A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments

被引:0
|
作者
Makhadmeh, Sharif Naser [1 ]
Fraihat, Salam [2 ]
Awad, Mohammed [3 ]
Sanjalawe, Yousef [1 ]
Al-Betar, Mohammed Azmi [2 ,5 ]
Awadallah, Mohammed A. [4 ]
机构
[1] Univ Jordan, King AbdullahII Sch Informat Technol, Dept Informat Technol, Amman 11942, Jordan
[2] Ajman Univ, Coll Engn & Informat Technol, Artificial Intelligence Res Ctr AIRC, POB 346, Ajman, U Arab Emirates
[3] Amer Univ Ras Al Khaimah, Dept Comp Sci & Engn, POB 72603, Ras Al Khaymah, U Arab Emirates
[4] Al Aqsa Univ, Dept Comp Sci, POB 4051, Gaza 4051, Palestine
[5] AL Ahliyya Amman Univ, Hourani Ctr Appl Sci Res, Amman, Jordan
关键词
Network intrusion detection system; Marine Predators Algorithm; Crossover; Optimization; Internet of Things;
D O I
10.1016/j.iot.2025.101536
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, there has been a significant rise in cyberattacks targeting the Internet of Things (IoT) and cyberspace in general. Detecting intrusions in a time series environment is a critical challenge for Network Intrusion Detection Systems (NIDS). Building an effective NIDS requires carefully establishing an efficient model, with machine learning (ML) playing a prominent role. The performance of ML models depends on selecting the most informative feature subset. Recently, metaheuristic (MH) optimization methods have been effective in identifying these key features. However, standard MH methods require adjustment to incorporate NIDS-specific knowledge for optimal results, improving both MH performance and ML accuracy. This paper introduces a novel NIDS framework based on three key phases: preprocessing, optimization, and generalization. In the preprocessing phase, several datasets undergo cleaning and under- sampling. In the optimization phase, an enhanced version of the Marine Predators Algorithm (MPA) is proposed, utilizing the crossover operator to identify the most relevant features. The proposed method is called MPAC. The crossover operator is utilized to boost the exploitation capabilities of the MPA and find the optimal local solution for the NIDS. Finally, the selected features are applied to the NIDS. Eight different datasets are employed for examination and evaluation using different evaluation measurements to assess the effectiveness of the proposed NIDS. The experimental evaluation is organized into three phases: evaluating the proposed crossover modification by applying it to five algorithms and comparing results to the originals, comparing the results of the proposed algorithms to prove the robust performance of the MPAC, and comparing the results obtained by the MPAC with the stat-of-the-arts. The proposed MPAC confirmed its demonstration and high performance in detecting network attacks, wherein in the first evaluation phase, the proposed approach obtained better results in almost 90% of the comparisons. In the second comparison phase, the proposed MPAC achieved better results in six datasets out of eight, and in the last phase, the MPAC outperforms all compared methods.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] A Novel Feature Selection for Intrusion Detection in Virtual Machine Environments
    Alshawabkeh, Malak
    Aslam, Javed A.
    Kaeli, David
    Dy, Jennifer
    2011 23RD IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2011), 2011, : 879 - 881
  • [22] An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning
    Abu Alghanam, Orieb
    Almobaideen, Wesam
    Saadeh, Maha
    Adwan, Omar
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
  • [23] Feature selection for intrusion detection system in Internet-of-Things (IoT)
    Nimbalkar, Pushparaj
    Kshirsagar, Deepak
    ICT EXPRESS, 2021, 7 (02): : 177 - 181
  • [24] An effective genetic algorithm-based feature selection method for intrusion detection systems
    Halim, Zahid
    Yousaf, Muhammad Nadeem
    Waqas, Muhammad
    Sulaiman, Muhammad
    Abbas, Ghulam
    Hussain, Masroor
    Ahmad, Iftekhar
    Hanif, Muhammad
    COMPUTERS & SECURITY, 2021, 110
  • [25] New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems
    Kherbache, Meriem
    Espes, David
    Amroun, Kamal
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 3 - 19
  • [26] Hybrid feature selection for modeling intrusion detection systems
    Chebrolu, S
    Abraham, A
    Thomas, JP
    NEURAL INFORMATION PROCESSING, 2004, 3316 : 1020 - 1025
  • [27] ENHANCED FEATURE OPTIMIZATION FOR MULTICLASSS INTRUSION DETECTION IN IOT FOG COMPUTING ENVIRONMENTS
    Sonawane, Sudarshan s.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 1246 - 1262
  • [28] A Comparison of Feature Selection and Feature Extraction in Network Intrusion Detection Systems
    Vuong, Tuan-Cuong
    Tran, Hung
    Trang, Mai Xuan
    Ngo, Vu-Duc
    Van Luong, Thien
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1798 - 1804
  • [29] Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT
    Alghamdi, Rubayyi
    Bellaiche, Martine
    IOT, 2022, 3 (02): : 285 - 314
  • [30] Intrusion detection using Highest Wins feature selection algorithm
    Rami Mustafa A. Mohammad
    Mutasem K. Alsmadi
    Neural Computing and Applications, 2021, 33 : 9805 - 9816