Improving the Efficiency of an Intrusion Detection System Using a Decision Tree Adjusted with an Improved Random Fractal Search Combined with the Whale Otimization Algorithm
Subject Areas : New technologies in distributed systems and algorithmic computingشهرزاد رحیمی 1 , Masood Niazi Torshiz 2 , Seyyed Abed Hosseini 3
1 - دانشگاه ازاد مشهد
2 - Department of Computer Engineering, Ma.C., Islamic Azad University, Mashhad, Iran
3 - Department of Electrical Engineering, Ma.C., Islamic Azad University, Mashhad, Iran
Keywords: Intrusion detection system, Random fractal search algorithm, Chaotic mapping, Whale optimization algorithm, Clustering,
Abstract :
With the increasing use of the Internet, a large amount of information is exchanged between different communication devices. Data must be securely transmitted between communication devices, and therefore, network security is one of the dominant research areas for the current network scenario. Intrusion detection systems are widely used in conjunction with other security mechanisms such as firewalls and access control. On the other hand, the evolution in attack scenarios has been such that finding efficient and optimal intrusion detection systems with frequent updates has become a big challenge. Implementation of an intrusion detection system using machine learning techniques and updated intrusion data sets is one of the effective modeling solutions for an intrusion detection system. In this article, an improved random fractal search algorithm with chaos maps is introduced. To improve the mining ability of this algorithm, the relationships of the whale algorithm have been used in combination with it. This algorithm has been used to cluster infiltrated and normal data. Then, a decision tree classifier was used to classify the infiltrated data on the NSL-KDD dataset. To evaluate the proposed method, its results have been compared with the case without clustering. In terms of the error and sensitivity criteria for the test data, the proposed method is equal to 0.2211, 0.5816, and the decision tree without clustering is equal to 0.2477, 0.5692, respectively. In terms of specificity and accuracy criteria, the proposed method has obtained better results compared to the decision tree without clustering. Therefore, the results showed that the proposed method has better efficiency and performance compared to the decision tree method without clustering.
[1] Diro, A. A., & Chilamkurti, N., Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-768, 2018
[2] Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Peter Sadiku, Emmanuel Abidemi Adeniyi, Moses Abiodun, Oladipo Idowu Dauda, An Enhanced Intrusion Detection System using Particle Swarm Optimization Feature Extraction Technique,Procedia Computer Science,Volume 193, 2021, Pages 504-512, ISSN 1877-0509.
[3] S. Hofmeyr, S. Forrest, and A. Sornayaji, “Lightweight intrusion detection for networked operating systems,” Journal of Computer Security, vol. 5, no. 2, 1997.
[4] A. Puri and N. Sharma, “A novel technique for intrusion detection system for network security using hybrid svm-cart,” IJEDR, vol. 5, no. 2, pp. 155–161, 2017.
[5] P. Kabiri and A. A. Ghorbani, “Research on intrusion detection and response: A survey.” IJ Network Security, vol. 1, no. 2, pp. 84–102, 2005.
[6] M. Shojafar, R. Taheri, Z. Pooranian, R. Javidan, A. Miri and Y. Jararweh, "Automatic Clustering of Attacks in Intrusion Detection Systems," 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), 2019, pp. 1-8, doi: 10.1109/AICCSA47632.2019.9035238.
[7] A. Karami, “An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities, “Expert Systems with Applications, vol. 108, pp. 36–60, 2018.
[8] M. Tabash, M. Abd Allah, and B. Tawfik, “Intrusion detection model using naive bayes and deep learning technique,” 3e International Arab Journal of Information Technology, vol. 17,no. 2, 2020.
[9] A. Ghazali, W. Nuaimy, A. Al-Atabi, and I. Jamaludin, “Comparison of classification models for Nsl-Kdd dataset for network anomaly detection,” Academic Journal of Science, vol. 4, no. 1, pp. 199–206, 2015.
[10] J. Kevric, S. Jukic, and A. Subasi, “An effective combining classifier approach using tree algorithms for network intrusion detection,” Neural Computing & Applications, vol. 28,no. S1, pp. 1051–1058, 2017.
[11] A. Hadi, “Performance analysis of big data intrusion detection system over random forest algorithm,” International Journal of Applied Engineering Research, vol. 13, no. 2, pp. 1520–1527,2018.
[12] W. Elmasry, A. Akbulut, and A. H. Zaim, “Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic,” Computer Networks, vol. 168,Article ID 107042, 2020
[13] Zhu, Y., Gaba, G. S., Almansour, F. M., Alroobaea, R., & Masud, M. (2021). Application of data mining technology in detecting network intrusion and security maintenance. Journal of Intelligent Systems, 30(1), 664-676.
[14] Anitha, P., & Kaarthick, B. (2021). Oppositional based Laplacian grey wolf optimization algorithm with SVM for data mining in intrusion detection system. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3589-3600.
[15] Koryshev, N., Hodashinsky, I., & Shelupanov, A. (2021). Building a fuzzy classifier based on whale optimization algorithm to detect network intrusions. Symmetry, 13(7), 1211.
[16] Zhang, J., Sun, J., & He, H. (2021). Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm. Wireless Personal Communications, 1-15.
[17] Maheswari, M., & Karthika, R. A. (2021). A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Personal Communications, 118(2), 1535-1557.
[18] Xie, B., Dong, X., & Wang, C. (2021). An Improved-Means Clustering Intrusion Detection Algorithm for Wireless Networks Based on Federated Learning. Wireless Communications and Mobile Computing, 2021.
[19] Keserwani, P. K., Govil, M. C., Pilli, E. S., & Govil, P. (2021). A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model. Journal of Reliable Intelligent Environments, 7(1), 3-21.
[20] Dwivedi, S., Vardhan, M., & Tripathi, S. (2021). Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Computing, 24(3), 1881-1900.
[21] Haider AL-Husseini, et al. Whale Optimization Algorithm-Enhanced Long Short-Term Memory Classifier with Novel Wrapped Feature Selection for Intrusion Detection, Journal of Sensor and Actuator Networks, Nov 2024, 13, 73, https://doi.org/10.3390/jsan13060073
[22] Rajashekar Kandakatla, et al. Whale-Optimized Probabilistic Selection For Enhanced Intrusion Detection In Cloud Environments, Journal of Theoretical and Applied Information Technology, June 2024. Vol. 102. No. 12
[23] Salimi, H., Stochastic fractal search: a powerful metaheuristic algorithm. Knowledge-Based Systems, 2015. 75: p. 1-18
[24] Safavian SR, Landgrebe D. A survey of decision tree classifier methodology. IEEE Trans Syst Man Cybern. 1991;21(3):660–674.
[25] Misaghi, M., & Yaghoobi, M. (2019). Improved invasive weed optimization algorithm (IWO) based on chaos theory for optimal design of PID controller. Journal of Computational Design and Engineering, 6(3), 284-295.
[26] Kumar Ahuja, Dr. Gulshan. (2015). Evaluation Metrics for Intrusion Detection Systems-A Study. International Journal of Computer Science and Mobile Applications. 11.
