Bio-Inspired Metaheuristic Algorithm for Network Intrusion Detection System of Architecture

Author:

Parvathala Balakesava Reddy1,Manikandan A.2ORCID,Vijayalakshmi P.3,Muzammil Parvez M.4,Harihara Gopalan S.5ORCID,Ramalingam S.6

Affiliation:

1. Vallurupalli Nageswara Rao Vignana Jyothi Institute of Engineering and Technology, India

2. SRM Institute of Science and Technology, India

3. Knowledge Institute of Technology, Salem, India

4. Koneru Lakshmaiah Education Foundation, India

5. Sri Ramakrishna Engineering College, India

6. Sri Eshwar College of Engineering, India

Abstract

By identifying different kinds of attacks and application misuse that firewalls normally aren't able to identify, network intrusion detection systems (IDS) are intended to keep computer networks safe. When creating a network intrusion detection system, feature selection techniques are crucial. Several bionic meta-heuristic algorithms are used to quickly categorize network traffic as problematic or normal, then decrease features to demonstrate higher accuracy. Thus, in order to detect frequent attacks, this research proposes a hybrid model of network intrusion detection system (IDS) based on an algorithm inspired by a hybrid bionic element. There are two goals for the suggested model. The first step is to minimize the number of features that are chosen in Network IDS. By combining biosensing metaheuristics with hybrid models, this objective is accomplished. The algorithms used in this chapter are particle swarm optimization (PSO), multiverse optimizer (MVO), grey wolf optimization (GWO), moth flame optimization (MFO), firefly algorithm (FFA), whale optimization algorithm (WOA), bat algorithm (BAT), genetic bee colony (GBC) algorithm, artificial bee colony algorithm (ABC), fish swarm algorithm (FSA), cat swarm optimization (CSO), artificial algae algorithm (AAA), elephant herd optimization (EHO), cuckoo search optimization algorithm (CSOA), lion optimization algorithm (LOA), and cuttlefish algorithm (CFA) algorithm. Using machine learning classifiers, the second objective is to identify frequent attacks. SVM (support vector machine), C4.5 (J48) decision trees, and RF (random forest) classifiers are used to accomplish this purpose. Thus, the goal of the suggested model is to pinpoint frequent attacks. The data indicates that J48 is the top classifier when it comes to model building time when compared to SVM and RF. The data indicates that when it came to feature reduction for classification, the MVO-BAT model decreased the features to 24, whereas the MFO-WOA and FFA-GWO models lowered the accuracy, sensitivity, and F-measure of all features to 15. The accuracy, sensitivity, and F-measure of each feature are the same for every classifier.

Publisher

IGI Global

Reference30 articles.

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3