Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System
Received: 27 March 2021 | Revised: 8 April 2021 | Accepted: 17 April 2021 | Online: 12 June 2021
Corresponding author: D. K. Singh
Keeping computer reliability to confirm reliable, secure, and truthful correspondence of data between different enterprises is a major security issue. Ensuring information correspondence over the web or computer grids is always under threat of hackers or intruders. Many techniques have been utilized in intrusion detections, but all have flaws. In this paper, a new hybrid technique is proposed, which combines the Ensemble of Feature Selection (EFS) algorithm and Teaching Learning-Based Optimization (TLBO) techniques. In the proposed, EFS-TLBO method, the EFS strategy is applied to rank the features for choosing the ideal best subset of applicable information, and the TLBO is utilized to identify the most important features from the produced datasets. The TLBO algorithm uses the Extreme Learning Machine (ELM) to choose the most effective attributes and to enhance classification accuracy. The performance of the recommended technique is evaluated in a benchmark dataset. The experimental outcomes depict that the proposed model has high predictive accuracy, detection rate, false-positive rate, and requires less significant attributes than other techniques known from the literature.
Keywords:classification, feature selection, teaching learning-based optimization, intrusion detection
A. Praseed and P. S. Thilagam, "DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications," IEEE Communications Surveys Tutorials, vol. 21, no. 1, pp. 661–685, Firstquarter 2019. DOI: https://doi.org/10.1109/COMST.2018.2870658
S. Pontarelli, G. Bianchi, and S. Teofili, "Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System," IEEE Transactions on Computers, vol. 62, no. 11, pp. 2322–2334, Nov. 2013. DOI: https://doi.org/10.1109/TC.2012.105
N. Fallahi, A. Sami, and M. Tajbakhsh, "Automated flow-based rule generation for network intrusion detection systems," in 24th Iranian Conference on Electrical Engineering, Shiraz, Iran, May 2016, pp. 1948–1953. DOI: https://doi.org/10.1109/IranianCEE.2016.7585840
Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, "A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 447–456, Feb. 2014. DOI: https://doi.org/10.1109/TPDS.2013.146
Y. Wang, W. Meng, W. Li, J. Li, W.-X. Liu, and Y. Xiang, "A fog-based privacy-preserving approach for distributed signature-based intrusion detection," Journal of Parallel and Distributed Computing, vol. 122, pp. 26–35, Dec. 2018. DOI: https://doi.org/10.1016/j.jpdc.2018.07.013
S. A. Medjahed, T. A. Saadi, A. Benyettou, and M. Ouali, "Kernel-based learning and feature selection analysis for cancer diagnosis," Applied Soft Computing, vol. 51, pp. 39–48, Feb. 2017. DOI: https://doi.org/10.1016/j.asoc.2016.12.010
A. K. Shukla and P. Singh, "Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection," International Journal of Information Security and Privacy, vol. 13, no. 3, pp. 31–47, 2019. DOI: https://doi.org/10.4018/IJISP.201907010102
T. F. Ghanem, W. S. Elkilani, and H. M. Abdul-kader, "A hybrid approach for efficient anomaly detection using metaheuristic methods," Journal of Advanced Research, vol. 6, no. 4, pp. 609–619, Jul. 2015. DOI: https://doi.org/10.1016/j.jare.2014.02.009
S. Dwivedi, M. Vardhan, and S. Tripathi, "Incorporating evolutionary computation for securing wireless network against cyberthreats," The Journal of Supercomputing, vol. 76, no. 11, pp. 8691–8728, Nov. 2020. DOI: https://doi.org/10.1007/s11227-020-03161-w
R. Singh, H. Kumar, and R. K. Singla, "An intrusion detection system using network traffic profiling and online sequential extreme learning machine," Expert Systems with Applications, vol. 42, no. 22, pp. 8609–8624, Dec. 2015. DOI: https://doi.org/10.1016/j.eswa.2015.07.015
A. K. Shukla, P. Singh, and M. Vardhan, "A two-stage gene selection method for biomarker discovery from microarray data for cancer classification," Chemometrics and Intelligent Laboratory Systems, vol. 183, pp. 47–58, Dec. 2018. DOI: https://doi.org/10.1016/j.chemolab.2018.10.009
C. Liu, W. Wang, Q. Zhao, X. Shen, and M. Konan, "A new feature selection method based on a validity index of feature subset," Pattern Recognition Letters, vol. 92, pp. 1–8, Jun. 2017. DOI: https://doi.org/10.1016/j.patrec.2017.03.018
P. E. Meyer, C. Schretter, and G. Bontempi, "Information-Theoretic Feature Selection in Microarray Data Using Variable Complementarity," IEEE Journal of Selected Topics in Signal Processing, vol. 2, no. 3, pp. 261–274, Jun. 2008. DOI: https://doi.org/10.1109/JSTSP.2008.923858
A. K. Shukla, P. Singh, and M. Vardhan, "A hybrid gene selection method for microarray recognition," Biocybernetics and Biomedical Engineering, vol. 38, no. 4, pp. 975–991, Jan. 2018. DOI: https://doi.org/10.1016/j.bbe.2018.08.004
A. K. Shukla, P. Singh, and M. Vardhan, "Gene selection for cancer types classification using novel hybrid metaheuristics approach," Swarm and Evolutionary Computation, vol. 54, May 2020, Art. no. 100661. DOI: https://doi.org/10.1016/j.swevo.2020.100661
L. Barolli and O. Terzo, Eds., Complex, Intelligent, and Software Intensive Systems, 1st edition. New York, NY, USA: Springer, 2017. DOI: https://doi.org/10.1007/978-3-319-61566-0
R. V. Rao, V. J. Savsani, and D. P. Vakharia, "Teaching–learning-based optimization: A novel method for constrained mechanical design optimization problems," Computer-Aided Design, vol. 43, no. 3, pp. 303–315, Mar. 2011. DOI: https://doi.org/10.1016/j.cad.2010.12.015
A. Rajasekhar, R. Rani, K. Ramya, and A. Abraham, "Elitist Teaching Learning Opposition based algorithm for global optimization," in IEEE International Conference on Systems, Man, and Cybernetics, Seoul, Korea (South), Oct. 2012, pp. 1124–1129. DOI: https://doi.org/10.1109/ICSMC.2012.6377882
Y. Oubbati and S. Arif, "Transient stability constrained optimal power flow using teaching learning based optimization," in 8th International Conference on Modelling, Identification and Control, Algiers, Algeria, Nov. 2016, pp. 284–289. DOI: https://doi.org/10.1109/ICMIC.2016.7804124
A. K. Shukla, S. K. Pippal, and S. S. Chauhan, "An empirical evaluation of teaching–learning-based optimization, genetic algorithm and particle swarm optimization," International Journal of Computers and Applications, pp. 1–15, Nov. 2019. DOI: https://doi.org/10.1080/1206212X.2019.1686562
M. M. Polycarpou, A. de Carvalho, J.-S. Pan, M. Wozniak, H. Quintian, and E. Corchado, Eds., Hybrid Artificial Intelligence Systems. New York, NY, USA: Springer International Publishing, 2014. DOI: https://doi.org/10.1007/978-3-319-07617-1
A. K. Shukla, P. Singh, and M. Vardhan, "An adaptive inertia weight teaching-learning-based optimization algorithm and its applications," Applied Mathematical Modelling, vol. 77, pp. 309–326, Jan. 2020. DOI: https://doi.org/10.1016/j.apm.2019.07.046
P. K. Nayak, S. Mishra, P. K. Dash, and R. Bisoi, "Comparison of modified teaching–learning-based optimization and extreme learning machine for classification of multiple power signal disturbances," Neural Computing and Applications, vol. 27, no. 7, pp. 2107–2122, Oct. 2016. DOI: https://doi.org/10.1007/s00521-015-2010-0
A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys Tutorials, vol. 18, no. 2, pp. 1153–1176, Secondquarter 2016. DOI: https://doi.org/10.1109/COMST.2015.2494502
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," in IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, Canada, Jul. 2009, pp. 1–6. DOI: https://doi.org/10.1109/CISDA.2009.5356528
G. V. Nadiammai and M. Hemalatha, "Effective approach toward Intrusion Detection System using data mining techniques," Egyptian Informatics Journal, vol. 15, no. 1, pp. 37–50, Mar. 2014. DOI: https://doi.org/10.1016/j.eij.2013.10.003
K. Ray, S. N. Sharan, S. Rawat, S. K. Jain, S. Srivastava, and A. Bandyopadhyay, Eds., Engineering Vibration, Communication and Information Processing, 1st edition. New York, NY, USA: Springer, 2018. DOI: https://doi.org/10.1007/978-981-13-1642-5
N. Shakhovska, Ed., Advances in Intelligent Systems and Computing: Selected Papers from the International Conference on Computer Science and Information Technologies, ... in Intelligent Systems and Computing, 512), 1st ed. New York, NY: Springer, 2016.
S. R. Basha and J. K. Rani, "A Comparative Approach of Dimensionality Reduction Techniques in Text Classification," Engineering, Technology & Applied Science Research, vol. 9, no. 6, pp. 4974–4979, Dec. 2019. DOI: https://doi.org/10.48084/etasr.3146
F. Kuang, S. Zhang, Z. Jin, and W. Xu, "A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection," Soft Computing, vol. 19, no. 5, pp. 1187–1199, May 2015. DOI: https://doi.org/10.1007/s00500-014-1332-7
J. Gu, L. Wang, H. Wang, and S. Wang, "A novel approach to intrusion detection using SVM ensemble with feature augmentation," Computers & Security, vol. 86, pp. 53–62, Sep. 2019. DOI: https://doi.org/10.1016/j.cose.2019.05.022
S. Senthamarai Kannan and N. Ramaraj, "A novel hybrid feature selection via Symmetrical Uncertainty ranking based local memetic search algorithm," Knowledge-Based Systems, vol. 23, no. 6, pp. 580–585, Aug. 2010. DOI: https://doi.org/10.1016/j.knosys.2010.03.016
P. Gogoi, M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Packet and Flow Based Network Intrusion Dataset," in International Conference on Contemporary Computing, Noida, India, Aug. 2012, pp. 322–334. DOI: https://doi.org/10.1007/978-3-642-32129-0_34
M. M. Abd-Eldayem, "A proposed HTTP service based IDS," Egyptian Informatics Journal, vol. 15, no. 1, pp. 13–24, Mar. 2014. DOI: https://doi.org/10.1016/j.eij.2014.01.001
G. Kim, S. Lee, and S. Kim, "A novel hybrid intrusion detection method integrating anomaly detection with misuse detection," Expert Systems with Applications, vol. 41, no. 4, Part 2, pp. 1690–1700, Mar. 2014. DOI: https://doi.org/10.1016/j.eswa.2013.08.066
"NSL-KDD Datasets," Canadian Institute for Cybersecurity | UNB. https://www.unb.ca/cic/datasets/nsl.html (accessed Apr. 23, 2021).
A. S. A. Aziz, S. E.-O. Hanafi, and A. E. Hassanien, "Comparison of classification techniques applied for network intrusion detection and classification," Journal of Applied Logic, vol. 24, pp. 109–118, Nov. 2017. DOI: https://doi.org/10.1016/j.jal.2016.11.018
How to Cite
MetricsAbstract Views: 599
PDF Downloads: 588
Copyright (c) 2021 Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.