An Intelligent Hybrid GA-PI Feature Selection Technique for Network Intrusion Detection Systems

Authors

  • Sowmya Research scholar, Christ University & Assistant professor , CMRIT, Bangalore. Karnatka, India
  • T. Mary Anita E A professor, Christ University Bangalore, Bangalore, Karnatka, India

Keywords:

Network Intrusion Detection Systems (NIDS), Feature selection, Support vector machines (SVM), Hybrid GA-PI algorithm

Abstract

The development of Network Intrusion Detection Systems (NIDS) has become increasingly important due to the growing threat of cyber-attacks. However, with the vast amount of data generated in networks, handling big data in NIDS has become a major challenge. To address this challenge, this research paper proposes an intelligent hybrid GA-PI algorithm for feature selection and classification tasks in NIDS using support vector machines (SVM). The proposed approach is evaluated using two sub-datasets, Analysis and Normal, and Reconnaissance and Normal, which are generated from the publicly available UNSWNB-15 dataset. In this work, instead of considering all possible attacks, the focus is on two attacks, emphasizing the importance of the feature selection agent in determining the optimal features based on the attack type. The experimental results show that the proposed hybrid feature selection approach outperforms existing methodologies in terms of accuracy and execution time. Moreover, the selection of features can be subjective and dependent on the domain knowledge of the researcher. Additionally, the proposed approach requires computational resources for feature selection and classification tasks, which can be a limitation for resource-constrained systems. To be brief, this research paper presents a promising approach for feature selection and classification tasks in NIDS using an intelligent hybrid GA-PI algorithm. While there are some challenges and limitations, the proposed approach has the potential to contribute to the development of effective and efficient NIDS.

Downloads

Download data is not yet available.

References

Wang, C. R., Xu, R. F., Lee, S. J., & Lee, C. H. (2018). Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowledge-Based Systems, 147, 68-80.

Subramani, S., & Selvi, M. (2023). Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks. Optik, 273, 170419.

Qu, L., He, W., Li, J., Zhang, H., Yang, C., & Xie, B. (2023). Explicit and Size-adaptive PSO-based Feature Selection for Classification. Swarm and Evolutionary Computation, 101249.

K Thejeswari, K Sreenivasulu, B Sowjanya.(2022). Cyber Threat Security System Using Artificial Intelligence for Android-Operated Mobile Devices. International Journal

of Computer Engineering in Research Trends.9(12),275-280.

P Sandeep Kumar Reddy, M SriRaghavendra, K Sreenivasulu, T N Balakrishna. (2022). Cyber Threat Security System Using Artificial Intelligence for Android-Operated Mobile Devices. International Journal of Computer Engineering in Research Trends.9(12),269-274.

Pasha, M. J., Pingili, M., Sreenivasulu, K., Bhavsingh, M., Saheb, S. I., & Saleh, A. (2022). Bug2 algorithm-based data fusion using mobile element for IoT-enabled wireless sensor networks. Measurement: Sensors, 24, 100548.

Ramana, K. V. ., Muralidhar, A. ., Balusa, B. C. ., Bhavsingh, M., & Majeti, S. . (2023). An Approach for Mining Top-k High Utility Item Sets (HUI). International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 198–203. https://doi.org/10.17762/ijritcc.v11i2s.6045

Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2023). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors, 25, 100612.

A.Rebekah Johnson, N.Parashuram .S.Prem Kumar, (2014). Organizing of Multipath Routing For Intrusion Lenience in Various WSNs. International Journal of Computer Engineering in Research Trends.1(2),104-110.

Al-Safi, A. H. S., Hani, Z. I. R., & Zahra, M. A. (2021). Using a hybrid algorithm and feature selection for network anomaly intrusion detection. J Mech Eng Res Dev, 44(4), 253-262.

Alghanam, O. A., Almobaideen, W., Saadeh, M., & Adwan, O. (2023). An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Systems with Applications, 213, 118745.

Thaseen, I. S., & Kumar, C. A. (2017). Intrusion detection model using fusion of chi-square feature selection and multi class SVM. Journal of King Saud University-Computer and Information Sciences, 29(4), 462-472.

Pise, D. P. . (2021). Bot Net Detection for Social Media Using Segmentation with Classification Using Deep Learning Architecture. Research Journal of Computer Systems and Engineering, 2(1), 11:15. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/13

Khammassi, C., & Krichen, S. (2017). A GA-LR wrapper approach for feature selection in network intrusion detection. computers & security, 70, 255-277

Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE transactions on computers, 65(10), 2986-2998.

Singh, P., & Tiwari, A. (2015, May). An efficient approach for intrusion detection in reduced features of KDD99 using ID3 and classification with KNNGA. In 2015 second international conference on advances in computing and communication engineering (pp. 445-452). IEEE.

Barkah, A. S., Selamat, S. R., Abidin, Z. Z., & Wahyudi, R. (2023). Impact of Data Balancing and Feature Selection on Machine Learning-based Network Intrusion Detection. JOIV: International Journal on Informatics Visualization, 7(1).

Walling, S., & Lodh, S. (2023). Performance Evaluation of Supervised Machine Learning Based Intrusion Detection with Univariate Feature Selection on NSL KDD Dataset.

Subramani, S., & Selvi, M. (2023). Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks. Optik, 273, 170419.

Figueiredo, J., Serrão, C., & de Almeida, A. M. (2023). Deep Learning Model Transposition for Network Intrusion Detection Systems. Electronics, 12(2), 293.

Talukder, M. A., Hasan, K. F., Islam, M. M., Uddin, M. A., Akhter, A., Yousuf, M. A., ... & Moni, M. A. (2023). A dependable hybrid machine learning model for network intrusion detection. Journal of Information Security and Applications, 72, 103405.

Famili, A., Shen, W. M., Weber, R., & Simoudis, E. (1997). Data preprocessing and intelligent data analysis. Intelligent data analysis, 1(1), 3-23.

Kiran, B. R., Thomas, D. M., & Parakkal, R. (2018). An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. Journal of Imaging, 4(2), 36.

Gaddam, A., Wilkin, T., Angelova, M., & Gaddam, J. (2020). Detecting sensor faults, anomalies and outliers in the internet of things: A survey on the challenges and solutions. Electronics, 9(3), 511.

Huang, J., Cai, Y., & Xu, X. (2007). A hybrid genetic algorithm for feature selection wrapper based on mutual information. Pattern recognition letters, 28(13), 1825-1844.

S. Anto, S. Chandramathi. (2015). An Expert System based on SVM and Hybrid GA-SA Optimization for Hepatitis Diagnosis. International Journal of Computer Engineering In Research Trends, 2(7), 437-443.

V. Kishen Ajay Kumar, M. Rudra Kumar, N. Shribala, Ninni Singh, Vinit Kumar Gunjan, Kazy Noor-e-alam Siddiquee, Muhammad Arif, "Dynamic Wavelength Scheduling by Multiobjectives in OBS Networks", Journal of Mathematics, vol. 2022, Article ID 3806018, 10 pages, 2022. https://doi.org/10.1155/2022/3806018

Ramana, Kadiyala, et al. "Leaf disease classification in smart agriculture using deep neural network architecture and IoT." Journal of Circuits, Systems and Computers 31.15 (2022): 2240004. https://doi.org/10.1142/S0218126622400047

Downloads

Published

01.07.2023

How to Cite

Sowmya, & Anita, T. M. . (2023). An Intelligent Hybrid GA-PI Feature Selection Technique for Network Intrusion Detection Systems. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 718–731. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3010