International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 10, Issue - 105, August 2023
  1. 1
    Google Scholar
Network intrusion detection system using bacterial foraging optimization with random forest

Sudha Rani Chikkalwar and Yugandhar Garapati

Abstract

Network intrusion detection systems (NIDS) are designed to identify distributed denial of service (DDoS) attacks on networks, which manifest as sudden and significant spikes in network traffic. These attacks aim to disrupt the availability of specific nodes or the entire system by either draining supply node resources or jamming their signals. With the proliferation of attacks facilitated by malicious actors leveraging data transfer through Internet of Things (IoT) devices, security vulnerabilities have become prevalent across many networks. To counter these challenges, a novel approach called bacterial foraging optimization with random forest (BFO-RF) optimization is proposed for the identification and classification of DDoS attacks. The input data undergoes preprocessing using an autoencoder within the network security laboratory-knowledge discovery in databases (NSL-KDD) dataset. Following preprocessing, recursive feature elimination (RFE) is employed to extract pertinent features. Subsequently, the suggested BFO-RF optimization approach divides the data, with a focus on low-rate attacks. Once the feature selection process is complete, attacks are classified using a random forest classifier (RFC). The performance of the proposed BFO-RF optimization approach is evaluated, yielding exceptional results: an accuracy of 99.96%, specificity of 99.27%, recall of 99.98%, and an F-measure of 99.62%. In comparison, the established spider monkey optimization with hierarchical particle swarm optimization (SMO-HPSO) algorithm achieved an accuracy of 99.17%, specificity of 99.01%, recall of 98.33%, and an F-measure of 98.87%. The effectiveness of the suggested BFO-RF optimization approach in identifying attacks surpasses that of the gradient boosting classifier (GBC). The outcome analysis provides clear evidence that the proposed BFO-RF optimization approach is notably more dependable than the existing SMO-HPSO algorithm.

Keyword

Bacterial foraging optimization, Distributed denial of service, Network intrusion detection systems, Random forest, Recursive feature elimination.

Cite this article

Chikkalwar SR, Garapati Y

Refference

[1][1]Liu G, Quan W, Cheng N, Zhang H, Yu S. Efficient DDoS attacks mitigation for stateful forwarding in internet of things. Journal of Network and Computer Applications. 2019; 130:1-13.

[2][2]Chen W, Xiao S, Liu L, Jiang X, Tang Z. A DDoS attacks traceback scheme for SDN-based smart city. Computers & Electrical Engineering. 2020; 81:106503.

[3][3]Om KCU, Sathia BPR. Detecting and confronting flash attacks from IoT botnets. The Journal of Supercomputing. 2019; 75:8312-38.

[4][4]Choo KK, Gai K, Chiaraviglio L, Yang Q. A multidisciplinary approach to internet of things (IoT) cybersecurity and risk management. Computers & Security. 2021; 102:102136.

[5][5]Elsayed R, Hamada R, Hammoudeh M, Abdalla M, Elsaid SA. A hierarchical deep learning-based intrusion detection architecture for clustered internet of things. Journal of Sensor and Actuator Networks. 2022; 12(1):1-25.

[6][6]Galeano-brajones J, Carmona-murillo J, Valenzuela-valdés JF, Luna-valero F. Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach. Sensors. 2020; 20(3):1-18.

[7][7]Jia Y, Zhong F, Alrawais A, Gong B, Cheng X. Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet of Things Journal. 2020; 7(10):9552-62.

[8][8]Aktar S, Nur AY. Towards DDoS attack detection using deep learning approach. Computers & Security. 2023; 129:103251.

[9][9]Balasubramaniam S, Vijesh JC, Sivakumar TA, Prasanth A, Satheesh KK, Kavitha V, et al. Optimization enabled deep learning-based DDoS attack detection in cloud computing. International Journal of Intelligent Systems. 2023; 2023:1-16.

[10][10]Ortega-fernandez I, Sestelo M, Burguillo JC, Pinon-blanco C. Network intrusion detection system for DDoS attacks in ICS using deep autoencoders. Wireless Networks. 2023:1-7.

[11][11]Elmasry W, Akbulut A, Zaim AH. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks. 2020; 168:107042.

[12][12]Su T, Sun H, Zhu J, Wang S, Li Y. BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access. 2020; 8:29575-85.

[13][13]Gao X, Shan C, Hu C, Niu Z, Liu Z. An adaptive ensemble machine learning model for intrusion detection. IEEE Access. 2019; 7:82512-21.

[14][14]Çavuşoğlu Ü. A new hybrid approach for intrusion detection using machine learning methods. Applied Intelligence. 2019; 49:2735-61.

[15][15]Alosaimi S, Almutairi SM. An intrusion detection system using BoT-IoT. Applied Sciences. 2023; 13(9):1-15.

[16][16]Asgharzadeh H, Ghaffari A, Masdari M, Gharehchopogh FS. Anomaly-based intrusion detection system in the internet of things using a convolutional neural network and multi-objective enhanced capuchin search algorithm. Journal of Parallel and Distributed Computing. 2023; 175:1-21.

[17][17]Roopak M, Tian GY, Chambers J. Multi‐objective‐based feature selection for DDoS attack detection in IoT networks. IET Networks. 2020; 9(3):120-7.

[18][18]Thilagam T, Aruna R. Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express. 2021; 7(4):512-20.

[19][19]Farhan BI, Jasim AD. Performance analysis of intrusion detection for deep learning model based on CSE-CIC-IDS2018 dataset. Indonesian Journal of Electrical Engineering and Computer Science. 2022; 26(2):1165-72.

[20][20]Kim J, Kim J, Kim H, Shim M, Choi E. CNN-based network intrusion detection against denial-of-service attacks. Electronics. 2020; 9(6):1-21.

[21][21]Hagar AA, Gawali BW. Apache spark and deep learning models for high-performance network intrusion detection using CSE-CIC-IDS2018. Computational Intelligence and Neuroscience. 2022; 2022:1-11.

[22][22]Liu L, Wang P, Lin J, Liu L. Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access. 2020; 9:7550-63.

[23][23]Kunang YN, Nurmaini S, Stiawan D, Suprapto BY. Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. Journal of Information Security and Applications. 2021; 58:102804.

[24][24]Injadat M, Moubayed A, Nassif AB, Shami A. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Transactions on Network and Service Management. 2020; 18(2):1803-16.

[25][25]Kan X, Fan Y, Fang Z, Cao L, Xiong NN, Yang D, et al. A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Information Sciences. 2021; 568:147-62.

[26][26]Kunhare N, Tiwari R, Dhar J. Particle swarm optimization and feature selection for intrusion detection system. Sādhanā. 2020; 45:1-4.

[27][27]Atefinia R, Ahmadi M. Network intrusion detection using multi-architectural modular deep neural network. The Journal of Supercomputing. 2021; 77:3571-93.

[28][28]Zhou Y, Cheng G, Jiang S, Dai M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Networks. 2020; 174:107247.

[29][29]Ethala S, Kumarappan A. A hybrid spider monkey and hierarchical particle swarm optimization approach for intrusion detection on internet of things. Sensors. 2022; 22(21):1-18.

[30][30]Hsu CM, Hsieh HY, Prakosa SW, Azhari MZ, Leu JS. Using long-short-term memory based convolutional neural networks for network intrusion detection. In wireless internet: 11th EAI international conference, WiCON, Taipei, Taiwan, 2018, proceedings 2019 (pp. 86-94). Springer International Publishing.

[31][31]Choudhary S, Kesswani N. Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Computer Science. 2020; 167:1561-73.

[32][32]Abu AQ, Al-dala’ien MA. ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks. Journal of Sensor and Actuator Networks. 2022; 11(1):1-15.

[33][33]Batchu RK, Seetha H. A hybrid detection system for DDoS attacks based on deep sparse autoencoder and light gradient boost machine. Journal of Information & Knowledge Management. 2023; 22(01):2250071.

[34][34]Agrawal A, Singh R, Khari M, Vimal S, Lim S. Autoencoder for design of mitigation model for DDOS attacks via M-DBNN. Wireless Communications and Mobile Computing. 2022; 2022:1-14.

[35][35]A RA, D VF, Castro AGA, Niyaz Q, Devabhaktuni V. A machine learning based two-stage Wi-Fi network intrusion detection system. Electronics. 2020; 9(10):1-18.

[36][36]Kannari PR, Chowdary NS, Biradar RL. An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection. Theoretical Computer Science. 2022; 931:56-64.

[37][37]Kilincer IF, Ertam F, Sengur A, Tan RS, Acharya UR. Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybernetics and Biomedical Engineering. 2023; 43(1):30-41.

[38][38]Faysal JA, Mostafa ST, Tamanna JS, Mumenin KM, Arifin MM, Awal MA, et al. XGB-RF: a hybrid machine learning approach for IoT intrusion detection. In Telecom 2022 (pp. 52-69). MDPI.

[39][39]Chen H, Zhang Q, Luo J, Xu Y, Zhang X. An enhanced bacterial foraging optimization and its application for training kernel extreme learning machine. Applied Soft Computing. 2020; 86:105884.

[40][40]Khayyat MM. Improved bacterial foraging optimization with deep learning based anomaly detection in smart cities. Alexandria Engineering Journal. 2023; 75:407-17.

[41][41]Long Y, Liu S, Qiu D, Li C, Guo X, Shi B, et al. Local path planning with multiple constraints for USV based on improved bacterial foraging optimization algorithm. Journal of Marine Science and Engineering. 2023; 11(3):1-13.

[42][42]Li X, Chen W, Zhang Q, Wu L. Building auto-encoder intrusion detection system based on random forest feature selection. Computers & Security. 2020; 95:101851.

[43][43]Fei H, Fan Z, Wang C, Zhang N, Wang T, Chen R, et al. Cotton classification method at the county scale based on multi-features and random forest feature selection algorithm and classifier. Remote Sensing. 2022; 14(4):1-28.

[44][44]Hassan IH, Abdullahi M, Aliyu MM, Yusuf SA, Abdulrahim A. An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intelligent Systems with Applications. 2022; 16:200114.

[45][45]Balaram A, Vasundra S. Prediction of software fault-prone classes using ensemble random forest with adaptive synthetic sampling algorithm. Automated Software Engineering. 2022; 29(1):6.