Automatic Intrusion Detection Using Optimal Features with Adaptive Bi-Directional Long Short Term Memory

Authors

  • G. Parimala Department of Networking and Communications, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Chennai, 603203, India
  • Kayalvizhi R. Department of Networking and Communications, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Chennai, 603203, India

Keywords:

IDS, adaptive pelican optimization algorithm, enhanced bi-directional long short term memory, malicious attack and feature selection

Abstract

Technology is advancing quickly, which not only makes life easier but also gives rise to various security problems. As the Internet has grown over time, so has the number of online attacks. To avoid the attacks, IDS (IDS) is developed. Nowadays, a lot of machine learning methods have been developed to detect attack. Although these jobs, decides the right feature and improving classification accuracy remains a challenging task. Therefore, in this paper, automatic attack detection is proposed. The presented approach is contains three stages namely, pre-processing, feature selection and classification.  In pre-processing, the redundant and missing data are removed. After the pre-processing, important features are selected from each records using adaptive pelican optimization algorithm (APO). Then, the certain attributes are fed to the enhanced bi-directional long short term memory (EBi-LSTM). The efficiency of presented technique is discussed based on different metrics.

Downloads

Download data is not yet available.

References

Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung. "Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications 36, no. 1 (2013): 16-24.

He, Ke, Dan Dongseong Kim, and Muhammad Rizwan Asghar. "Adversarial machine learning for network intrusion detection systems: a comprehensive survey." IEEE Communications Surveys & Tutorials (2023).

Vinchurkar, Deepika P., and Alpa Reshamwala. "A review of intrusion detection system using neural network and machine learning." J. Eng. Sci. Innov. Technol 1 (2012): 54-63.

Ugochukwu, Chibuzor John, E. O. Bennett, and P. Harcourt. An intrusion detection system using machine learning algorithm. LAP LAMBERT Academic Publishing, 2019.

Almseidin, Mohammad, Maen Alzubi, Szilveszter Kovacs, and Mouhammd Alkasassbeh. "Evaluation of machine learning algorithms for intrusion detection system." In 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY), pp. 000277-000282. IEEE, 2017.

Kim, Jin, Nara Shin, Seung Yeon Jo, and Sang Hyun Kim. "Method of intrusion detection using deep neural network." In 2017 IEEE international conference on big data and smart computing (BigComp), pp. 313-316. IEEE, 2017.

Mebawondu, O. J., Adetunmbi, A. O., Mebawondu, J. O., & Alowolodu, O. D. (2020, November). Feature Weighting and Classification Modeling for Network Intrusion Detection Using Machine Learning Algorithms. In International Conference on Information and Communication Technology and Applications (pp. 315-327). Cham: Springer International Publishing.

Priya, S., & Kumar, K. (2023). Binary bat algorithm based feature selection with deep reinforcement learning technique for intrusion detection system. Soft Computing, 1-12.

Mahdavisharif, M., Jamali, S., & Fotohi, R. (2021). Big data-aware intrusion detection system in communication networks: a deep learning approach. Journal of Grid Computing, 19, 1-28.

Sreelatha, G., Babu, A. V., & Midhunchakkaravarthy, D. (2022). Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection. Cluster computing, 25(5), 3129-3144.

Meddeb, R., Jemili, F., Triki, B., & Korbaa, O. (2023). A deep learning-based intrusion detection approach for mobile Ad-hoc network. Soft Computing, 1-15.

Salvakkam, D. B., Saravanan, V., Jain, P. K., & Pamula, R. (2023). Enhanced Quantum-Secure Ensemble Intrusion Detection Techniques for Cloud Based on Deep Learning. Cognitive Computation, 1-20.

Trojovský, P., & Dehghani, M. (2022). Pelican optimization algorithm: A novel nature-inspired algorithm for engineering applications. Sensors, 22(3), 855.

Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016, February). Long short term memory recurrent neural network classifier for intrusion detection. In 2016 international conference on platform technology and service (PlatCon) (pp. 1-5). IEEE.

Downloads

Published

10.11.2023

How to Cite

Parimala, G. ., & R., K. . (2023). Automatic Intrusion Detection Using Optimal Features with Adaptive Bi-Directional Long Short Term Memory. International Journal of Intelligent Systems and Applications in Engineering, 12(4s), 710–716. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3856

Issue

Section

Research Article