NIDS-ML-PSO: Network Intrusion Detection System based on Machine Learning Classifiers and Particle Swarm Optimization
DOI:
https://doi.org/10.29304/jqcsm.2024.16.41787Keywords:
Network intrusion detection systems (NIDs), Machine learning classifier, Feature selection, Network security, Particle Swarm Optimization (PSO)Abstract
As cyber threats continue to escalate with the rapid growth of internet usage, robust intrusion detection systems (IDSs) are essential for safeguarding network infrastructures. This study proposes an enhanced intrusion detection approach using the NSL-KDD dataset, where particle swarm optimization (PSO) is employed for feature selection to optimize machine learning classifier performance. PSO effectively reduces data dimensionality by identifying the most relevant features, improving computational efficiency and detection accuracy. Four machine learning classifiers, such as support vector machine (SVM), decision tree (DT), extra trees (ET), and random forest (RF), are evaluated with and without PSO to assess its impact. Experimental results demonstrate that PSO-based feature selection significantly improves performance, with RF achieving the highest accuracy of 98.33%. Comparative analysis with recent studies highlights the competitive advantage of the proposed method. The study concludes by identifying limitations and proposing future work, including exploring alternative feature selection techniques such as Genetic Algorithm (GA), Bat Algorithm (BA), and Cuckoo Search (CS) to further enhance IDS effectiveness.
Downloads
References
S. Zavrak and M. Iskefiyeli, “Anomaly-based intrusion detection from network flow features using variational autoencoder,” IEEE Access, vol. 8, pp. 108346–108358, 2020.
T. Kim and W. Pak, “Early detection of network intrusions using a GAN-based one-class classifier,” IEEE Access, vol. 10, pp. 119357–119367, 2022.
S. U. Jan, S. Ahmed, V. Shakhov, and I. Koo, “Toward a lightweight intrusion detection system for the internet of things,” IEEE access, vol. 7, pp. 42450–42471, 2019.
P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A detailed investigation and analysis of using machine learning techniques for intrusion detection,” IEEE communications surveys & tutorials, vol. 21, no. 1, pp. 686–728, 2018.
V. Hnamte, H. Nhung-Nguyen, J. Hussain, and Y. Hwa-Kim, “A novel two-stage deep learning model for network intrusion detection: LSTM-AE,” Ieee Access, vol. 11, pp. 37131–37148, 2023.
P. Sun et al., “DL‐IDS: Extracting Features Using CNN‐LSTM Hybrid Network for Intrusion Detection System,” Security and communication networks, vol. 2020, no. 1, p. 8890306, 2020.
M. Samadi Bonab, A. Ghaffari, F. Soleimanian Gharehchopogh, and P. Alemi, “A wrapper‐based feature selection for improving performance of intrusion detection systems,” International Journal of Communication Systems, vol. 33, no. 12, p. e4434, 2020.
T. Vaiyapuri and A. Binbusayyis, “Application of deep autoencoder as an one-class classifier for unsupervised network intrusion detection: a comparative evaluation,” PeerJ Computer Science, vol. 6, p. e327, 2020.
B. Min, J. Yoo, S. Kim, D. Shin, and D. Shin, “Network anomaly detection using memory-augmented deep autoencoder,” IEEE Access, vol. 9, pp. 104695–104706, 2021.
A. K. Pandey, P. Singh, D. Jain, A. K. Sharma, A. Jain, and A. Gupta, “Generative Adversarial Network and Bayesian Optimization in Multi-class Support Vector Machine for Intrusion Detection System,” Int. J. Intell. Eng. Syst, vol. 16, pp. 110–119, 2023.
V. Kumar and D. Sinha, “Synthetic attack data generation model applying generative adversarial network for intrusion detection,” Computers & Security, vol. 125, p. 103054, 2023.
L. Elmoiz Alatabani, E. Sayed Ali, R. A. Mokhtar, R. A. Saeed, H. Alhumyani, and M. Kamrul Hasan, “Deep and Reinforcement Learning Technologies on Internet of Vehicle (IoV) Applications: Current Issues and Future Trends,” Journal of Advanced Transportation, vol. 2022, no. 1, p. 1947886, 2022.
H. Attou et al., “Towards an intelligent intrusion detection system to detect malicious activities in cloud computing,” Applied Sciences, vol. 13, no. 17, p. 9588, 2023.
M. A. Hossain and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning,” Array, vol. 19, p. 100306, 2023.
A. John, I. F. B. Isnin, S. H. H. Madni, and F. B. Muchtar, “Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm,” Intelligent Systems with Applications, vol. 24, p. 200442, 2024.
Y. Yang, Y. Gu, and Y. Yan, “Machine learning-based intrusion detection for rare-class network attacks,” Electronics, vol. 12, no. 18, p. 3911, 2023.
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” presented at the 2009 IEEE symposium on computational intelligence for security and defense applications, Ieee, 2009, pp. 1–6.
M. N. Kadhim, D. Al-Shammary, and F. Sufi, “A novel voice classification based on Gower distance for Parkinson disease detection,” International Journal of Medical Informatics, vol. 191, p. 105583, 2024.
D. Al-Shammary, M. N. Kadhim, A. M. Mahdi, A. Ibaida, and K. Ahmed, “Efficient ECG classification based on Chi-square distance for arrhythmia detection,” Journal of Electronic Science and Technology, vol. 22, no. 2, p. 100249, 2024.
M. Sadiq, M. N. Kadhim, D. Al-Shammary, and M. Milanova, “Novel EEG Classification based on Hellinger Distance for Seizure Epilepsy Detection,” IEEE Access, 2024.
D. Bratton and J. Kennedy, “Defining a standard for particle swarm optimization,” presented at the 2007 IEEE swarm intelligence symposium, IEEE, 2007, pp. 120–127.
M. Y. Hassan, A. H. Najim, K. A. Al-Sharhanee, M. N. Kadhim, N. F. Soliman, and A. D. Algarni, “A Hybrid Cuckoo Search-K-means Model for Enhanced Intrusion Detection in Internet of Things,” 2024.
M. N. Kadhim, A. H. Mutlag, and D. A. Hammood, “Vehicle detection and classification from images/videos using deep learning architectures: A survey,” presented at the AIP Conference Proceedings, AIP Publishing, 2024.
M. N. Kadhim, A. H. Mutlag, and D. A. Hammood, “Multi-models Based on Yolov8 for Identification of Vehicle Type and License Plate Recognition,” presented at the National Conference on New Trends in Information and Communications Technology Applications, Springer, 2023, pp. 118–135.
A. Hussein, A. T. Abdulameer, A. Abdulkarim, H. Husni, and D. Al-Ubaidi, “Classification of Dyslexia Among School Students Using Deep Learning,” Journal of Techniques, vol. 6, no. 1, pp. 85–92, Mar. 2024, doi: 10.51173/JT.V6I1.1893.
N. N. Ali, A. Hameed, A. G. Perera, and A. Al_Naji, “Custom YOLO Object Detection Model for COVID-19 Diagnosis,” Journal of Techniques, vol. 5, no. 3, pp. 92–100, Sep. 2023, doi: 10.51173/JT.V5I3.1174.
A. S. Amsalam, A. Al-Naji, A. Y. Daeef, and J. Chahl, “Computer Vision System for Facial Palsy Detection,” Journal of Techniques, vol. 5, no. 1, pp. 44–51, Mar. 2023, doi: 10.51173/JT.V5I1.1133.
S. I. Ibrahim, D. A. Hammood, and L. H. Abed, “Unconstrained face identification using machine learning classification,” AIP Conf Proc, vol. 3232, no. 1, Oct. 2024, doi: 10.1063/5.0236373/3316643.
A. D. Vibhute, C. H. Patil, A. V. Mane, and K. V. Kale, “Towards detection of network anomalies using machine learning algorithms on the NSL-KDD benchmark datasets,” Procedia Computer Science, vol. 233, pp. 960–969, 2024.
A. Shiravani, M. H. Sadreddini, and H. N. Nahook, “Network intrusion detection using data dimensions reduction techniques,” Journal of Big Data, vol. 10, no. 1, p. 27, 2023.
S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Computer Communications, vol. 199, pp. 113–125, 2023.
F. Türk, “Analysis of intrusion detection systems in UNSW-NB15 and NSL-KDD datasets with machine learning algorithms,” Bitlis Eren Üniversitesi Fen Bilimleri Dergisi, vol. 12, no. 2, pp. 465–477, 2023.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Waseem Ghazi Mahdi, Dalal Abdulmohsin Hammood, Leith Hamid Abed, Shahad Ali Sameer
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.