4.6 Article

Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection

出版社

SPRINGER
DOI: 10.1007/s10586-020-03229-5

关键词

Classification; Feature selection; Grasshopper optimization algorithm; Intrusion detection

向作者/读者索取更多资源

The EFSGOA method, a combination of ensemble feature selection and grasshopper optimization algorithm, achieved excellent performance in intrusion detection, with high detection rates, accuracy, and low false alarm rates. The method significantly improved accuracy and reduced false alarms, outperforming other existing techniques.
Intrusion detection is one of the most crucial activities for security infrastructures in network environments, and it is widely used to detect, identify and track malicious threats. A common approach in intrusion detection systems (IDSs) specifically in anomaly detection is evolutionary algorithm that works as intrusion detector. Still, it has been challenging to design a precise and reliable IDS to determine security threats due to the large capacity of network data which contains redundant and irrelevant features. It does not only decrease the process of classification but also prevents a classifier from making precise decisions. To increase the accuracy and reduce the false alarm rate, in this study integration of ensemble feature selection (EFS) and grasshopper optimization algorithm (GOA), called EFSGOA is developed. Firstly, EFS method is applied to rank the features for selecting the top subset of relevant features. Afterward, GOA is utilized to identify significant features from the obtained reduced features set produced by EFS technique that can contribute to determine the type of attack. Furthermore, GOA utilizes support vector machine (SVM) as a fitness function to obtain the noteworthy features and to optimize penalty factor, kernel parameter, and tube size parameters of SVM for maximizing the classification performance. The experimental results demonstrate that EFSGOA method has performed better and obtained high detection rate of 99.69%, accuracy of 99.98% and low false alarm rate of 0.07 in NSL-KDD and high detection rate of 99.26%, accuracy of 99.89% and low false alarm rate of 0.097 in KDD Cup 99 data. Moreover, the proposed method has succeeded in achieving higher performance compared to other state-of-art techniques in terms of accuracy, detection rate, false alarm rate, and CPU time.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Blockchain-based e-cheque clearing framework with trust based consensus mechanism

Nikita Singh, Tarun Kumar, Manu Vardhan

Summary: The paper proposes a framework for automating cheque settlement process based on blockchain technology, allowing for cheque generation, processing, and settlement through both online and physical modes. The framework introduces a novel trust-based consensus mechanism for block mining, reducing consensus time by 25%. It can partially transform the current banking system, but also discusses potential security threats and vulnerabilities.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

An effect of chaos grasshopper optimization algorithm for protection of network infrastructure

Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi

COMPUTER NETWORKS (2020)

Review Computer Science, Information Systems

A survey of android application and malware hardening

Vikas Sihag, Manu Vardhan, Pradeep Singh

Summary: With the increasing quantity and complexity of malware, Android users are facing severe security threats. Malware authors employ various techniques to evade detection, making it more challenging to detect. Strengthening security mechanisms has become increasingly important in application development.

COMPUTER SCIENCE REVIEW (2021)

Article Telecommunications

Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks

Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi

Summary: The study introduces a multi-parallel adaptive evolutionary technique and incorporates simulated annealing to enhance the performance of network intrusion detection systems, showing better results compared to traditional techniques in terms of threat detection efficiency.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Information Systems

PICAndro: Packet InspeCtion-Based Android Malware Detection

Vikas Sihag, Gaurav Choudhary, Manu Vardhan, Pradeep Singh, Jung Taek Seo

Summary: The post-COVID world has seen an increased reliance on online businesses for daily transactions, especially through smartphones. This has resulted in new attack surfaces that need to be evaluated by security researchers. The large market share of Android has attracted malware authors to launch more sophisticated malware, making the need for detection critical.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Chemistry, Multidisciplinary

BERT-Based Transfer-Learning Approach for Nested Named-Entity Recognition Using Joint Labeling

Ankit Agrawal, Sarsij Tripathi, Manu Vardhan, Vikas Sihag, Gaurav Choudhary, Nicola Dragoni

Summary: This research proposed a transfer-learning approach to solve nested named-entity recognition, achieving better performance using fine-tuned BERT-based models compared to other models, without requiring external resources or feature extraction.

APPLIED SCIENCES-BASEL (2022)

Article Geosciences, Multidisciplinary

Machine-learning- and deep-learning-based streamflow prediction in a hilly catchment for future scenarios using CMIP6 GCM data

Dharmaveer Singh, Manu Vardhan, Rakesh Sahu, Debrupa Chatterjee, Pankaj Chauhan, Shiyin Liu

Summary: The alteration in river flow patterns, particularly those that originate in the Himalaya, has been caused by climate change. It is more essential than ever to predict changes in streamflow due to the impending intensification of extreme climate events. However, very few studies have been undertaken for a mountainous catchment, especially in the western Himalaya.

HYDROLOGY AND EARTH SYSTEM SCIENCES (2023)

Proceedings Paper Computer Science, Information Systems

Forensic Analysis of Fitness Applications on Android

Rahul Sinha, Vikas Sihag, Gaurav Choudhary, Manu Vardhan, Pradeep Singh

Summary: People today are increasingly digitized, with smartphones and smartwatches becoming more popular. Mobile phones and wearable devices are being used in various ways, from tracking location and making payments to monitoring health. The information stored in these applications can be crucial for forensic investigations.

MOBILE INTERNET SECURITY, MOBISEC 2021 (2022)

Article Computer Science, Information Systems

BLADE: Robust malware detection against obfuscation in android

Vikas Sihag, Manu Vardhan, Pradeep Singh

Summary: The BLADE system is a novel obfuscation-resilient system based on Opcode Segments, which uses innovative methods for feature characterization and simplification of dalvik opcodes to enhance resilience. It has been found effective, accurate, and resilient against various obfuscation techniques.

FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION (2021)

Article Computer Science, Artificial Intelligence

Uncertainty query sampling strategies for active learning of named entity recognition task

Ankit Agrawal, Sarsij Tripathi, Manu Vardhan

Summary: The study proposes a new active learning algorithm based on a hybrid query sampling strategy, which considers both sentence similarity and model probability value, showing superior performance in biomedical and Spanish language tasks compared to traditional active learning strategies, while requiring less annotated data to achieve the performance of supervised learning methods.

INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS (2021)

Article Computer Science, Software Engineering

A Comparative Study of Graph Kernels and Clustering Algorithms

Riju Bhattacharya, Naresh Kumar Nagwani, Sarsij Tripathi

Summary: Graph kernels have evolved as a promising and popular method for graph clustering over the last decade. This study compared five standard graph kernel techniques for graph clustering, considering different clustering methods. Results show that k-step random walk and shortest path kernel performed best among all graph clustering approaches.

INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT (2021)

Article Computer Science, Artificial Intelligence

Active learning approach using a modified least confidence sampling strategy for named entity recognition

Ankit Agrawal, Sarsij Tripathi, Manu Vardhan

Summary: Named entity recognition (NER) is an important subtask of information extraction that aims to identify and classify named entities in textual data. Various supervised and deep learning models are developed for this task. Active learning is an iterative method that minimizes labeling cost without affecting performance. Proposed active learning approach for NER shows minimal requirement of labeled data for training compared to other approaches.

PROGRESS IN ARTIFICIAL INTELLIGENCE (2021)

Proceedings Paper Computer Science, Information Systems

An Energy-Efficient Framework Based on Random Waypoint Mobility Model in WSN-Assisted IoT

Anurag Shukla, Sarsij Tripathi

ADVANCES IN VLSI, COMMUNICATION, AND SIGNAL PROCESSING (2020)

暂无数据