Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access,7, 31711–31722.
Hassan, M. M., Gumaei, A., Alsanad, A., Alrubaian, M., & Fortino, G. (2020). A hybrid deep learning model for efficient intrusion detection in big data environment. Information Sciences,513, 386–396.
Chen, T. M., Blasco, J., Alzubi, J., & Alzubi, O. (2014). Intrusion detection. IET Publishing,1(1), 1–9.
Nazir, S., Hamdoun, H., & Alzubi, J. (2015). Cyber attack challenges and resilience for smart grids. European Journal of Scientific Research,131(1), 111–120.
Alzubi, J. A. (2015). Optimal classifier ensemble design based on cooperative game theory. Research Journal of Applied Sciences, Engineering and Technology,11(12), 1336–1343.
Alzubi, O., Alzubi, J., Tedmori, S., Rashaideh, H., & Almomani, O. (2018). Consensus-based combining method for classifier ensembles. International Arab Journal of Information Technology (IAJIT),15(1), 1–10.
Alzubi, J., Nayyar, A., & Kumar, A. (2018). Machine learning from theory to algorithms: an overview. Journal of Physics: Conference Series, IOP Publishing, 1142(1), 012012.
Chandrashekar, G., & Sahin, F. (2014). A survey on feature selection methods. Computers & Electrical Engineering,40(1), 16–28.
Acknowledgements
The author would like to thank the WINE Editorial Board and the anonymous reviewers for their very helpful suggestions. Also, the author would like to extend their appreciation to Mr. Saman Rafiee Sardo and Mr. Behnam Mohammad Hassanizade for proof reading the manuscript and providing valuable comments.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hosseini, S. A new machine learning method consisting of GA-LR and ANN for attack detection. Wireless Netw 26, 4149–4162 (2020). https://doi.org/10.1007/s11276-020-02321-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-020-02321-3