DDoS Attack Detection using Swarm Optimized Random Forest Classification
Keywords:
DDoS, Grey Wolf Optimization (GWO), Intruder Detection System (IDS), Radom Forest (RF), Stochastic Gradient Descent (SGD)Abstract
With the increasing spread of the Internet, the need for security also increases - both in the private and in the business sector. Corporate networks in particular are often exposed to attempted attacks. In order to avert or limit the damage, these attacks must be recognized and appropriate countermeasures initiated. This task is achieved by an Intruder Detection System (IDS). This paper presents a DDoS attack detection model using swarm optimization-based feature selection and Radom Forest (RF) classifier. A modified Grey Wolf Optimization (GWO) algorithm is used to select the features which produce the best accuracy. The fitness function of the conventional GWO algorithm is replaced with Stochastic Gradient Descent (SGD) in order to perform feature selection. The RF classifier is then trained using the chosen subset of features to identify attacks. The proposed model is tested on CICIDS2017 dataset and has been compared with existing machine learning techniques to evaluate the efficiency of the proposed model. GWO earned the highest Accuracy of 99.8. This was accomplished with only 40 out of 75 features. When GWO provided the least number of features, 38, resulting in accuracy of 99.7. Over several experiments, modified GWO with DT had an average classification accuracy of 99.5 percent.
Downloads
References
M. R. Ayyagari, N. Kesswani, M. Kumar and K. Kumar, “Intrusion detection techniques in network environment: a systematic review,” Wireless Networks, vol. 27, pp. 1269-1285, 2021.
M. Ozkan-Okay, R. Samet, Ö. Aslan and D. Gupta, “A comprehensive systematic literature review on intrusion detection systems,” IEEE Access, vol. 9, pp. 157727-157760, 2021.
N. Dutta, N. Jadav, S. Tanwar, H. K. D. Sarma and E. Pricop, “Intrusion detection systems fundamentals,” Cyber Security: Issues and Current Trends, pp. 101-127, 2022.
A. Yazdinejadna, R. M. Parizi, A. Dehghantanha and M. S. Khan, “A kangaroo-based intrusion detection system on software-defined networks,” Computer Networks, vol. 184, pp. 1-29, 2021.
A. S. Dina and D. Manivannan, “Intrusion detection based on machine learning techniques in computer networks,” Internet of Things, vol. 16, 2021.
Y. Uhm and W. Pak, “Service-aware two-level partitioning for machine learning-based network intrusion detection with high performance and high scalability,” IEEE Access, vol. 9, pp. 6608-6622, 2021.
Y. Zhou, G. Cheng, S. Jiang and M. Dai, “Building an efficient intrusion detection system based on feature selection and ensemble classifier,” Computer networks, vol. 174, pp. 1-21, 2020.
D. Kapil, N. Mehra, A. Gupta, S. Maurya and A. Sharma, “Network security: threat model, attacks, and IDS using machine learning,” International conference on artificial intelligence and smart systems (ICAIS), March 2021, pp. 203-208.
S. Mirjalili, S. M. Mirjalili and A. Lewis, “Grey wolf optimizer,” Advances in engineering software, vol. 69, pp. 46-61, 2014.
L. Bottou, “Stochastic gradient descent tricks,” Neural networks: Tricks of the trade, Springer, Berlin, Heidelberg, 2012, pp. 421-436.
M. Yaseen, H. S. Salih, M. Aljanabi, A. H. Ali and S. A. Abed, “Improving Process Efficiency in Iraqi universities: a proposed management information system,” Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 1, pp. 211-219, 2023.
M. Aljanabi and S. Y. Mohammed, “Metaverse: open possibilities,” Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 3, pp. 79-86, 2023.
A. S. Shaker, O. F. Youssif, M. Aljanabi, Z. Abbood and M.S. Mahdi, “SEEK Mobility Adaptive Protocol Destination Seeker Media Access Control Protocol for Mobile WSNs,” Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 1, pp. 130-145, 2023.
H. S. Salih, M. Ghazi and M. Aljanabi, “Implementing an Automated Inventory Management System for Small and Medium-sized Enterprises,” Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 2, pp. 238-244, 2023.
G. Subburayalu, H. Duraivelu, A. P. Raveendran, R. Arunachalam, D. Kongara and C. Thangavel, “Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier,” Journal of Applied Security Research, vol. 18, no. 3, pp. 402-420, 2023.
G. Perumal, G. Subburayalu, Q. Abbas, S. M. Naqi and I. Qureshi, “VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions,” Systems, vol. 11, no. 8, pp. 1-25, 2023.
P. Satyanarayana, G. Diwakar, B. V. Subbayamma, N. P. S. Kumar, M. Arun and S. Gopalakrishnan, “Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications,” Computer Communications, vol. 198, pp.262-281, 2023.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.