Automatic Intrusion Detection Using Optimal Features with Adaptive Bi-Directional Long Short Term Memory
Keywords:IDS, adaptive pelican optimization algorithm, enhanced bi-directional long short term memory, malicious attack and feature selection
Technology is advancing quickly, which not only makes life easier but also gives rise to various security problems. As the Internet has grown over time, so has the number of online attacks. To avoid the attacks, IDS (IDS) is developed. Nowadays, a lot of machine learning methods have been developed to detect attack. Although these jobs, decides the right feature and improving classification accuracy remains a challenging task. Therefore, in this paper, automatic attack detection is proposed. The presented approach is contains three stages namely, pre-processing, feature selection and classification. In pre-processing, the redundant and missing data are removed. After the pre-processing, important features are selected from each records using adaptive pelican optimization algorithm (APO). Then, the certain attributes are fed to the enhanced bi-directional long short term memory (EBi-LSTM). The efficiency of presented technique is discussed based on different metrics.
Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung. "Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications 36, no. 1 (2013): 16-24.
He, Ke, Dan Dongseong Kim, and Muhammad Rizwan Asghar. "Adversarial machine learning for network intrusion detection systems: a comprehensive survey." IEEE Communications Surveys & Tutorials (2023).
Vinchurkar, Deepika P., and Alpa Reshamwala. "A review of intrusion detection system using neural network and machine learning." J. Eng. Sci. Innov. Technol 1 (2012): 54-63.
Ugochukwu, Chibuzor John, E. O. Bennett, and P. Harcourt. An intrusion detection system using machine learning algorithm. LAP LAMBERT Academic Publishing, 2019.
Almseidin, Mohammad, Maen Alzubi, Szilveszter Kovacs, and Mouhammd Alkasassbeh. "Evaluation of machine learning algorithms for intrusion detection system." In 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY), pp. 000277-000282. IEEE, 2017.
Kim, Jin, Nara Shin, Seung Yeon Jo, and Sang Hyun Kim. "Method of intrusion detection using deep neural network." In 2017 IEEE international conference on big data and smart computing (BigComp), pp. 313-316. IEEE, 2017.
Mebawondu, O. J., Adetunmbi, A. O., Mebawondu, J. O., & Alowolodu, O. D. (2020, November). Feature Weighting and Classification Modeling for Network Intrusion Detection Using Machine Learning Algorithms. In International Conference on Information and Communication Technology and Applications (pp. 315-327). Cham: Springer International Publishing.
Priya, S., & Kumar, K. (2023). Binary bat algorithm based feature selection with deep reinforcement learning technique for intrusion detection system. Soft Computing, 1-12.
Mahdavisharif, M., Jamali, S., & Fotohi, R. (2021). Big data-aware intrusion detection system in communication networks: a deep learning approach. Journal of Grid Computing, 19, 1-28.
Sreelatha, G., Babu, A. V., & Midhunchakkaravarthy, D. (2022). Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection. Cluster computing, 25(5), 3129-3144.
Meddeb, R., Jemili, F., Triki, B., & Korbaa, O. (2023). A deep learning-based intrusion detection approach for mobile Ad-hoc network. Soft Computing, 1-15.
Salvakkam, D. B., Saravanan, V., Jain, P. K., & Pamula, R. (2023). Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning. Cognitive Computation, 1-20.
Trojovský, P., & Dehghani, M. (2022). Pelican optimization algorithm: A novel nature-inspired algorithm for engineering applications. Sensors, 22(3), 855.
Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016, February). Long short term memory recurrent neural network classifier for intrusion detection. In 2016 international conference on platform technology and service (PlatCon) (pp. 1-5). IEEE.
How to Cite
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.