An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons

One of the most persistent challenges concerning network security is to build a model capable of detecting intrusions in network systems. The issue has been extensively addressed in uncountable researches and using various techniques, of which a commonly used technique is that based on detecting intrusions in contrast to normal network traffic and the classification of network packets as either normal or abnormal. However, the problem of improving the accuracy and efficiency of classification models remains open and yet to be resolved. This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. At first the model selects the suitable biases and weights utilizing a hybrid (ABC) and (DA). Next, the neural network is retrained using these ideal values in order for the intrusion detection model to be able to recognize new attacks. Ten other metaheuristic algorithms were adapted to train the neural network and their performances were compared with that of the proposed model. In addition, four types of intrusion detection evaluation datasets were applied to evaluate the proposed model in comparison to the others. The results of our experiments have demonstrated a significant improvement in inefficient network intrusion detection over other classification methods.

[1]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[2]  Georgios Kambourakis,et al.  Dendron : Genetic trees driven rule induction for network intrusion detection systems , 2018, Future Gener. Comput. Syst..

[3]  Ruzhi Xu,et al.  Research intrusion detection based PSO-RBF classifier , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.

[4]  Hongyu Yang,et al.  Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network , 2019, IEEE Access.

[5]  D.R. Hush,et al.  Progress in supervised neural networks , 1993, IEEE Signal Processing Magazine.

[6]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[7]  A. Jantan,et al.  NEW APPROACH TO IMPROVE ANOMALY DETECTION USING A NEURAL NETWORK OPTIMIZED BY HYBRID ABC AND PSO ALGORITHMS , 2018 .

[8]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[9]  Aman Jantan,et al.  Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization , 2019, Neural Processing Letters.

[10]  Hamid H. Jebur,et al.  Identifying Generic Features of KDD Cup 1999 for Intrusion Detection , 2015 .

[11]  Jasmin Kevric,et al.  An effective combining classifier approach using tree algorithms for network intrusion detection , 2017, Neural Computing and Applications.

[12]  Alyani Ismail,et al.  A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization , 2018, IEEE Access.

[13]  Shie-Jue Lee,et al.  Network intrusion detection using equality constrained-optimization-based extreme learning machines , 2018, Knowl. Based Syst..

[14]  Hongjun Lu,et al.  Effective Data Mining Using Neural Networks , 1996, IEEE Trans. Knowl. Data Eng..

[15]  Tian Wang,et al.  Improved BP Neural Network for Intrusion Detection Based on AFSA , 2015 .

[16]  Seref Sagiroglu,et al.  Big data analytics for network anomaly detection from netflow data , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).

[17]  Aman Jantan,et al.  A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons , 2018, Cognitive Computation.

[18]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[19]  Mohiuddin Ahmed,et al.  A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..

[20]  Wooseong Kim,et al.  1D CNN based network intrusion detection with normalization on imbalanced data , 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).

[21]  Seyedali Mirjalili,et al.  Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems , 2015, Neural Computing and Applications.

[22]  Bahari Belaton,et al.  Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework , 2013, 2013 IEEE International Conference on Control System, Computing and Engineering.

[23]  Rui Zhang,et al.  Model of the intrusion detection system based on the integration of spatial-temporal features , 2020, Comput. Secur..

[24]  Teresa Bernarda Ludermir,et al.  Hybrid Training of Feed-Forward Neural Networks with Particle Swarm Optimization , 2006, ICONIP.

[25]  Georgios Kambourakis,et al.  Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..

[26]  Xiangliang Zhang,et al.  Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data , 2006, Comput. Secur..

[27]  Haitao Li,et al.  Research on prediction of traffic flow based on dynamic fuzzy neural networks , 2015, Neural Computing and Applications.

[28]  Ahmad Sharieh,et al.  A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer , 2020 .

[29]  A. Jantan,et al.  USING MODIFIED BAT ALGORITHM TO TRAIN NEURAL NETWORKS FOR SPAM DETECTION 1 , 2017 .

[30]  Guifa Teng,et al.  Unsupervised SVM Based on p-kernels for Anomaly Detection , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[31]  Mansour Sheikhan,et al.  Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network , 2012, Neural Computing and Applications.

[32]  Dervis Karaboga,et al.  Artificial Bee Colony (ABC) Optimization Algorithm for Training Feed-Forward Neural Networks , 2007, MDAI.

[33]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[34]  Iraj Mahdavi,et al.  Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms , 2019, J. King Saud Univ. Comput. Inf. Sci..

[35]  Mehdi MORADI,et al.  A Neural Network Based System for Intrusion Detection and Classification of Attacks , 2004 .

[36]  Kun-Lin Tsai,et al.  An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques , 2017, IEEE Systems Journal.

[37]  Taeshik Shon,et al.  A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..

[38]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[39]  Mahmod S. Mahmod,et al.  A COMPARISON STUDY FOR INTRUSION DATABASE (KDD99, NSL-KDD) BASED ON SELF ORGANIZATION MAP (SOM) ARTIFICIAL NEURAL NETWORK , 2013 .

[40]  Zhen Li,et al.  TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[41]  Carlos García Garino,et al.  An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..

[42]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[43]  Tomasz Imielinski,et al.  Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..

[44]  Li Zhang,et al.  A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks , 2016, Neural Computing and Applications.

[45]  A. Jantan,et al.  USING HYBRID ARTIFICIAL BEE COLONY ALGORITHM AND PARTICLE SWARM OPTIMIZATION FOR TRAINING FEED-FORWARD NEURAL NETWORKS , 2014 .

[46]  Hao Yu,et al.  Distributed-neuron-network based machine learning on smart-gateway network towards real-time indoor data analytics , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[47]  Arputharaj Kannan,et al.  Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.

[48]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[49]  Chunlin Zhang,et al.  Comparison of BPL and RBF Network in Intrusion Detection System , 2003, RSFDGrC.

[50]  Aman Jantan,et al.  A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm , 2019, Neural Computing and Applications.

[51]  Bart Baesens,et al.  Editorial survey: swarm intelligence for data mining , 2010, Machine Learning.

[52]  Chunying Zhang,et al.  Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network , 2019, IEEE Access.

[53]  WenJie Tian,et al.  Network intrusion detection analysis with neural network and particle swarm optimization algorithm , 2010, 2010 Chinese Control and Decision Conference.

[54]  Mohamed S. Kamel,et al.  RBF-based real-time hierarchical intrusion detection systems , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[55]  R Vinayakumar,et al.  Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network , 2019, Internet Technol. Lett..

[56]  Yi Zeng,et al.  $Deep-Full-Range$ : A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework , 2019, IEEE Access.

[57]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[58]  Ge Yu,et al.  Method of evolutionary neural network-based intrusion detection , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).

[59]  Kishan G. Mehrotra,et al.  Elements of artificial neural networks , 1996 .

[60]  Christian Blum,et al.  An ant colony optimization algorithm for continuous optimization: application to feed-forward neural network training , 2007, Neural Computing and Applications.

[61]  Hong Shen,et al.  Online training of SVMs for real-time intrusion detection , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[62]  Aman Jantan,et al.  Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition , 2019, IEEE Access.

[63]  Dedy Dwi Prastyo,et al.  Robust adaptive multivariate Hotelling's T2 control chart based on kernel density estimation for intrusion detection system , 2020, Expert Syst. Appl..

[64]  Baha Rababah,et al.  Hybrid Model For Intrusion Detection Systems , 2020, ArXiv.

[65]  Lan Shi,et al.  PCA-PSO-BP Neural Network Application in IDS , 2015 .

[66]  Mohammad Javad Golkar,et al.  A hybrid method consisting of GA and SVM for intrusion detection system , 2016, Neural Computing and Applications.

[67]  Lu Lv,et al.  A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine , 2020, Knowl. Based Syst..

[68]  Gulshan Kumar,et al.  A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks , 2015, Intelligent Methods for Cyber Warfare.

[69]  Dervis Karaboga,et al.  Hybrid Artificial Bee Colony algorithm for neural network training , 2011, 2011 IEEE Congress of Evolutionary Computation (CEC).

[70]  Anazida Zainal,et al.  Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection , 2007, ICCSA.

[71]  X. Yao Evolving Artificial Neural Networks , 1999 .

[72]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[73]  Václav Snásel,et al.  Metaheuristic design of feedforward neural networks: A review of two decades of research , 2017, Eng. Appl. Artif. Intell..

[74]  Jill Slay,et al.  The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems , 2015, 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

[75]  Jill Slay,et al.  The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..

[76]  Raimo Kantola,et al.  Performance Evaluation of a Combined Anomaly Detection Platform , 2019, IEEE Access.