Levy Flight – Pelican Optimization Algorithm Based Refined Long Short-Term Memory for Network Intrusion Detection System

Authors

  • Valavan Woothukadu Thirumaran Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research (BIHER), Chennai, India
  • Nalini Joseph Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research (BIHER), Chennai, India
  • Umarani Srikanth Department of Computer Science and Engineering, Panimalar Engineering College, Chennai, India

Keywords:

Intrusion Detection System, Levy Flight, Pelican Optimization Algorithm, Refined Long Short-Term Memory and Security

Abstract

Intrusion Detection System (IDS) is a method of observing and tracking events on computer systems, which is utilized for identifying signs of security problems and activities monitored by event-based methods and security data. Network IDS (NIDS) is performed intrusion detection by partial packet data of fixed size, but the existing methods suffer to maximize the detection rate and reduce the false alarm rate. In this research, a Levy Flight – Pelican Optimization Algorithm (LF-POA) based Refined Long Short-Term Memory (RLSTM) is proposed for network intrusion detection. The datasets used for evaluating the proposed method are CIC-IDS 2017, UNSW-NB15, NSL-KDD and Bot-IoT. One-Hot encoding and min-max normalization methods are used as pre-processing techniques, while the feature selection process is performed by POA which is enhanced by Levy flight. The RLSTM method is used for classifying the intrusion as normal or attack. The performance of the proposed technique is analyzed on the basis of accuracy, precision, recall, f1-score, detection rate and false alarm rate. The proposed method attains a detection rate of 99.75%, 95.31%, 98.25% and 93.94% on CIC-IDS 2017, UNSW-NB15, NSL-KDD and Bot-IoT datasets, respectively. The proposed technique performs better than other existing techniques like Convolutional Neural Network – Long Short-Term Memory (CNN-LSTM) and AdaBoost based method.

Downloads

Download data is not yet available.

References

M. Chalé and N. D. Bastian, “Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems,” Expert Syst. Appl., vol. 207, p. 117936, Nov. 2022, https://doi.org/10.1016/j.eswa.2022.117936.

N. Wang, Y. Chen, Y. Xiao, Y. Hu, W. Lou, and Y. T. Hou, “Manda: On adversarial example detection for network intrusion detection system,” IEEE Trans. Dependable Secure Comput., vol. 20, no. 2, pp. 1139-1153, Feb. 2023, doi: 10.1109/TDSC.2022.3148990.

J. Mijalkovic and A. Spognardi, “Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems,” Algorithms, vol. 15, p. 258, Jul. 2022, https://doi.org/10.3390/a15080258.

S. Shitharth, P. R. Kshirsagar, P. K. Balachandran, K. H. Alyoubi, and A. O. Khadidos, “An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system,” IEEE Access, vol. 10, pp. 46424-46441, May 2022, doi: 10.1109/ACCESS.2022.3171660.

E. U. H. Qazi, M. H. Faheem, and T. Zia, “HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System,” Applied Sciences, vol. 13, p. 4921, Apr. 2023, https://doi.org/10.3390/app13084921.

M. B. Umair, Z. Iqbal, M. A. Faraz, M. A. Khan, Y. D. Zhang, N. Razmjooy, and S. Kadry, “A network intrusion detection system using hybrid multilayer deep learning model,” Big data, Jun. 2022, https://doi.org/10.1089/big.2021.0268.

V. Ravi, R. Chaganti, and M. Alazab, “Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system,” Comput. Electr. Eng., vol. 102, p. 108156, Sep. 2022, https://doi.org/10.1016/j.compeleceng.2022.108156.

S. Mohamed and R. Ejbali, “Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system,” Int. J. Inf. Secur., vol. 22, no. 1, pp. 235-247, Feb. 2023, https://doi.org/10.1007/s10207-022-00634-2.

H. Alazzam, A. Sharieh, and K. E. Sabri, “A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer,” Appl. Intell., vol. 52, no. 4, pp. 3527-3544, Apr. 2023, https://doi.org/10.3390/s23084141.

H. Asad and I. Gashi, ‘Dynamical analysis of diversity in rule-based open source network intrusion detection systems,” Empirical Software Eng., vol. 27, p. 4, Jan. 2022, https://doi.org/10.1007/s10664-021-10046-w.

X. H. Nguyen, X. D. Nguyen, H. H. Huynh, and K. H. Le, “Realguard: A lightweight network intrusion detection system for IoT gateways,” Sensors, 22(2), p.432, Jan. 2022, https://doi.org/10.3390/s22020432.

D. N. Mhawi, A. Aldallal, and S. Hassan, “Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems,” Symmetry, vol. 14, no. 7, p. 1461, Jul. 2022, https://doi.org/10.3390/sym14071461.

C. Zhang, X. Costa-Perez, and P. Patras, “Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms,” IEEE/ACM Trans. Networking, vol. 30, no. 3, pp. 1294-1311, Jan. 2022, doi: 10.1109/TNET.2021.3137084.

M. A. Haq, M. A. Rahim Khan, and T. AL-Harbi, “Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing,” CMC-Comput. Mater. Continua, vol. 71, no. 1, pp. 1769-1788, Apr. 2022, https://doi.org/10.32604/cmc.2022.018708.

M. Mehmood, T. Javed, J. Nebhen, S. Abbas, R. Abid, G. R. Bojja, and M. Rizwan, “A hybrid approach for network intrusion detection,” CMC-Comput. Mater. Continua, vol. 70, no. 1, pp. 91-107, Jan. 2022, https://doi.org/10.32604/cmc.2022.019127.

T. Sommestad, H. Holm, and D. Steinvall, “Variables influencing the effectiveness of signature-based network intrusion detection systems,” Inf. Secur. J.: Global Perspect., vol. 31, no. 6, pp. 711-728, Nov. 2022, https://doi.org/10.1080/19393555.2021.1975853.

A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, “CNN-LSTM: hybrid deep neural network for network intrusion detection system,” IEEE Access, vol. 10, pp. 99837-99849, Sep. 2022, doi: 10.1109/ACCESS.2022.3206425.

I. Ahmad, Q. E. Ul Haq, M. Imran, M. O. Alassafi, and R. A. AlGhamdi, “An efficient network intrusion detection and classification system,” Mathematics, vol. 10, no. 3, p. 530, Feb. 2022, https://doi.org/10.3390/math10030530.

C. Park, J. Lee, Y. Kim, J. G. Park, H. Kim, and D. Hong, “An enhanced ai-based network intrusion detection system using generative adversarial networks,” IEEE Internet Things J., vol. 10, no. 3, pp. 2330-2345, Oct. 2022, doi: 10.1109/JIOT.2022.3211346.

N. O. Aljehane, H. A. Mengash, M. M. Eltahir, F. A. Alotaibi, S. S. Aljameel, A. Yafoz, R. Alsini, and M. Assiri, “Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security,” Alexandria Eng. J., vol. 86, pp. 415-424, Jan. 2024, https://doi.org/10.1016/j.aej.2023.11.078.

E. Osa, P. E. Orukpe, and U. Iruansi, “Design and implementation of a deep neural network approach for intrusion detection systems,” e-Prime-Advances in Electrical Engineering, Electronics and Energy, vol. 7, p. 100434, Mar. 2024, https://doi.org/10.1016/j.prime.2024.100434.

A. Biju and S. W. Franklin, “Evaluated bird swarm optimization based on deep belief network (EBSO-DBN) classification technique for IOT network intrusion detection,” Automatika, vol. 65, no. 1, pp. 108-116, Jan. 2024, https://doi.org/10.1080/00051144.2023.2269646.

J. Han and W. Pak, “Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification,” Applied Sciences, vol. 13, no. 5, p. 3089, Feb. 2023, https://doi.org/10.3390/app13053089.

CIC-IDS 2017 dataset: https://www.kaggle.com/datasets/cicdataset/cicids2017/data

UNSW-NB15 dataset: https://research.unsw.edu.au/projects/unsw-nb15-dataset

NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd

Bot-IoT dataset: https://research.unsw.edu.au/projects/bot-iot-dataset

Downloads

Published

24.03.2024

How to Cite

Thirumaran, V. W. ., Joseph, N. ., & Srikanth, U. . (2024). Levy Flight – Pelican Optimization Algorithm Based Refined Long Short-Term Memory for Network Intrusion Detection System. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 278–287. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5250

Issue

Section

Research Article