Skip to main content

A New Hybrid Framework Based on Improved Genetic Algorithm and Simulated Annealing Algorithm for Optimization of Network IDS Based on BP Neural Network

  • Conference paper
  • First Online:
Innovations in Smart Cities Applications Edition 2 (SCA 2018)

Abstract

Nowadays, network security is a world hot topic in computer security and defense. Intrusions, attacks or anomalies in network infrastructures lead mostly in great financial losses, massive sensitive data leaks, thereby decreasing efficiency and the quality of productivity of an organization. Network Intrusion Detection System (NIDS) is an effective countermeasure and high-profile method to detect the unauthorized use of computer network and to provide the security for information. Thus, the presence of NIDS in an organization plays a vital part in attack mitigation, and it has become an integral part of a secure organization. In this chapter, we propose to optimize a very popular soft computing tool widely used for intrusion detection namely, Back Propagation Neural Network (BPNN) using a novel hybrid framework (IGASAA) based on Improved Genetic Algorithm (IGA) and Simulated Annealing Algorithm (SAA). Genetic Algorithm (GA) is improved through optimization strategies, namely Parallel Processing and Fitness Value Hashing, which reduce execution time, convergence time and save processing power. Experimental results on KDD CUP’99 dataset show that our optimized ANIDS (Anomaly NIDS) based BPNN, called “ANIDS BPNN-IGASAA” outperforms the original ANIDS BPNN, ANIDS BPNN optimized by using only GA and several traditional and new techniques in terms of detection rate, false positive rate and it is very much appropriate for network anomaly detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. McAfee Company: McAfee Labs 2018 Threats Predictions Report. https://securingtomorrow.mcafee.com/mcafee-labs/2018-threats-predictions

  2. SonicWall Enterprise: 2018 SonicWall Annual Threat Report. https://cdn.sonicwall.com/sonicwall.com/media/pdfs/resources/2018-snwl-cyber-threat-report.pdf

  3. Aminanto, M.E., Kim, H., Kim, K.M., Kim, K.: Another fuzzy anomaly detection system based on ant clustering algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100(1), 176–183 (2017)

    Article  Google Scholar 

  4. Ashok Kumar, D., Venugopalan, S.R.: A novel algorithm for network anomaly detection using adaptive machine learning. In: Saeed, K., Chaki, N., Pati, B., Bakshi, S., Mohapatra, D. (eds.) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol. 564, pp. 59–69. Springer, Singapore (2018)

    Chapter  Google Scholar 

  5. Lokeswari, N., Chakradhar Rao, B.: Artificial neural network classifier for intrusion detection system in computer network. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies, vol. 381, pp. 581–591. Springer, New Delhi (2016)

    Google Scholar 

  6. Wang, Y. et al.: A novel intrusion detection system based on advanced naive bayesian classification. In: Long, K., Leung, V., Zhang, H., Feng, Z., Li, Y., Zhang, Z. (eds.) 5G for Future Wireless Networks. 5GWN 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 211, pp. 581–588. Springer, Cham (2018)

    Google Scholar 

  7. Sangve, S.M. Thool, R.C.: ANIDS: Anomaly network intrusion detection system using hierarchical clustering technique. In: Satapathy, S., Bhateja, V., Joshi, A. (eds.) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol. 468, pp. 121–129. Springer, Singapore (2017)

    Google Scholar 

  8. Ma, T., Yu, Y., Wang, F., Zhang, Q., Chen, X.: A hybrid methodologies for intrusion detection based deep neural network with support vector machine and clustering technique. In: Yen, N., Hung, J. (eds.) Frontier Computing. FC 2016. Lecture Notes in Electrical Engineering, vol. 422, pp. 123–134. Springer, Singapore (2018)

    Google Scholar 

  9. Chang, C., Sun, X., Chen, D., Wang, C.: Application of back propagation neural network with simulated annealing algorithm in network intrusion detection systems. In: Sun, S., Chen, N., Tian, T. (eds.) Signal and Information Processing, Networking and Computers. ICSINC 2017. LNEE, vol. 473, pp. 172–180. Springer, Singapore (2018)

    Google Scholar 

  10. Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., Rida, M.: A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput. Secur. 75, 36–58 (2018)

    Article  Google Scholar 

  11. Multi-Layer Perceptron. http://www.cse.unsw.edu.au/~cs9417ml/MLP2

  12. Metropolis, N., Rosenbluth, A.W., Rosenbluth, M.N., Teller, A.H., Teller, E.: Equation of state calculations by fast computing machines. J. Chem. Phys. 21(6), 1087–1092 (1953)

    Article  Google Scholar 

  13. Chaudhary, V.R., Bichkar, R.S.: Detection of intrusions in KDDCup dataset using GA by enumeration technique. Int. J. Innov. Res. Comput. Commun. Eng. 3(3), 2365–2369 (2015)

    Google Scholar 

  14. Jacobson, L., Kanbe, B.: Genetic Algorithms in Java Basics, pp. 143–144. Apress, New York (2015). https://doi.org/10.1007/978-1-4842-0328-6

    Book  Google Scholar 

  15. Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., Ebrahimi, A.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27(6), 1669–1676 (2016)

    Article  Google Scholar 

  16. Hamamoto, A.H., Carvalho, L.F., Sampaio, L.D.H., Abrão, T., Proença Jr., M.L.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92, 390–402 (2018). https://doi.org/10.1016/j.eswa.2017.09.013

    Article  Google Scholar 

  17. Sharma, R., Chaurasia, S.: An enhanced approach to fuzzy C-means clustering for anomaly detection. In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds.) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol. 79, pp. 623–636. Springer, Singapore (2018)

    Chapter  Google Scholar 

  18. Borah, S., Panigrahi, R., Chakraborty, A.: An enhanced intrusion detection system based on clustering. In: Saeed, K., Chaki, N., Pati, B., Bakshi, S., Mohapatra, D. (eds.) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol. 564, pp. 37–45. Springer, Singapore (2018)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zouhair Chiba .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chiba, Z., Abghour, N., Moussaid, K., El omri, A., Rida, M. (2019). A New Hybrid Framework Based on Improved Genetic Algorithm and Simulated Annealing Algorithm for Optimization of Network IDS Based on BP Neural Network. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_43

Download citation

Publish with us

Policies and ethics