Improved Ant Colony Optimization and Machine Learning Based Ensemble Intrusion Detection Model

被引:7
|
作者
Vanitha, S. [1 ]
Balasubramanie, P. [2 ]
机构
[1] Anna Univ, Chennai 600025, India
[2] Kongu Engn Coll, Dept Comp Sci & Engn, Erode 638060, India
来源
关键词
Network intrusion detection system (NIDS); internet of things (IOT); ensemble learning; statistical flow features; botnet; ensemble technique; improved ant colony optimization (IACO); feature selection; ALGORITHM; INTERNET; IOT;
D O I
10.32604/iasc.2023.032324
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IOT) possess cultural, commercial and social effect in life in the future. The nodes which are participating in IOT network are basi-cally attracted by the cyber-attack targets. Attack and identification of anomalies in IoT infrastructure is a growing problem in the IoT domain. Machine Learning Based Ensemble Intrusion Detection (MLEID) method is applied in order to resolve the drawback by minimizing malicious actions in related botnet attacks on Message Queue Telemetry Transport (MQTT) and Hyper-Text Transfer Proto-col (HTTP) protocols. The proposed work has two significant contributions which are a selection of features and detection of attacks. New features are chosen from Improved Ant Colony Optimization (IACO) in the feature selection, and then the detection of attacks is carried out based on a combination of their possible proper-ties. The IACO approach is focused on defining the attacker's important features against HTTP and MQTT. In the IACO algorithm, the constant factor is calculated against HTTP and MQTT based on the mean function for each element. Attack detection, the performance of several machine learning models are Distance Deci-sion Tree (DDT), Adaptive Neuro-Fuzzy Inference System (ANFIS) and Mahala-nobis Distance Support Vector Machine (MDSVM) were compared with predicting accurate attacks on the IoT network. The outcomes of these classifiers are combined into the ensemble model. The proposed MLEID strategy has effec-tively established malicious incidents. The UNSW-NB15 dataset is used to test the MLEID technique using data from simulated IoT sensors. Besides, the pro-posed MLEID technique has a greater detection rate and an inferior rate of false-positive compared to other conventional techniques.
引用
收藏
页码:849 / 864
页数:16
相关论文
共 50 条
  • [1] An Adaptive Ensemble Machine Learning Model for Intrusion Detection
    Gao, Xianwei
    Shan, Chun
    Hu, Changzhen
    Niu, Zequn
    Liu, Zhen
    IEEE ACCESS, 2019, 7 : 82512 - 82521
  • [2] Ant colony optimization based network intrusion feature selection and detection
    Gao, HH
    Yang, HH
    Wang, XY
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3871 - 3875
  • [3] Network intrusion detection method based on ant colony optimization clustering
    College of Computer Science and Engineering, Chongqing University, Chongqing 400044, China
    不详
    不详
    Harbin Gongcheng Daxue Xuebao, 2006, SUPPL. (510-513):
  • [4] Toward support-vector machine-based ant colony optimization algorithms for intrusion detection
    Alqarni, Ahmed Abdullah
    SOFT COMPUTING, 2023, 27 (10) : 6297 - 6305
  • [5] Toward support-vector machine-based ant colony optimization algorithms for intrusion detection
    Ahmed Abdullah Alqarni
    Soft Computing, 2023, 27 : 6297 - 6305
  • [6] Ant Colony Optimization Algorithm in Intrusion Detection and Positive
    Zou, Qian
    Wang, Huajun
    Huang, Wei
    Pan, Jin
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 541 - +
  • [7] A Kind of Network Intrusion Detection Method Using Improved Support Vector Machine Based on Ant Colony Algorithm
    Zhang, Xiaoqin
    Jia, Guojun
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2995 - 2998
  • [8] Network intrusion detection model based on genetic ant colony algorithm
    Huang, Jianghao
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1150 - 1154
  • [9] Network Intrusion Detection Based on the Model of Improved Artificial Bee Colony (IABC) Combined with Extreme Learning Machine (ELM)
    Guan, Rong-feng
    Xu, Lian-xiang
    Shi, Xiong
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (ICCSAI 2014), 2015, : 142 - 146
  • [10] Research of Intrusion Detection based on Ensemble Learning Model
    Li Yang
    Li Jianlin
    Yue Songjie
    Wang Zhi
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2376 - 2380