Advertisement

A New Hybrid Framework Based on Improved Genetic Algorithm and Simulated Annealing Algorithm for Optimization of Network IDS Based on BP Neural Network

  • Zouhair ChibaEmail author
  • Noreddine Abghour
  • Khalid Moussaid
  • Amina El omri
  • Mohamed Rida
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)

Abstract

Nowadays, network security is a world hot topic in computer security and defense. Intrusions, attacks or anomalies in network infrastructures lead mostly in great financial losses, massive sensitive data leaks, thereby decreasing efficiency and the quality of productivity of an organization. Network Intrusion Detection System (NIDS) is an effective countermeasure and high-profile method to detect the unauthorized use of computer network and to provide the security for information. Thus, the presence of NIDS in an organization plays a vital part in attack mitigation, and it has become an integral part of a secure organization. In this chapter, we propose to optimize a very popular soft computing tool widely used for intrusion detection namely, Back Propagation Neural Network (BPNN) using a novel hybrid framework (IGASAA) based on Improved Genetic Algorithm (IGA) and Simulated Annealing Algorithm (SAA). Genetic Algorithm (GA) is improved through optimization strategies, namely Parallel Processing and Fitness Value Hashing, which reduce execution time, convergence time and save processing power. Experimental results on KDD CUP’99 dataset show that our optimized ANIDS (Anomaly NIDS) based BPNN, called “ANIDS BPNN-IGASAA” outperforms the original ANIDS BPNN, ANIDS BPNN optimized by using only GA and several traditional and new techniques in terms of detection rate, false positive rate and it is very much appropriate for network anomaly detection.

Keywords

Network intrusion detection system Back propagation neural network Genetic algorithm Simulated annealing algorithm Learning rate Momentum term Parallel processing Fitness value hashing 

References

  1. 1.
    McAfee Company: McAfee Labs 2018 Threats Predictions Report. https://securingtomorrow.mcafee.com/mcafee-labs/2018-threats-predictions
  2. 2.
  3. 3.
    Aminanto, M.E., Kim, H., Kim, K.M., Kim, K.: Another fuzzy anomaly detection system based on ant clustering algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100(1), 176–183 (2017)CrossRefGoogle Scholar
  4. 4.
    Ashok Kumar, D., Venugopalan, S.R.: A novel algorithm for network anomaly detection using adaptive machine learning. In: Saeed, K., Chaki, N., Pati, B., Bakshi, S., Mohapatra, D. (eds.) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol. 564, pp. 59–69. Springer, Singapore (2018)CrossRefGoogle Scholar
  5. 5.
    Lokeswari, N., Chakradhar Rao, B.: Artificial neural network classifier for intrusion detection system in computer network. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies, vol. 381, pp. 581–591. Springer, New Delhi (2016)Google Scholar
  6. 6.
    Wang, Y. et al.: A novel intrusion detection system based on advanced naive bayesian classification. In: Long, K., Leung, V., Zhang, H., Feng, Z., Li, Y., Zhang, Z. (eds.) 5G for Future Wireless Networks. 5GWN 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 211, pp. 581–588. Springer, Cham (2018)Google Scholar
  7. 7.
    Sangve, S.M. Thool, R.C.: ANIDS: Anomaly network intrusion detection system using hierarchical clustering technique. In: Satapathy, S., Bhateja, V., Joshi, A. (eds.) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol. 468, pp. 121–129. Springer, Singapore (2017)Google Scholar
  8. 8.
    Ma, T., Yu, Y., Wang, F., Zhang, Q., Chen, X.: A hybrid methodologies for intrusion detection based deep neural network with support vector machine and clustering technique. In: Yen, N., Hung, J. (eds.) Frontier Computing. FC 2016. Lecture Notes in Electrical Engineering, vol. 422, pp. 123–134. Springer, Singapore (2018)Google Scholar
  9. 9.
    Chang, C., Sun, X., Chen, D., Wang, C.: Application of back propagation neural network with simulated annealing algorithm in network intrusion detection systems. In: Sun, S., Chen, N., Tian, T. (eds.) Signal and Information Processing, Networking and Computers. ICSINC 2017. LNEE, vol. 473, pp. 172–180. Springer, Singapore (2018)Google Scholar
  10. 10.
    Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., Rida, M.: A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput. Secur. 75, 36–58 (2018)CrossRefGoogle Scholar
  11. 11.
  12. 12.
    Metropolis, N., Rosenbluth, A.W., Rosenbluth, M.N., Teller, A.H., Teller, E.: Equation of state calculations by fast computing machines. J. Chem. Phys. 21(6), 1087–1092 (1953)CrossRefGoogle Scholar
  13. 13.
    Chaudhary, V.R., Bichkar, R.S.: Detection of intrusions in KDDCup dataset using GA by enumeration technique. Int. J. Innov. Res. Comput. Commun. Eng. 3(3), 2365–2369 (2015)Google Scholar
  14. 14.
    Jacobson, L., Kanbe, B.: Genetic Algorithms in Java Basics, pp. 143–144. Apress, New York (2015).  https://doi.org/10.1007/978-1-4842-0328-6CrossRefGoogle Scholar
  15. 15.
    Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., Ebrahimi, A.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27(6), 1669–1676 (2016)CrossRefGoogle Scholar
  16. 16.
    Hamamoto, A.H., Carvalho, L.F., Sampaio, L.D.H., Abrão, T., Proença Jr., M.L.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92, 390–402 (2018).  https://doi.org/10.1016/j.eswa.2017.09.013CrossRefGoogle Scholar
  17. 17.
    Sharma, R., Chaurasia, S.: An enhanced approach to fuzzy C-means clustering for anomaly detection. In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds.) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol. 79, pp. 623–636. Springer, Singapore (2018)CrossRefGoogle Scholar
  18. 18.
    Borah, S., Panigrahi, R., Chakraborty, A.: An enhanced intrusion detection system based on clustering. In: Saeed, K., Chaki, N., Pati, B., Bakshi, S., Mohapatra, D. (eds.) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol. 564, pp. 37–45. Springer, Singapore (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Zouhair Chiba
    • 1
    Email author
  • Noreddine Abghour
    • 1
  • Khalid Moussaid
    • 1
  • Amina El omri
    • 1
  • Mohamed Rida
    • 1
  1. 1.LIMSAD Labs, Faculty of SciencesHassan II University of CasablancaCasablancaMorocco

Personalised recommendations