4.2 Article

Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm

期刊

出版社

SPRINGER HEIDELBERG
DOI: 10.1007/s12652-019-01569-8

关键词

Intrusion detection system; Feature selection; Multi-objective optimisation; Swarm intelligence; Grey wolf algorithm; Support vector machine; Classification

向作者/读者索取更多资源

The rapid development of information technology leads to increasing the number of devices connected to the Internet. Besides, the amount of network attacks also increased. Accordingly, there is an urgent demand to design a defence system proficient in discovering new kinds of attacks. One of the most effective protection systems is intrusion detection system (IDS). The IDS is an intelligent system that monitors and inspects the network packets to identify the abnormal behavior. In addition, the network packets comprise many attributes and there are many attributes that are irrelevant and repetitive which degrade the performance of the IDS system and overwhelm the system resources. A feature selection technique helps to reduce the computation time and complexity by selecting the optimum subset of features. In this paper, an enhanced anomaly-based IDS model based on multi-objective grey wolf optimisation (GWO) algorithm was proposed. The GWO algorithm was employed as a feature selection mechanism to identify the most relevant features from the dataset that contribute to high classification accuracy. Furthermore, support vector machine was used to estimate the capability of selected features in predicting the attacks accurately. Moreover, 20% of NSL-KDD dataset was used to demonstrate effectiveness of the proposed approach through different attack scenarios. The experimental result revealed that the proposed approach obtains classification accuracy of (93.64%, 91.01%, 57.72%, 53.7%) for DoS, Probe, R2L, and U2R attack respectively. Finally, the proposed approach was compared with other existing approaches and achieves significant result.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Chemistry, Multidisciplinary

Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis

Mohammad Adnan Aladaileh, Mohammed Anbar, Ahmed J. Hintaw, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Taief Alaa Al-Amiedy, Dyala R. Ibrahim

Summary: Software-defined networking (SDN) is a network architecture that separates the control plane from the data plane, providing programmable features for efficient network management. However, SDN is vulnerable to DDoS attacks, which can degrade or even collapse the network. Entropy-based approaches are considered effective for detecting DDoS attacks on SDN controllers.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Security and Integrity Attacks in Named Data Networking: A Survey

Mohammad Shahrul Mohd Shah, Yu-Beng Leau, Mohammed Anbar, Ali Abdulqader Bin-Salem

Summary: The concept of Information-Centric Networking (ICN) focuses on content exchanged rather than connected devices. ICN architectures such as Content Centric Network (CCN) and Named Data Networking (NDN) aim to shift from host-centric to content-centric communication and address challenges in traditional IP networks. They differ from host-centric IP networking in naming, routing, forwarding, and caching. NDN uses unique global names provided by content-based security and encryption to ensure content integrity and authenticity. This paper surveys the security aspects of NDN/CCN, discussing integrity attacks and providing countermeasures, as well as highlighting an open challenge and future research directions in security.

IEEE ACCESS (2023)

Article Engineering, Chemical

An Intelligent Early Flood Forecasting and Prediction Leveraging Machine and Deep Learning Algorithms with Advanced Alert System

Israa M. M. Hayder, Taief Alaa Al-Amiedy, Wad Ghaban, Faisal Saeed, Maged Nasser, Ghazwan Abdulnabi Al-Ali, Hussain A. A. Younis

Summary: Flood disasters are a global natural occurrence that cause numerous casualties. Developing an accurate flood forecasting model is crucial to minimize damages and reduce the number of victims. Rain forecasting benefits water resource allocation, management, planning, flood warning and forecasting, and flood damage mitigation. This study aims to build a forecasting model based on the ES-LSTM structure and RNNs for predicting hourly precipitation seasons, as well as classify precipitation using the ANN model and DT algorithm. The findings demonstrate the effectiveness of the proposed model, with ES-LSTM and RNN achieving MAPE of 3.17 and 6.42, respectively, and ANN and DT models achieving prediction accuracy rates of 96.65% and 84.0%, respectively. ES-LSTM and ANN outperformed other models.

PROCESSES (2023)

Article Chemistry, Analytical

Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks

Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan

Summary: The increasing use of IoT devices has led to a rise in DDoS and DoS attacks. This paper proposes an IDS based on CTGAN for detecting these attacks on IoT networks. The CGAN-based IDS generates synthetic traffic to mimic legitimate traffic patterns and uses deep learning classifiers trained with CTGAN-generated tabular data to improve detection performance. Experimental results show accurate detection of DDoS and DoS attacks using the proposed approach, highlighting the significant contribution of CTGAN.

SENSORS (2023)

Review Chemistry, Analytical

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking

Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Al-Amiedy, Mohammad Adnan Aladaileh, Iznan H. H. Hasbullah

Summary: Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, but it is vulnerable to distributed denial of service (DDoS) attacks. Despite efforts to detect DDoS attacks, the issue remains a challenge. This study presents a systematic literature review (SLR) on DDoS attack approaches based on machine learning (ML), deep learning (DL), or hybrid methods published between 2014 and 2022, identifying trends and highlighting the need for further research.

SENSORS (2023)

Article Chemistry, Analytical

Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner

Methaq A. Shyaa, Zurinahni Zainol, Rosni Abdullah, Mohammed Anbar, Laith Alzubaidi, Jose Santamaria

Summary: Concept drift refers to the change in the statistical distribution of data over time in data streaming scenarios. This article proposes an extended variant of the genetic programming combiner (GPC) to handle concept drift in data stream classification. Experimental results demonstrate that the proposed method outperforms traditional GPC and other existing methods in handling various types of concept drift.

SENSORS (2023)

Article Social Sciences, Interdisciplinary

Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller

Amran Mansoor, Mohammed Anbar, Abdullah Ahmed Bahashwan, Basim Ahmad Alabsi, Shaza Dawood Ahmed Rihan

Summary: The rapid growth of cloud computing has driven the development of Software-Defined Network (SDN) to provide dynamic management and improved performance. However, security threats, particularly targeting the SDN controller, have become a concern, including potential Distributed Denial of Service (DDoS) attacks. Existing DDoS detection approaches suffer from high false positives due to the use of non-qualified features and non-realistic datasets. To address this, a deep learning (DL) algorithmic technique is proposed for detecting DDoS attacks on SDN controllers. The proposed approach involves three stages: data preprocessing, cross-feature selection, and detection using the Recurrent Neural Networks (RNNs) model, achieving an average detection accuracy, precision, false positive rate, and F1-measure of 94.186%, 92.146%, 8.114%, and 94.276% respectively, according to the evaluation on a benchmark dataset.

SYSTEMS (2023)

Article Chemistry, Analytical

Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks

Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi

Summary: The increasing number of IoT devices poses challenges to network security. This paper proposes a meta-learning approach to identify attacks in IoT networks, achieving high accuracy and recall rates through the combination of deep learning models and various methods.

SENSORS (2023)

Article Chemistry, Analytical

CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks

Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan

Summary: This paper presents an approach for detecting attacks on IoT networks using a combination of two convolutional neural networks (CNN-CNN). The results show that the proposed approach achieves high accuracy, precision, recall, and classification rate, and outperforms other deep learning algorithms and feature selection methods.

SENSORS (2023)

Article Chemistry, Analytical

Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models

Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi

Summary: This paper proposes an approach for detecting attacks on IoT networks using ensemble feature selection and deep learning models. The impact of the selected feature set on the performance of Deep Learning (DL) models is evaluated. The DL models achieved high detection accuracy, precision, recall, and F1 measure values.

SENSORS (2023)

Article Chemistry, Multidisciplinary

Enhancing Cloud Computing Analysis: A CCE-Based HTTP-GET Log Dataset

Ziyad R. Alashhab, Mohammed Anbar, Shaza Dawood Ahmed Rihan, Basim Ahmad Alabsi, Karamath Ateeq

Summary: This research proposes a publicly available benchmark dataset based on an actual cloud computing environment for evaluating and improving the detection system of distributed denial-of-service attacks. The dataset has the advantages of trustworthiness and validity, enabling reliable evaluations and comparisons. It includes both internal and external HTTP-GET flood DDoS attacks, aiming to enhance the security of cloud computing environments.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Adaptive 3D Reversible Data Hiding Technique Based on the Cumulative Peak Bins in the Histogram of Directional Prediction Error

Dima Kasasbeh, Mohammed Anbar, Ghassan Issa, Basim Ahmad Alabsi, Shaza Dawood Ahmed Rihan

Summary: In this paper, a novel embedding process based on multiple cumulative peak region localization (MCPRL) is proposed to enhance reversible data hiding (RDH). The technique utilizes the correlation between the pixel's local complexity and its directional prediction error to improve security and robustness. Experimental results demonstrate that the proposed method outperforms other state-of-the-art techniques in terms of embedding capacity, image quality, and resistance to attacks.

ELECTRONICS (2023)

Article Computer Science, Information Systems

Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

Shadi Al-Sarawi, Mohammed Anbar, Basim Ahmad Alabsi, Mohammad Adnan Aladaileh, Shaza Dawood Ahmed Rihan

Summary: An Internet of Things (IoT) is a network of smart devices that enable data collection and exchange, and RPL is a protocol designed for connecting IPv6 to IoT networks. However, RPL is vulnerable to sinkhole attacks, which exploit vulnerabilities in RPL by manipulating routing preferences. This paper proposes a Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks.

IEEE ACCESS (2023)

Review Computer Science, Information Systems

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton, Abdullah Ahmed Bahashwan, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh, Ghada AL Mukhaini

Summary: The Internet of Things (IoT) is a rapidly evolving networking concept that offers various applications for human benefit. Research has shown that security mechanisms based on trust, threshold, secure routing, authentication, and encryption have promising results in detecting anomalous activities in RPL-based 6LoWPAN.

INTERNET OF THINGS (2023)

暂无数据