Enhancing Intrusion Detection System Using Osprey Optimization Algorithm with Ensemble Learning Model
Enhancing Intrusion Detection System Using Osprey Optimization Algorithm with Ensemble Learning Model |
||
|
||
© 2024 by IJETT Journal | ||
Volume-72 Issue-10 |
||
Year of Publication : 2024 | ||
Author : Swapna Sunkara, T. Suresh, V. Sathiyasuntharam |
||
DOI : 10.14445/22315381/IJETT-V72I10P118 |
How to Cite?
Swapna Sunkara, T. Suresh, V. Sathiyasuntharam, "Enhancing Intrusion Detection System Using Osprey Optimization Algorithm with Ensemble Learning Model," International Journal of Engineering Trends and Technology, vol. 72, no. 10, pp. 180-190, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I10P118
Abstract
Networks play crucial roles in the modern world, and cybersecurity has evolved into a vital research field. An Intrusion Detection System (IDS) is a significant cybersecurity system that monitors the status of hardware and software operating within the network. Even after decades of development, current IDSs still encounter problems enhancing recognition accuracy, decreasing the False Alarm Rate (FAR), and identifying unknown attacks. To resolve the above challenges, several researchers have concentrated on emerging IDSs that exploit Machine Learning (ML) approaches. ML techniques automatically learn the crucial differences between normal and abnormal data with maximum accuracy. Moreover, ML approaches have strong generalizability, enabling them to effectively identify unknown or novel attacks, further bolstering their capabilities in cybersecurity. Deep Learning (DL), a subcategory of ML that utilizes Neural Networks (NNs), is gaining attention for its outstanding performance. This study introduces an Enhanced IDS using the Osprey Optimization Algorithm with Ensemble Learning (EIDS-OSOAEL) model. The EIDS-OSOAEL technique mainly focuses on the design of an ensemble classifier that integrates the output from multiple classes. Primarily, the EIDS-OSOAEL technique involves a min-max scalar for scaling the input data into a uniform format. Besides, the Tandem‐Twirl Modified Bacterial Foraging Optimization Algorithm (TT‐MBFOA) approach is employed to achieve the optimal Feature Selection (FS). For intrusion detection, the EIDS-OSOAEL approach undergoes an ensemble of three classifiers, namely AutoEncoder (AE), Feed-Forward NN (FFNN), and Elman NN (ENN). The OS-OA approach is utilized to adjust the hyperparameter values of these models. The experimental results of the EIDS-OSOAEL technique are evaluated under a standard dataset. The performance validation of the EIDS-OSOAEL technique showed a superior 99.76% over recent approaches.
Keywords
Intrusion detection system, Osprey optimization algorithm, Network security, Ensemble learning, Feature selection.
References
[1] Wansoo Kim et al., “Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN,” Security and Communication Networks, vol. 2022, no. 1, pp. 1-11, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Evgenia Novikov, Elena Doynikova, and Sergey Golubev, “Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case,” Algorithms, vol. 15, no. 4, pp. 1-14, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Jing Yu, Xiaojun Ye, and Hongbo Li, “A High Precision Intrusion Detection System for Network Security Communication Based on Multi-Scale Convolutional Neural Network,” Future Generation Computer Systems, vol. 129, pp. 399-406, 2022. [CrossRef] [Google Scholar] [Publisher Link]
[4] Arun Kumar Bediya, and Rajendra Kumar, “A Novel Intrusion Detection System for Internet of Things Network Security,” Journal of Information Technology Research, vol. 14, no. 3, pp. 1-18, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Shaokang Cai et al., “A Hybrid Parallel Deep Learning Model for Efficient Intrusion Detection based on Metric Learning,” Connection Science, vol. 34, no. 1, pp. 551-577, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Francesco Pascale et al., “Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles,” Electronics, vol. 10, no. 15, pp. 1-16, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Varun Prabhakaran, and Ashokkumar Kulandasamy, “Integration of Recurrent Convolutional Neural Network and Optimal Encryption Scheme for Intrusion Detection with Secure Data Storage in the Cloud,” Computational Intelligence, vol. 37, no. 1, pp. 344-370, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Georgios Spathoulas, Georgios Theodoridis, and Georgios-Paraskevas Damiris, “Using Homomorphic Encryption for Privacy-Preserving Clustering of Intrusion Detection Alerts,” International Journal of Information Security, vol. 20, pp. 347-370, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Mahendra Prasad, Sachin Tripathi, and Keshav Dahal, “A Probability Estimation-Based Feature Reduction and Bayesian Rough Set Approach for Intrusion Detection in Mobile Ad-Hoc Network,” Applied Intelligence, vol. 53, pp. 7169-7185, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Sébastien Canard, and Chaoyun Li, “Towards Practical Intrusion Detection System over Encrypted Traffic,” IET Information Security, vol. 15, no. 3, pp. 205-266, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Hasanain Ali Al Essa, and Wesam S. Bhaya, “Ensemble Learning Classifiers Hybrid Feature Selection for Enhancing Performance of Intrusion Detection System,” Bulletin of Electrical Engineering and Informatics, vol. 13, no. 1, pp. 665-676, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Doaa N. Mhawi, and Sokeana H. Hashim, “Proposed Hybrid Ensemble Learning Algorithms for an Efficient Intrusion Detection System,” Iraqi Journal of Computers, Communications, Control and Systems Engineering, vol. 22, no. 2, pp. 73-84, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Óscar Mogollón-Gutiérrez et al., “A Novel Ensemble Learning System for Cyberattack Classification,” Intelligent Automation & Soft Computing, vol. 37, no. 2, pp. 1691-1709, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Zakaria Abou El Houda, Bouziane Brik, and Lyes Khoukhi, “Ensemble Learning for Intrusion Detection in SDN-based Zero Touch Smart Grid Systems,” 2022 IEEE 47th Conference on Local Computer Networks, Edmonton, AB, Canada, pp. 149-156, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Yakub Kayode Saheed, and Sanjay Misra, “A Voting Gray Wolf Optimizer-Based Ensemble Learning Models for Intrusion Detection in the Internet of Things,” International Journal of Information Security, vol. 23, pp. 1557-1581, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Thi-Thu-Huong Le et al., “Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method,” Sensors, vol. 22, no. 3, pp. 1-28, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Wenbin Yao et al., “A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT,” Sensors, vol. 23, no. 8, pp. 1-25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Deepak Kumar et al., “ChOs_LSTM: Chebyshev Osprey Optimization-Based Model for Detecting Attacks,” 2024 3rd International Conference on Artificial Intelligence for Internet of Things (AIIoT), Vellore, India, pp. 1-6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Orieb Abu Alghanam et al., “An Improved PIO Feature Selection Algorithm for IoT Network Intrusion Detection System Based on Ensemble Learning,” Expert Systems with Applications, vol. 213, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Bingying Yao et al., “Modified Osprey Algorithm for Optimizing Capsule Neural Network in Leukemia Image Recognition,” Scientific Reports, vol. 14, pp. 1-17, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Ranjeet B. Kagade, and N. Vijayaraj, “OCCOA for Clustering-Based Intrusion Detection System with MLP-RNN Architecture,” Multimedia Tools and Applications, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Rajendra Singh Kushwah, and Kamal Kishor Prasad, “A Novel Mobile Agent-Based Intrusion Detection Framework for Network Security Using Sl-Gat and Pp-FQCC,” Educational Administration: Theory and Practice, vol. 30, no. 5, pp. 5051-5062, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Yongzhong Cao et al., “An Intrusion Detection System Based on Stacked Ensemble Learning for IoT Network,” Computers and Electrical Engineering, vol. 110, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Fengqin Zuo et al., “GSOOA-1DDRSN: Network Traffic Anomaly Detection Based on Deep Residual Shrinkage Networks,” Heliyon, vol. 10, no. 11, pp. 1-23, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Abdullah H. Al-Nefaie, and Theyazn H. H. Aldhyani, “Predicting CO2 Emissions from Traffic Vehicles for Sustainable and Smart Environment Using a Deep Learning Model,” Sustainability, vol. 15, no. 9, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] C. Kalamani et al., “An Efficient Reconfigurable FIR Filter Design with Coefficient Optimization Using a Modified Bacterial Foraging Optimization Algorithm,” Automatika, vol. 65, no. 1, pp. 290-303, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Hanan Hindy et al., “Utilizing Deep Learning Techniques for Effective Zero-Day Attack Detection,” Electronics, vol. 9, no. 10, pp. 1-16, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] David Opeoluwa Oyewola, Emmanuel Gbenga Dada, Sanjay Misraet, “Diagnosis of Cardiovascular Diseases by Ensemble Optimization Deep Learning Techniques,” International Journal of Healthcare Information Systems and Informatics, vol. 19, no. 1, pp. 1-21, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Shaik Salma Asiya Begum, and Hussain Syed, “GSATT-CMNetV3: Pepper Leaf Disease Classification Using Osprey Optimization,” IEEE Access, vol. 12, pp. 32493-32505, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Datasets, Canadian Institute for Cybersecurity. [Online]. Available: https://www.unb.ca/cic/datasets/
[31] Khalid A. Alissa et al., “Feature Subset Selection Hybrid Deep Belief Network Based Cybersecurity Intrusion Detection Model,” Electronics, vol. 11, no. 19, pp. 1-17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]