ACCENTS Transactions on Information Security (TIS) ISSN (P): 12222 ISSN (O): 2455-7196 Vol - 7, Issue - 28, October 2022
  1. 0
    Google Scholar
  2. 0
    Citation
  3. 0
    Impact Factor
Enhancing network security: ACO-KM algorithm for intrusion detection

Ashvin Subhashchandra Pandey and Mohan Kumar Patel

Abstract

In todays world, ensuring the security and integrity of networks is of utmost importance. With the evolving digital landscape, malicious actors employ increasingly sophisticated tactics to gain unauthorized access to sensitive information. Intrusion Detection Systems (IDSs) are pivotal in safeguarding networks by identifying abnormal activities or intrusions. Traditional rule-based IDSs have limitations in detecting evolving threats, leading to the emergence of machine learning-based approaches. This paper explores the integration of Ant Colony Optimization (ACO) and K-means clustering (ACO-KM) to enhance intrusion detection on the NSL-KDD dataset, addressing the need for adaptive IDSs capable of identifying emerging threats. The paper presents a comprehensive literature review, details the ACO-KM algorithm, and evaluates intrusion detection performance. The approach is implemented using NETBEANS IDE and provides flexibility in data selection and classification. Results indicate superior accuracy in detecting Denial of Service (DoS) attacks, emphasizing the efficacy of the proposed ACO-KM algorithm in bolstering network security.

Keyword

Intrusion detection, Network security, Ant colony optimization, NSL-KDD dataset.

Cite this article

Pandey AS, Patel MK

Refference

[1][1]Liao HJ, Lin CH, Lin YC, Tung KY. Intrusion detection system: a comprehensive review. Journal of Network and Computer Applications. 2013; 36(1):16-24.

[2][2]Heidari A, Jabraeil Jamali MA. Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Computing. 2022:1-28.

[3][3]Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019; 2(1):1-22.

[4][4]Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. IEEE Access. 2019; 7:41525-50.

[5][5]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.

[6][6]Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F. Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies. 2021; 32(1):e4150.

[7][7]Smys S, Basar A, Wang H. Hybrid intrusion detection system for internet of things (IoT). Journal of ISMAC. 2020; 2(04):190-9.

[8][8]Saranya T, Sridevi S, Deisy C, Chung TD, Khan MA. Performance analysis of machine learning algorithms in intrusion detection system: a review. Procedia Computer Science. 2020; 171:1251-60.

[9][9]Albulayhi K, Abu Al-Haija Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT. IoT intrusion detection using machine learning with a novel high performing feature selection method. Applied Sciences. 2022; 12(10):5015.

[10][10]Vijay A, Patidar K, Yadav M, Kushwah R. An analytical survey on the role of machine learning algorithms in case of intrusion detection. ACCENTS Transactions on Information Security. 2020; 5 (19): 32-35.

[11][11]Naseri TS, Gharehchopogh FS. A feature selection based on the farmland fertility algorithm for improved intrusion detection systems. Journal of Network and Systems Management. 2022; 30(3):40.

[12][12]Ferdiana R. A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods. In 4th international conference on informatics and computational sciences (ICICoS) 2020 (pp. 1-6). IEEE.

[13][13]Kopecky S, Dwyer C. Nature inspired metaheuristic techniques of firefly and grey wolf algorithms implemented in phishing intrusion detection systems. In science and information conference 2023 (pp. 1309-32). Cham: Springer Nature Switzerland.

[14][14]GSR ES, Azees M, Vinodkumar CR, Parthasarathy G. Hybrid optimization enabled deep learning technique for multi-level intrusion detection. Advances in Engineering Software. 2022; 173:103197.

[15][15]Kumar A, Kumar SA, Dutt V, Kumar Dubey A, Narang S. A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies. International Journal of Interactive Multimedia and Artificial Intelligence. 2023; 8(2): 150-157.

[16][16]Hassan IH, Mohammed A, Masama MA. Metaheuristic algorithms in network intrusion detection. Comprehensive Metaheuristics. 2023:95-129.

[17][17]Liu Z, Xu B, Cheng B, Hu X, Darbandi M. Intrusion detection systems in the cloud computing: a comprehensive and deep literature review. Concurrency and Computation: Practice and Experience. 2022; 34(4):e6646.

[18][18]Almasoud AS. Intelligent deep learning enabled wild forest fire detection system. Computer Systems Science & Engineering. 2023; 44(2).

[19][19]Duhayyim MA, Alissa KA, Alrayes FS, Alotaibi SS, Tag El Din EM, Abdelmageed AA, et al. Evolutionary-based deep stacked autoencoder for intrusion detection in a cloud-based cyber-physical system. Applied Sciences. 2022; 12(14):6875.

[20][20]Maldonado J, Riff MC, Neveu B. A review of recent approaches on wrapper feature selection for intrusion detection. Expert Systems with Applications. 2022; 198:116822.

[21][21]Zhang C, Jia D, Wang L, Wang W, Liu F, Yang A. Comparative research on network intrusion detection methods based on machine learning. Computers & Security. 2022: 102861.

[22][22]Balyan AK, Ahuja S, Lilhore UK, Sharma SK, Manoharan P, Algarni AD, et al. A hybrid intrusion detection model using ega-pso and improved random forest method. Sensors. 2022; 22(16):5986.

[23][23]Ullah MU, Hassan A, Asif M, Farooq MS, Saleem M. Intelligent intrusion detection system for apache web server empowered with machine learning approaches. International Journal of Computational and Innovative Sciences. 2022; 1(1):21-7.

[24][24]Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA. Anomaly-based intrusion detection system for IoT networks through deep learning model. Computers and Electrical Engineering. 2022; 99:107810.

[25][25]Liu G, Zhao H, Fan F, Liu G, Xu Q, Nazir S. An enhanced intrusion detection model based on improved kNN in WSNs. Sensors. 2022; 22(4):1407.

[26][26]Fu Y, Du Y, Cao Z, Li Q, Xiang W. A deep learning model for network intrusion detection with imbalanced data. Electronics. 2022; 11(6):898.

[27][27]Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R. A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal. 2022; 61(12):9395-409.

[28][28]Mushtaq E, Zameer A, Umer M, Abbasi AA. A two-stage intrusion detection system with auto-encoder and LSTMs. Applied Soft Computing. 2022; 121:108768.

[29][29]Wahab OA. Intrusion detection in the iot under data and concept drifts: Online deep learning approach. IEEE Internet of Things Journal. 2022; 9(20):19706-16.

[30][30]Thakkar A, Lohiya R. Fusion of statistical importance for feature selection in deep neural network-based intrusion detection system. Information Fusion. 2023; 90:353-63.