Hybrid Ant Colony Optimization and Deep Learning for Anomaly Intrusion Detection

Authors

  • E. Sandhya Assistant Professor, Department of CSE (AI), Madanapalle Institute of Technology & Science, Andhra Pradesh, India.
  • R. Benschwartz Associate Professor, Department of Electronics and Communication Engineering, Mar Ephraem College of Engineering and Technology, Kanyakumari.
  • T. Sathiya Assistant Professor (Sr.G), Department of CSE, Sona College of Technology, Salem.
  • M. Sangeetha Associate Professor, Department of Computer Science and Engineering, Panimalar Engineering College, Chennai 600123, India.
  • K. Sreeramamurthy Professor, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Bowrampet, Hyderabad-500043, Telangana, India.
  • M. Preetha Professor & Head, Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College, Chennai.

Keywords:

anomaly Intrusion Detection, Deep Learning, Optimization, Ant Colony, NSLKDD

Abstract

Network security is now a major issue for every distributed system. A lot of risks are becoming harder to identify using antivirus and firewall software. Intrusion detection systems (IDSs) are used to find abnormalities in network traffic to increase security. Security-focused networks are known to be mostly consisting of intrusion detection systems. Determining whether incoming network traffic is abnormal or legitimate is the problem of network anomaly detection. The accuracy of intrusion detection statistics and false alarms of network intrusions resulting from a large amount of network data are among the issues with these kinds of security systems. In IDS, achieving high detection accuracy while minimizing training time is a major problem. However, they are managed inefficiently by the conventional IDS that are currently in effect. To solve these issues with network security, this study proposes IDS that depends on deep learning and hybrid optimization. The NSL-KDD dataset's optimal feature number is selected by the algorithm. Furthermore, this proposed system has combined feature selection with deep learning by using the Ant Colony Optimisation (ACO) algorithm to optimize factors for efficient dataset classification. The proposed approach performance has been evaluated on the current intrusion dataset as NSLKDD. Experimental results indicate that the proposed approach performs better than also achieves good accuracy in comparison to the other recent strategies in NSLKDD.

Downloads

Download data is not yet available.

References

Chkirbene, Z., Eltanbouly, S., Bashendy, M., AlNaimi, N., & Erbad, A. (2020, February). Hybrid machine learning for network anomaly intrusion detection. In 2020 IEEE international conference on informatics, IoT, and enabling technologies (ICIoT) (pp. 163-170). IEEE.

Al-Safi, A. H. S., Hani, Z. I. R., & Zahra, M. M. A. (2021). Using a hybrid algorithm and feature selection for network anomaly intrusion detection. J Mech Eng Res Dev, 44(4), 253-262.

Sarvari, S., Sani, N. F. M., Hanapi, Z. M., & Abdullah, M. T. (2020). An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access, 8, 70651-70663.

Aboueata, N., Alrasbi, S., Erbad, A., Kassler, A., & Bhamare, D. (2019, July). Supervised machine learning techniques for efficient network intrusion detection. In 2019 28th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-8). IEEE.

Kumari, A., & Mehta, A. K. (2020, October). A hybrid intrusion detection system based on decision tree and support vector machine. In 2020 IEEE 5th International conference on computing communication and automation (ICCCA) (pp. 396-400). IEEE.

Sarvari, S., Sani, N. F. M., Hanapi, Z. M., & Abdullah, M. T. (2020). An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access, 8, 70651-70663.

Dwivedi, S., Vardhan, M., Tripathi, S., & Shukla, A. K. (2020). Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evolutionary Intelligence, 13(1), 103-117.

Wilson, A. J., & Giriprasad, S. (2020). A Feature Selection Algorithm for Intrusion Detection System Based On New Meta-Heuristic Optimization. Journal of Soft Computing and Engineering Applications, 1(1).

Ghanem, W. A. H., Jantan, A., Ghaleb, S. A. A., & Nasser, A. B. (2020). An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons. IEEE Access, 8, 130452-130475.

Shukla, A. K. (2021). Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm. Neural Computing and Applications, 33(13), 7541-7561.

Syarif, I., Afandi, R. F., & Saputra, F. A. (2020, September). Feature selection algorithm for intrusion detection using cuckoo search algorithm. In 2020 International Electronics Symposium (IES) (pp. 430-435). IEEE.

Mazini, M., Shirazi, B., & Mahdavi, I. (2019). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University-Computer and Information Sciences, 31(4), 541-553.

Ghanem, W. A. H., & Jantan, A. (2016). Novel Multi-Objective Artificial Bee Colony Optimization for Wrapper Based Feature Selection in Intrusion Detection. International Journal of Advances in Soft Computing & Its Applications, 8(1).

Moayedikia, A., Ong, K. L., Boo, Y. L., Yeoh, W. G., & Jensen, R. (2017). Feature selection for high dimensional imbalanced class data using harmony search. Engineering Applications of Artificial Intelligence, 57, 38-49.

Vanitha, S., & Balasubramanie, P. (2023). Improved Ant Colony Optimization and Machine Learning Based Ensemble Intrusion Detection Model. Intelligent Automation & Soft Computing, 36(1).

Deng, W., Xu, J., & Zhao, H. (2019). An improved ant colony optimization algorithm based on hybrid strategies for scheduling problem. IEEE access, 7, 20281-20292.

Rivera, G., Coello, C. A. C., Cruz-Reyes, L., Fernandez, E. R., Gomez-Santillan, C., & Rangel-Valdez, N. (2022). Preference incorporation into many-objective optimization: an Ant colony algorithm based on interval outranking. Swarm and Evolutionary Computation, 69, 101024.

Ali, M., Deo, R. C., Xiang, Y., Prasad, R., Li, J., Farooque, A., & Yaseen, Z. M. (2022). Coupled online sequential extreme learning machine model with ant colony optimization algorithm for wheat yield prediction. Scientific Reports, 12(1), 5488.

Cabana, E., Lillo, R. E., & Laniado, H. (2021). Multivariate outlier detection based on a robust Mahalanobis distance with shrinkage estimators. Statistical papers, 62, 1583-1609.

Kannan, A. V. (2020). Intrusion Detection in Internet Of Things Using Ant Colony Optimisation. ICTACT Journal On Data Science And Machine Learning, 1(03).

Khan, M. A., Rehman, A., Khan, K. M., Al Ghamdi, M. A., & Almotiri, S. H. (2021). Enhance Intrusion Detection in Computer Networks Based on Deep Extreme Learning Machine. Computers, Materials & Continua, 66(1).

Abbas, S., Khan, M. A., Falcon-Morales, L. E., Rehman, A., Saeed, Y., Zareei, M., & Mohamed, E. M. (2020). Modeling, simulation and optimization of power plant energy sustainability for IoT enabled smart cities empowered with deep extreme learning machine. IEEE Access, 8, 39982-39997.

Rehman, A., Athar, A., Khan, M. A., Abbas, S., Fatima, A., & Saeed, A. (2020). Modelling, simulation, and optimization of diabetes type II prediction using deep extreme learning machine. Journal of Ambient Intelligence and Smart Environments, 12(2), 125-138.

Khan, M. A., Abbas, S., Khan, K. M., Al Ghamdi, M. A., & Rehman, A. (2020). Intelligent forecasting model of COVID-19 novel coronavirus outbreak empowered with deep extreme learning machine. Computers, Materials & Continua, 64(3), 1329-1342.

Downloads

Published

24.03.2024

How to Cite

Sandhya, E. ., Benschwartz, R. ., Sathiya, T. ., Sangeetha, M. ., Sreeramamurthy, K. ., & Preetha, M. . (2024). Hybrid Ant Colony Optimization and Deep Learning for Anomaly Intrusion Detection. International Journal of Intelligent Systems and Applications in Engineering, 12(19s), 873–881. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5329

Issue

Section

Research Article

Most read articles by the same author(s)