A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments

被引:0
|
作者
Makhadmeh, Sharif Naser [1 ]
Fraihat, Salam [2 ]
Awad, Mohammed [3 ]
Sanjalawe, Yousef [1 ]
Al-Betar, Mohammed Azmi [2 ,5 ]
Awadallah, Mohammed A. [4 ]
机构
[1] Univ Jordan, King AbdullahII Sch Informat Technol, Dept Informat Technol, Amman 11942, Jordan
[2] Ajman Univ, Coll Engn & Informat Technol, Artificial Intelligence Res Ctr AIRC, POB 346, Ajman, U Arab Emirates
[3] Amer Univ Ras Al Khaimah, Dept Comp Sci & Engn, POB 72603, Ras Al Khaymah, U Arab Emirates
[4] Al Aqsa Univ, Dept Comp Sci, POB 4051, Gaza 4051, Palestine
[5] AL Ahliyya Amman Univ, Hourani Ctr Appl Sci Res, Amman, Jordan
关键词
Network intrusion detection system; Marine Predators Algorithm; Crossover; Optimization; Internet of Things;
D O I
10.1016/j.iot.2025.101536
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, there has been a significant rise in cyberattacks targeting the Internet of Things (IoT) and cyberspace in general. Detecting intrusions in a time series environment is a critical challenge for Network Intrusion Detection Systems (NIDS). Building an effective NIDS requires carefully establishing an efficient model, with machine learning (ML) playing a prominent role. The performance of ML models depends on selecting the most informative feature subset. Recently, metaheuristic (MH) optimization methods have been effective in identifying these key features. However, standard MH methods require adjustment to incorporate NIDS-specific knowledge for optimal results, improving both MH performance and ML accuracy. This paper introduces a novel NIDS framework based on three key phases: preprocessing, optimization, and generalization. In the preprocessing phase, several datasets undergo cleaning and under- sampling. In the optimization phase, an enhanced version of the Marine Predators Algorithm (MPA) is proposed, utilizing the crossover operator to identify the most relevant features. The proposed method is called MPAC. The crossover operator is utilized to boost the exploitation capabilities of the MPA and find the optimal local solution for the NIDS. Finally, the selected features are applied to the NIDS. Eight different datasets are employed for examination and evaluation using different evaluation measurements to assess the effectiveness of the proposed NIDS. The experimental evaluation is organized into three phases: evaluating the proposed crossover modification by applying it to five algorithms and comparing results to the originals, comparing the results of the proposed algorithms to prove the robust performance of the MPAC, and comparing the results obtained by the MPAC with the stat-of-the-arts. The proposed MPAC confirmed its demonstration and high performance in detecting network attacks, wherein in the first evaluation phase, the proposed approach obtained better results in almost 90% of the comparisons. In the second comparison phase, the proposed MPAC achieved better results in six datasets out of eight, and in the last phase, the MPAC outperforms all compared methods.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] Intrusion detection using Highest Wins feature selection algorithm
    Mohammad, Rami Mustafa A.
    Alsmadi, Mutasem K.
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (16): : 9805 - 9816
  • [32] Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection
    Prashanth S.K.
    Shitharth S.
    Praveen Kumar B.
    Subedha V.
    Sangeetha K.
    SN Computer Science, 3 (6)
  • [33] Firefly algorithm based feature selection for network intrusion detection
    Selvakumar, B.
    Muneeswaran, K.
    COMPUTERS & SECURITY, 2019, 81 : 148 - 155
  • [34] Genetic algorithm with Different Feature Selection Method for Intrusion Detection
    Cleetus, Nimmy
    Dhanya, K. A.
    2014 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND COMMUNICATIONS (ICCSC), 2014, : 220 - 225
  • [35] Recursive Feature Elimination Algorithm for Intrusion Detection Systems
    Hang Duy Thi Nguyen
    2022 7TH INTERNATIONAL CONFERENCE ON BUSINESS AND INDUSTRIAL RESEARCH (ICBIR2022), 2022, : 216 - 220
  • [36] A Comprehensive Approach to Intrusion Detection in IoT Environments Using Hybrid Feature Selection and Multi-Stage Classification Techniques
    Logeswari, G.
    Roselind, J. Deepika
    Tamilarasi, K.
    Nivethitha, V.
    IEEE ACCESS, 2025, 13 : 24970 - 24987
  • [37] Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning
    Li, Jing
    Othman, Mohd Shahizan
    Chen, Hewan
    Yusuf, Lizawati Mi
    JOURNAL OF BIG DATA, 2024, 11 (01)
  • [38] Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning
    Jing Li
    Mohd Shahizan Othman
    Hewan Chen
    Lizawati Mi Yusuf
    Journal of Big Data, 11
  • [39] Negative Selection and Neural Network based Algorithm for Intrusion Detection in IoT
    Pamukov, Marin E.
    Poulkov, Vladimir K.
    Shterev, Vasil A.
    2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2018, : 636 - 640
  • [40] A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
    Ayad, Aya G.
    Sakr, Nehal A.
    Hikal, Noha A.
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (19): : 26942 - 26984