Crow-AFL: Crow Based Adaptive Fractional Lion Optimization Approach for the Intrusion Detection

Intrusion detection has played a major role in ensuring the cybersecurity in various networks. Literature works deal with several cyber attacks in the data through designing various supervised approaches, but have not considered the size of the database during the optimization. Since, the data increases in size exponentially, it is necessary to cluster the database before detecting the presence of an intruder in the system. This work has considered these challenges and thus, has introduced a Crow based Adaptive Fractional Lion (Crow-AFL) optimization approach. The proposed intrusion detection system clusters the database into several groups with the Crow-AFL and detects the presence of intrusion in the clusters with the use of the HSDT classifier. Then, the compact data is provided to the deep belief network trained with Crow-AFL for identifying the presence of intrusion in the entire database. The simulation of the proposed Crow-AFL algorithm is done with the DARPA’s KDD cup dataset 1999. The metrics, accuracy, TPR, and TNR, measure the performance of the proposed Crow-AFL algorithm, and it has shown better performance with the value of 96%, 95%, and 96%, respectively.

[1]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[2]  Siyang Zhang,et al.  A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..

[3]  Francesco Sergio Pisani,et al.  Evolving meta-ensemble of classifiers for handling incomplete and unbalanced datasets in the cyber security domain , 2016, Appl. Soft Comput..

[4]  Vijay Kumar Jha,et al.  Fuzzy min–max neural network and particle swarm optimization based intrusion detection system , 2017 .

[5]  Hossam Faris,et al.  Optimizing connection weights in neural networks using the whale optimization algorithm , 2016, Soft Computing.

[6]  Hongyu Yang,et al.  Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network , 2019, IEEE Access.

[7]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[8]  Samarjeet B. Powalkar,et al.  Fast face recognition based on Wavelet Transform on PCA , 2015, 2015 International Conference on Energy Systems and Applications.

[9]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[10]  V. S. Shankar Sriram,et al.  An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine , 2017, Knowl. Based Syst..

[11]  V. M. Thakare,et al.  Silhouette based human fall detection using multimodal classifiers for content based video retrieval systems , 2017, 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).

[12]  E. Sreenivasa Reddy,et al.  FTDT: Rough set integrated functional tangent decision tree for finding the status of aqua pond in aquaculture , 2017, J. Intell. Fuzzy Syst..

[13]  Shailendra Singh,et al.  An IWD-based feature selection method for intrusion detection system , 2017, Soft Computing.

[14]  Alireza Askarzadeh,et al.  A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm , 2016 .

[15]  Qingsheng Zhu,et al.  A novel outlier cluster detection algorithm without top-n parameter , 2017, Knowl. Based Syst..

[16]  Jie Gu,et al.  An effective intrusion detection framework based on SVM with feature augmentation , 2017, Knowl. Based Syst..

[17]  Seyed Mojtaba Hosseini Bamakan,et al.  An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.

[18]  Mohammad Abdollahi Azgomi,et al.  A game-theoretic approach to model and quantify the security of cyber-physical systems , 2017, Comput. Ind..

[19]  Sanjay Silakari,et al.  A Survey of Cyber Attack Detection Systems , 2009 .

[20]  Sanjeev Jain,et al.  Implementation of Intrusion Detection System using Adaptive Neuro-Fuzzy Inference System for 5G wireless communication network , 2017 .

[21]  P. Vijaya,et al.  Multi kernel and dynamic fractional lion optimization algorithm for data clustering , 2017 .

[22]  Yongli Zhao,et al.  Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks , 2017 .

[23]  Ing-Ray Chen,et al.  On Survivability of Mobile Cyber Physical Systems with Intrusion Detection , 2012, Wireless Personal Communications.

[24]  Gholamhossein Dastghaibyfard,et al.  Two-tier network anomaly detection model: a machine learning approach , 2017, Journal of Intelligent Information Systems.

[25]  Li Jing,et al.  Network Intrusion Detection Method Based on Relevance Deep Learning , 2016, 2016 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS).

[26]  Kamel Adi,et al.  An auto-learning approach for network intrusion detection , 2018, Telecommun. Syst..

[27]  Kannapiran Balasubramanian,et al.  A Novel LWCSO-PKM-Based Feature Optimization and Classification of Attack Types in SCADA Network , 2017, Arabian Journal for Science and Engineering.

[28]  Dechang Pi,et al.  HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems , 2019, IEEE Access.

[29]  Cleotilde Gonzalez,et al.  Effects of cyber security knowledge on attack detection , 2015, Comput. Hum. Behav..

[30]  Jong Hyuk Park,et al.  DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks , 2015, The Journal of Supercomputing.

[31]  V. S. Shankar Sriram,et al.  A Hypergraph and Arithmetic Residue-based Probabilistic Neural Network for classification in Intrusion Detection Systems , 2017, Neural Networks.

[32]  Young B. Moon,et al.  Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2017, Journal of Intelligent Manufacturing.