Improved Intrusion Detection Algorithm based on TLBO and GA Algorithms

被引:13
|
作者
Aljanabi, Mohammad [1 ,2 ]
Ismail, MohdArfian [2 ]
机构
[1] Aliraqia Univ, Coll Educ, Baghdad, Iraq
[2] Univ Malaysia Pahang, Fac Comp, Gambang, Malaysia
关键词
TLBO; feature subset selection; NTLBO; IDS; FSS; LEARNING-BASED OPTIMIZATION; FEATURE-SELECTION; DETECTION SYSTEM; MACHINE;
D O I
10.34028/iajit/18/2/5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Optimization algorithms are widely used for the identification of intrusion. This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. In this paper, an improved method for intrusion detection for binary classification was presented and discussed in detail. The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). The process of selecting the least number of features without any effect on the result accuracy in FSS was considered a multi-objective optimization problem. The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. The experiments were performed on the prominent intrusion machine-learning datasets (KDDCUP'99 and CICIDS 2017), where significant enhancements were observed with the suggested NTLBO algorithm as compared to the classical Teaching-Learning-Based Optimization algorithm (TLBO), NTLBO presented better results than TLBO and many existing works. The results showed that NTLBO reached 100% accuracy for KDDCUP'99 dataset and 97% for CICIDS dataset.
引用
下载
收藏
页码:170 / 179
页数:10
相关论文
共 50 条
  • [21] Perimeter Intrusion Detection based on improved Surendra Background Update Algorithm
    Ding, Feng
    Wang, Hong
    Zhong, Hongsheng
    Yu, Longhua
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2011), 2011, 8009
  • [22] An Improved Reptile Search Algorithm Based on Cauchy Mutation for Intrusion Detection
    Duraibi S.
    Computer Systems Science and Engineering, 2023, 46 (02): : 2509 - 2525
  • [23] Towards accurate intrusion detection based on improved clonal selection algorithm
    Chunyong Yin
    Luyu Ma
    Lu Feng
    Multimedia Tools and Applications, 2017, 76 : 19397 - 19410
  • [24] Towards accurate intrusion detection based on improved clonal selection algorithm
    Yin, Chunyong
    Ma, Luyu
    Feng, Lu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19397 - 19410
  • [25] An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks
    Hu, Xuntao
    Meng, Xiancai
    Liu, Shaoqing
    Liang, Lizhen
    IEEE ACCESS, 2024, 12 : 66432 - 66441
  • [26] An improved TLBO based memetic algorithm for aerodynamic shape optimization
    Qu, Xinghua
    Zhang, Ran
    Liu, Bo
    Li, Huifeng
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 57 : 1 - 15
  • [27] Network Intrusion Detection Algorithm based on Improved Support Vector Machine
    Hu Jianhong
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 523 - 526
  • [28] An Improved PSO-Based Rule Extraction Algorithm for Intrusion Detection
    Zhao Chang
    Wang Wei-ping
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 56 - 58
  • [29] Intrusion detection method based on improved social network search algorithm
    Yang, Zhongjun
    Wang, Qi
    Zong, Xuejun
    Wang, Guogang
    COMPUTERS & SECURITY, 2024, 140
  • [30] Intrusion Detection Based on Improved Fuzzy C-means Algorithm
    Jiang, Wei
    Yao, Min
    Yan, Jun
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 326 - +