An Intelligent Hybrid GA-PI Feature Selection Technique for Network Intrusion Detection Systems
Keywords:
Network Intrusion Detection Systems (NIDS), Feature selection, Support vector machines (SVM), Hybrid GA-PI algorithmAbstract
The development of Network Intrusion Detection Systems (NIDS) has become increasingly important due to the growing threat of cyber-attacks. However, with the vast amount of data generated in networks, handling big data in NIDS has become a major challenge. To address this challenge, this research paper proposes an intelligent hybrid GA-PI algorithm for feature selection and classification tasks in NIDS using support vector machines (SVM). The proposed approach is evaluated using two sub-datasets, Analysis and Normal, and Reconnaissance and Normal, which are generated from the publicly available UNSWNB-15 dataset. In this work, instead of considering all possible attacks, the focus is on two attacks, emphasizing the importance of the feature selection agent in determining the optimal features based on the attack type. The experimental results show that the proposed hybrid feature selection approach outperforms existing methodologies in terms of accuracy and execution time. Moreover, the selection of features can be subjective and dependent on the domain knowledge of the researcher. Additionally, the proposed approach requires computational resources for feature selection and classification tasks, which can be a limitation for resource-constrained systems. To be brief, this research paper presents a promising approach for feature selection and classification tasks in NIDS using an intelligent hybrid GA-PI algorithm. While there are some challenges and limitations, the proposed approach has the potential to contribute to the development of effective and efficient NIDS.
Downloads
References
Wang, C. R., Xu, R. F., Lee, S. J., & Lee, C. H. (2018). Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowledge-Based Systems, 147, 68-80.
Subramani, S., & Selvi, M. (2023). Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks. Optik, 273, 170419.
Qu, L., He, W., Li, J., Zhang, H., Yang, C., & Xie, B. (2023). Explicit and Size-adaptive PSO-based Feature Selection for Classification. Swarm and Evolutionary Computation, 101249.
K Thejeswari, K Sreenivasulu, B Sowjanya.(2022). Cyber Threat Security System Using Artificial Intelligence for Android-Operated Mobile Devices. International Journal
of Computer Engineering in Research Trends.9(12),275-280.
P Sandeep Kumar Reddy, M SriRaghavendra, K Sreenivasulu, T N Balakrishna. (2022). Cyber Threat Security System Using Artificial Intelligence for Android-Operated Mobile Devices. International Journal of Computer Engineering in Research Trends.9(12),269-274.
Pasha, M. J., Pingili, M., Sreenivasulu, K., Bhavsingh, M., Saheb, S. I., & Saleh, A. (2022). Bug2 algorithm-based data fusion using mobile element for IoT-enabled wireless sensor networks. Measurement: Sensors, 24, 100548.
Ramana, K. V. ., Muralidhar, A. ., Balusa, B. C. ., Bhavsingh, M., & Majeti, S. . (2023). An Approach for Mining Top-k High Utility Item Sets (HUI). International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 198–203. https://doi.org/10.17762/ijritcc.v11i2s.6045
Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2023). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors, 25, 100612.
A.Rebekah Johnson, N.Parashuram .S.Prem Kumar, (2014). Organizing of Multipath Routing For Intrusion Lenience in Various WSNs. International Journal of Computer Engineering in Research Trends.1(2),104-110.
Al-Safi, A. H. S., Hani, Z. I. R., & Zahra, M. A. (2021). Using a hybrid algorithm and feature selection for network anomaly intrusion detection. J Mech Eng Res Dev, 44(4), 253-262.
Alghanam, O. A., Almobaideen, W., Saadeh, M., & Adwan, O. (2023). An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Systems with Applications, 213, 118745.
Thaseen, I. S., & Kumar, C. A. (2017). Intrusion detection model using fusion of chi-square feature selection and multi class SVM. Journal of King Saud University-Computer and Information Sciences, 29(4), 462-472.
Pise, D. P. . (2021). Bot Net Detection for Social Media Using Segmentation with Classification Using Deep Learning Architecture. Research Journal of Computer Systems and Engineering, 2(1), 11:15. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/13
Khammassi, C., & Krichen, S. (2017). A GA-LR wrapper approach for feature selection in network intrusion detection. computers & security, 70, 255-277
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE transactions on computers, 65(10), 2986-2998.
Singh, P., & Tiwari, A. (2015, May). An efficient approach for intrusion detection in reduced features of KDD99 using ID3 and classification with KNNGA. In 2015 second international conference on advances in computing and communication engineering (pp. 445-452). IEEE.
Barkah, A. S., Selamat, S. R., Abidin, Z. Z., & Wahyudi, R. (2023). Impact of Data Balancing and Feature Selection on Machine Learning-based Network Intrusion Detection. JOIV: International Journal on Informatics Visualization, 7(1).
Walling, S., & Lodh, S. (2023). Performance Evaluation of Supervised Machine Learning Based Intrusion Detection with Univariate Feature Selection on NSL KDD Dataset.
Subramani, S., & Selvi, M. (2023). Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks. Optik, 273, 170419.
Figueiredo, J., Serrão, C., & de Almeida, A. M. (2023). Deep Learning Model Transposition for Network Intrusion Detection Systems. Electronics, 12(2), 293.
Talukder, M. A., Hasan, K. F., Islam, M. M., Uddin, M. A., Akhter, A., Yousuf, M. A., ... & Moni, M. A. (2023). A dependable hybrid machine learning model for network intrusion detection. Journal of Information Security and Applications, 72, 103405.
Famili, A., Shen, W. M., Weber, R., & Simoudis, E. (1997). Data preprocessing and intelligent data analysis. Intelligent data analysis, 1(1), 3-23.
Kiran, B. R., Thomas, D. M., & Parakkal, R. (2018). An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. Journal of Imaging, 4(2), 36.
Gaddam, A., Wilkin, T., Angelova, M., & Gaddam, J. (2020). Detecting sensor faults, anomalies and outliers in the internet of things: A survey on the challenges and solutions. Electronics, 9(3), 511.
Huang, J., Cai, Y., & Xu, X. (2007). A hybrid genetic algorithm for feature selection wrapper based on mutual information. Pattern recognition letters, 28(13), 1825-1844.
S. Anto, S. Chandramathi. (2015). An Expert System based on SVM and Hybrid GA-SA Optimization for Hepatitis Diagnosis. International Journal of Computer Engineering In Research Trends, 2(7), 437-443.
V. Kishen Ajay Kumar, M. Rudra Kumar, N. Shribala, Ninni Singh, Vinit Kumar Gunjan, Kazy Noor-e-alam Siddiquee, Muhammad Arif, "Dynamic Wavelength Scheduling by Multiobjectives in OBS Networks", Journal of Mathematics, vol. 2022, Article ID 3806018, 10 pages, 2022. https://doi.org/10.1155/2022/3806018
Ramana, Kadiyala, et al. "Leaf disease classification in smart agriculture using deep neural network architecture and IoT." Journal of Circuits, Systems and Computers 31.15 (2022): 2240004. https://doi.org/10.1142/S0218126622400047
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.