A Novel Hybrid Intrusion Detection Framework Leveraging Machine Learning and Flower Pollination Optimization
DOI:
https://doi.org/10.29304/jqcsm.2024.16.31645Keywords:
Intrusion detection system, Machine learning, Feature selection, Flower Pollination Optimization (FPO) .Abstract
The exponential growth in technologies such as cloud computing, smart devices, virtualization, and the Internet of Things (IoT) has generated over four hundred zettabytes of network traffic data annually. This surge necessitates robust cybersecurity strategies to protect information from intrusions, which can result in significant financial losses. Reducing security risks requires the use of data analytics and machine learning to derive insights and make informed decisions based on network data. This study introduces the Flower Pollination Optimization (FPO) algorithm for feature selection to enhance the performance of several classifiers on the UNSW-NB15 dataset. We evaluated four classifiers: Linear Discriminant Analysis (LDA), Multi-Layer Perceptron (MLP), Quadratic Discriminant Analysis (QDA), and K-Nearest Neighbors (KNN) in two scenarios: without feature selection and with FPO-based feature selection. The results demonstrate significant improvements in classifier performance with FPO, with QDA achieving the highest accuracy of 99.16%. Comparative analysis with recent studies highlights the superior performance of our approach, setting a new benchmark in intrusion detection. This research underscores the essential role of effective feature selection in improving the accuracy and reliability of Intrusion Detection Systems (IDS), particularly in IoT environments.
Downloads
References
H. Liu and B. Lang, “Machine learning and deep learning methods for intrusion detection systems: A survey,” applied sciences, vol. 9, no. 20, p. 4396, 2019.
R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep learning approach for intelligent intrusion detection system,” Ieee Access, vol. 7, pp. 41525–41550, 2019.
M. Almseidin, M. Alzubi, S. Kovacs, and M. Alkasassbeh, “Evaluation of machine learning algorithms for intrusion detection system,” presented at the 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY), IEEE, 2017, pp. 000277–000282.
A. Aldweesh, A. Derhab, and A. Z. Emam, “Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Systems, vol. 189, p. 105124, 2020.
V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami, “An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset,” Cluster Computing, vol. 23, pp. 1397–1418, 2020.
T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj, “Anomaly-based intrusion detection system for IoT networks through deep learning model,” Computers and Electrical Engineering, vol. 99, p. 107810, 2022.
R. Abdulhammed, M. Faezipour, A. Abuzneid, and A. AbuMallouh, “Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic,” IEEE sensors letters, vol. 3, no. 1, pp. 1–4, 2018.
K. Psychogyios, A. Papadakis, S. Bourou, N. Nikolaou, A. Maniatis, and T. Zahariadis, “Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data,” Future Internet, vol. 16, no. 3, p. 73, 2024.
R. Tahri, A. Jarrar, A. Lasbahani, and Y. Balouki, “A comparative study of Machine learning Algorithms on the UNSW-NB 15 Dataset,” presented at the ITM Web of Conferences, EDP Sciences, 2022, p. 03002.
M. Belouch, S. El Hadaj, and M. Idhammad, “Performance evaluation of intrusion detection based on machine learning using Apache Spark,” Procedia Computer Science, vol. 127, pp. 1–6, 2018.
S. M. Kasongo and Y. Sun, “Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset,” Journal of Big Data, vol. 7, no. 1, p. 105, 2020.
D. Jing and H.-B. Chen, “SVM based network intrusion detection for the UNSW-NB15 dataset,” presented at the 2019 IEEE 13th international conference on ASIC (ASICON), IEEE, 2019, pp. 1–4.
L. Zhiqiang, G. Mohi-Ud-Din, L. Bing, L. Jianchao, Z. Ye, and L. Zhijun, “Modeling network intrusion detection system using feed-forward neural network using unsw-nb15 dataset,” presented at the 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), IEEE, 2019, pp. 299–303.
M. H. Kabir, M. S. Rajib, A. S. M. T. Rahman, M. M. Rahman, and S. K. Dey, “Network intrusion detection using unsw-nb15 dataset: Stacking machine learning based approach,” presented at the 2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE), IEEE, 2022, pp. 1–6.
Z. Chkirbene, S. Eltanbouly, M. Bashendy, N. AlNaimi, and A. Erbad, “Hybrid machine learning for network anomaly intrusion detection,” presented at the 2020 IEEE international conference on informatics, IoT, and enabling technologies (ICIoT), IEEE, 2020, pp. 163–170.
J. Gu and S. Lu, “An effective intrusion detection approach using SVM with naïve Bayes feature embedding,” Computers & Security, vol. 103, p. 102158, 2021.
S. Moualla, K. Khorzom, and A. Jafar, “Improving the Performance of Machine Learning‐Based Network Intrusion Detection Systems on the UNSW‐NB15 Dataset,” Computational Intelligence and Neuroscience, vol. 2021, no. 1, p. 5557577, 2021.
J. Sinha and M. Manollas, “Efficient deep CNN-BiLSTM model for network intrusion detection,” presented at the Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition, 2020, pp. 223–231.
J. Jose and D. V. Jose, “Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset,” International Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 1, pp. 1134–1141, 2023.
N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” presented at the 2015 military communications and information systems conference (MilCIS), IEEE, 2015, pp. 1–6.
A. Palanivinayagam and R. Damaševičius, “Effective handling of missing values in datasets for classification using machine learning methods,” Information, vol. 14, no. 2, p. 92, 2023.
M. Wu et al., “A fault detection method of electric vehicle battery through Hausdorff distance and modified Z-score for real-world data,” Journal of Energy Storage, vol. 60, p. 106561, 2023.
M. Noaman Kadhim, D. Al-Shammary, and F. Sufi, “A novel voice classification based on Gower distance for Parkinson disease detection,” International Journal of Medical Informatics, vol. 191, p. 105583, Nov. 2024, doi: 10.1016/j.ijmedinf.2024.105583.
D. Rodrigues, X.-S. Yang, A. N. De Souza, and J. P. Papa, “Binary flower pollination algorithm and its application to feature selection,” Recent advances in swarm intelligence and evolutionary computation, pp. 85–100, 2015.
M. N. Kadhim, A. H. Mutlag, and D. A. Hammood, “Multi-models Based on Yolov8 for Identification of Vehicle Type and License Plate Recognition,” presented at the National Conference on New Trends in Information and Communications Technology Applications, Springer, 2023, pp. 118–135.
D. Al-Shammary, M. N. Kadhim, A. M. Mahdi, A. Ibaida, and K. Ahmed, “Efficient ECG classification based on Chi-square distance for arrhythmia detection,” Journal of Electronic Science and Technology, vol. 22, no. 2, p. 100249, 2024.
S. More, M. Idrissi, H. Mahmoud, and A. T. Asyhari, “Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis,” Algorithms, vol. 17, no. 2, p. 64, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Shahad Ali Sameer, Hadeel Qassim Albaaj, Safa Jaber Abbas, Maryam Najeh Khalill, Areej Qassim
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.