DDoS Attack Detection using Swarm Optimized Random Forest Classification

Authors

  • R. Sarath Babu Research Scholar, Department of Computer Science and Engineering, University College of Engineering, Osmania University, Hyderabad, Telangana, India.
  • K. Radhika Professor and Head, Department of Information Technology, Gandipet, Hyderabad, Telangana, India.

Keywords:

DDoS, Grey Wolf Optimization (GWO), Intruder Detection System (IDS), Radom Forest (RF), Stochastic Gradient Descent (SGD)

Abstract

With the increasing spread of the Internet, the need for security also increases - both in the private and in the business sector. Corporate networks in particular are often exposed to attempted attacks. In order to avert or limit the damage, these attacks must be recognized and appropriate countermeasures initiated. This task is achieved by an Intruder Detection System (IDS). This paper presents a DDoS attack detection model using swarm optimization-based feature selection and Radom Forest (RF) classifier. A modified Grey Wolf Optimization (GWO) algorithm is used to select the features which produce the best accuracy. The fitness function of the conventional GWO algorithm is replaced with Stochastic Gradient Descent (SGD) in order to perform feature selection. The RF classifier is then trained using the chosen subset of features to identify attacks. The proposed model is tested on CICIDS2017 dataset and has been compared with existing machine learning techniques to evaluate the efficiency of the proposed model. GWO earned the highest Accuracy of 99.8. This was accomplished with only 40 out of 75 features. When GWO provided the least number of features, 38, resulting in accuracy of 99.7. Over several experiments, modified GWO with DT had an average classification accuracy of 99.5 percent.

Downloads

Download data is not yet available.

References

M. R. Ayyagari, N. Kesswani, M. Kumar and K. Kumar, “Intrusion detection techniques in network environment: a systematic review,” Wireless Networks, vol. 27, pp. 1269-1285, 2021.

M. Ozkan-Okay, R. Samet, Ö. Aslan and D. Gupta, “A comprehensive systematic literature review on intrusion detection systems,” IEEE Access, vol. 9, pp. 157727-157760, 2021.

N. Dutta, N. Jadav, S. Tanwar, H. K. D. Sarma and E. Pricop, “Intrusion detection systems fundamentals,” Cyber Security: Issues and Current Trends, pp. 101-127, 2022.

A. Yazdinejadna, R. M. Parizi, A. Dehghantanha and M. S. Khan, “A kangaroo-based intrusion detection system on software-defined networks,” Computer Networks, vol. 184, pp. 1-29, 2021.

A. S. Dina and D. Manivannan, “Intrusion detection based on machine learning techniques in computer networks,” Internet of Things, vol. 16, 2021.

Y. Uhm and W. Pak, “Service-aware two-level partitioning for machine learning-based network intrusion detection with high performance and high scalability,” IEEE Access, vol. 9, pp. 6608-6622, 2021.

Y. Zhou, G. Cheng, S. Jiang and M. Dai, “Building an efficient intrusion detection system based on feature selection and ensemble classifier,” Computer networks, vol. 174, pp. 1-21, 2020.

D. Kapil, N. Mehra, A. Gupta, S. Maurya and A. Sharma, “Network security: threat model, attacks, and IDS using machine learning,” International conference on artificial intelligence and smart systems (ICAIS), March 2021, pp. 203-208.

S. Mirjalili, S. M. Mirjalili and A. Lewis, “Grey wolf optimizer,” Advances in engineering software, vol. 69, pp. 46-61, 2014.

L. Bottou, “Stochastic gradient descent tricks,” Neural networks: Tricks of the trade, Springer, Berlin, Heidelberg, 2012, pp. 421-436.

M. Yaseen, H. S. Salih, M. Aljanabi, A. H. Ali and S. A. Abed, “Improving Process Efficiency in Iraqi universities: a proposed management information system,” Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 1, pp. 211-219, 2023.

M. Aljanabi and S. Y. Mohammed, “Metaverse: open possibilities,” Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 3, pp. 79-86, 2023.

A. S. Shaker, O. F. Youssif, M. Aljanabi, Z. Abbood and M.S. Mahdi, “SEEK Mobility Adaptive Protocol Destination Seeker Media Access Control Protocol for Mobile WSNs,” Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 1, pp. 130-145, 2023.

H. S. Salih, M. Ghazi and M. Aljanabi, “Implementing an Automated Inventory Management System for Small and Medium-sized Enterprises,” Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 2, pp. 238-244, 2023.

G. Subburayalu, H. Duraivelu, A. P. Raveendran, R. Arunachalam, D. Kongara and C. Thangavel, “Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier,” Journal of Applied Security Research, vol. 18, no. 3, pp. 402-420, 2023.

G. Perumal, G. Subburayalu, Q. Abbas, S. M. Naqi and I. Qureshi, “VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions,” Systems, vol. 11, no. 8, pp. 1-25, 2023.

P. Satyanarayana, G. Diwakar, B. V. Subbayamma, N. P. S. Kumar, M. Arun and S. Gopalakrishnan, “Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications,” Computer Communications, vol. 198, pp.262-281, 2023.

Downloads

Published

13.12.2023

How to Cite

Babu, R. S. ., & Radhika, K. . (2023). DDoS Attack Detection using Swarm Optimized Random Forest Classification. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 231–238. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4113

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.