The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems

Author:

Einy Sajad1ORCID,Oz Cemil1ORCID,Navaei Yahya Dorostkar2ORCID

Affiliation:

1. Computer Engineering Department, Sakarya University, Serdivan, Turkey

2. Computer and Information Technology Engineering, Qazvin Islamic Azad University, Qazvin, Iran

Abstract

With the expansion of communication in today’s world and the possibility of creating interactions between people through communication networks regardless of the distance dimension, the issue of creating security for the data and information exchanged has received much attention from researchers. Various methods have been proposed for this purpose; one of the most important methods is intrusion detection systems to quickly detect intrusions into the network and inform the manager or responsible people to carry out an operational set to reduce the amount of damage caused by these intruders. The main challenge of the proposed intrusion detection systems is the number of erroneous warning messages generated and the low percentage of accurate detection of intrusions in them. In this research, the Suricata IDS/IPS is deployed along with the NN model for the metaheuristic’s manual detection of malicious traffic in the targeted network. For the metaheuristic-based feature selection, the neural network, and the anomaly-based detection, the fuzzy logic is used in this research paper. The latest stable version of Kali Linux 2020.3 is used as an attacking system for web applications and different types of operating systems. The proposed method has achieved 96.111% accuracy for detecting network intrusion.

Publisher

Hindawi Limited

Subject

General Engineering,General Mathematics

Reference23 articles.

1. Feature selection technique for intrusion detection system based on iwd and aco;H. Farha;International Journal of Advanced Research in Computer Science,2017

2. A lightweight Anomaly detection model using SVM for WSNs in IoT through a hybrid feature selection algorithm based on GA and GWO;M. S. Azam Davahli;Journal of Computing and Security,2020

3. Improving intrusion detection system by developing feature selection model based on firefly algorithm and support vector machine;W. L. Al-Yaseen;IAENG International Journal of Computer Science,2019

4. A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer

5. A novel meta-heuristic-based sequential forward feature selection approach for anomaly detection systems;Z. X. Yukang Liu

Cited by 55 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3