Multi-stage intrusion detection system aided by grey wolf optimization algorithm

被引:0
|
作者
Chatterjee, Somnath [1 ]
Shaw, Vaibhav [1 ]
Das, Ranit [1 ]
机构
[1] Future Inst Engn & Management, Comp Sci & Engn Dept, Sonarpur Stn Rd, Kolkata 700150, West Bengal, India
关键词
Computer networks; Intrusion detection system; Stacked autoencoder; Decison trees; UNSW-NB15 DATA SET; MACHINE;
D O I
10.1007/s10586-023-04179-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Network Intrusion Detection System (NIDS) is frequently used for monitoring and detecting malicious activities in network traffic. A typical NIDS has four stages: a data source, data pre-processing, a decision-making technique, and a defense reaction. We have utilized both anomaly and signature based techniques to build a framework which is resilient to identifying both known and unknown attack. The incoming data packet is fed into the Stacked Autoencoder to identify whether it is a benign or malicious. If found to be malicious we extract the most relevant features from the network packet using grey wolf optimization algorithm. Then these attribute are provided to RandomForest classifier to determine if this malign attack is present in our knowledge base. If it is present we progress to identify the attack type using LightGBM classifier. If not, we term it as zero-day attack. To evaluate the usability of the proposed framework we have assessed it using two publicly available datasets namely UNSW-NB15 and CIC-IDS-2017 dataset. We have obtained an accuracy of 90.94% and 99.67% on the datasets respectively.
引用
收藏
页码:3819 / 3836
页数:18
相关论文
共 50 条
  • [1] A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System
    Alzaqebah, Abdullah
    Aljarah, Ibrahim
    Al-Kadi, Omar
    Damasevicius, Robertas
    [J]. MATHEMATICS, 2022, 10 (06)
  • [2] Multi-stage intrusion detection system using Hidden Markov Model algorithm
    Lee, Do-hyeon
    Kim, Doo-young
    Jung, Jae-il
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 72 - 77
  • [3] Network intrusion detection by a multi-stage classification system
    Cordella, LP
    Limongiello, A
    Sansone, C
    [J]. MULTIPLE CLASSIFIER SYSTEMS, PROCEEDINGS, 2004, 3077 : 324 - 333
  • [4] MSDAR: Multi-Stage Dynamic Architecture Intrusion Detection System
    ElShafee, Ahmed M.
    Azer, Marianne A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (07) : 517 - 526
  • [5] Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
    Taief Alaa Alamiedy
    Mohammed Anbar
    Zakaria N. M. Alqattan
    Qusay M. Alzubi
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 3735 - 3756
  • [6] Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
    Alamiedy, Taief Alaa
    Anbar, Mohammed
    Alqattan, Zakaria N. M.
    Alzubi, Qusay M.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (09) : 3735 - 3756
  • [7] RETRACTED ARTICLE: Oppositional based Laplacian grey wolf optimization algorithm with SVM for data mining in intrusion detection system
    P. Anitha
    B. Kaarthick
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 3589 - 3600
  • [8] Retraction Note to: Oppositional based Laplacian grey wolf optimization algorithm with SVM for data mining in intrusion detection system
    P. Anitha
    B. Kaarthick
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 37 - 37
  • [9] Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization
    Alzubi, Qusay M.
    Anbar, Mohammed
    Sanjalawe, Yousef
    Al-Betar, Mohammed Azmi
    Abdullah, Rosni
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 204
  • [10] A Community Detection Algorithm by Utilizing Grey Wolf Optimization
    Han, Cong
    Chen, Mei
    Pan, Lina
    Chen, Xiaoyun
    [J]. 2017 9TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION AND CONTROL (ICMIC 2017), 2017, : 567 - 572