Loading…

A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection

Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion detection systems are confronted with dimensionalit...

Full description

Saved in:
Bibliographic Details
Published in:Sensors (Basel, Switzerland) Switzerland), 2022-11, Vol.22 (23), p.9318
Main Authors: Sheikhi, Saeid, Kostakos, Panos
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c508t-d5649676ff197b53159e519bcf7b4a8c969c07f005698d87b81a3d6740184c893
cites cdi_FETCH-LOGICAL-c508t-d5649676ff197b53159e519bcf7b4a8c969c07f005698d87b81a3d6740184c893
container_end_page
container_issue 23
container_start_page 9318
container_title Sensors (Basel, Switzerland)
container_volume 22
creator Sheikhi, Saeid
Kostakos, Panos
description Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion detection systems are confronted with dimensionality difficulties. Prior works have shown that high-dimensional datasets that simulate real-world network data increase the complexity and processing time of IDS system training and testing, while irrelevant features waste resources and reduce the detection rate. In this paper, a new intrusion detection model is presented which uses a genetic algorithm (GA) for feature selection and optimization algorithms for gradient descent. First, the GA-based method is used to select a set of highly correlated features from the NSL-KDD dataset that can significantly improve the detection ability of the proposed model. A Back-Propagation Neural Network (BPNN) is then trained using the HPSOGWO method, a hybrid combination of the Particle Swarm Optimization (PSO) and Grey Wolf Optimization (GWO) algorithms. Finally, the hybrid HPSOGWO-BPNN algorithm is used to solve binary and multi-class classification problems on the NSL-KDD dataset. The experimental outcomes demonstrate that the proposed model achieves better performance than other techniques in terms of accuracy, with a lower error rate and better ability to detect different types of attacks.
doi_str_mv 10.3390/s22239318
format article
fullrecord <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_3e6e481b5abe4f84a8c9da6071225dc9</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A746534317</galeid><doaj_id>oai_doaj_org_article_3e6e481b5abe4f84a8c9da6071225dc9</doaj_id><sourcerecordid>A746534317</sourcerecordid><originalsourceid>FETCH-LOGICAL-c508t-d5649676ff197b53159e519bcf7b4a8c969c07f005698d87b81a3d6740184c893</originalsourceid><addsrcrecordid>eNpdkk1v1DAQQCMEoqVw4A-gSFzgkOLP2L4gpYUuK5VupVJxtBxnsnhJ4q2dtCq_Hm93WbXIh7HGb5491mTZW4yOKVXoUySEUEWxfJYdYkZYIQlBzx_tD7JXMa4QIpRS-TI7oCVHBBFymN1V-YW_hS6vBt-b7r44MRGafD6MYYrOD_kXGMGOm9133yTuOrphmV9eLWY_F8ViPbre_UkFJ5f5BUzBdCmMdz78zs3Q5LNq5zsDM04B8ivotrbX2YvWdBHe7OJRdn329cfpt-J8MZufVueF5UiORcNLpkpRti1WouYUcwUcq9q2omZGWlUqi0SLEC-VbKSoJTa0KQVDWDIrFT3K5ltv481Kr4PrTbjX3jj9kPBhqU0Yne1AUyiBSVxzUwNr5YO-MSUSmBDe2I3r89a1nuoeGgvpk0z3RPr0ZHC_9NLfaiWo4pImwYedIPibCeKoexctdJ0ZwE9RE8EpxQSjDfr-P3TlpzCkr0oUk5wrTDbU8ZZamtSAG1qf7rVpNdA76wdoXcpXgpWcMopFKvi4LbDBxxig3b8eI72ZJb2fpcS-e9zunvw3PPQv1NXBjQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2748559123</pqid></control><display><type>article</type><title>A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection</title><source>Open Access: PubMed Central</source><source>Publicly Available Content Database</source><creator>Sheikhi, Saeid ; Kostakos, Panos</creator><creatorcontrib>Sheikhi, Saeid ; Kostakos, Panos</creatorcontrib><description>Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion detection systems are confronted with dimensionality difficulties. Prior works have shown that high-dimensional datasets that simulate real-world network data increase the complexity and processing time of IDS system training and testing, while irrelevant features waste resources and reduce the detection rate. In this paper, a new intrusion detection model is presented which uses a genetic algorithm (GA) for feature selection and optimization algorithms for gradient descent. First, the GA-based method is used to select a set of highly correlated features from the NSL-KDD dataset that can significantly improve the detection ability of the proposed model. A Back-Propagation Neural Network (BPNN) is then trained using the HPSOGWO method, a hybrid combination of the Particle Swarm Optimization (PSO) and Grey Wolf Optimization (GWO) algorithms. Finally, the hybrid HPSOGWO-BPNN algorithm is used to solve binary and multi-class classification problems on the NSL-KDD dataset. The experimental outcomes demonstrate that the proposed model achieves better performance than other techniques in terms of accuracy, with a lower error rate and better ability to detect different types of attacks.</description><identifier>ISSN: 1424-8220</identifier><identifier>EISSN: 1424-8220</identifier><identifier>DOI: 10.3390/s22239318</identifier><identifier>PMID: 36502022</identifier><language>eng</language><publisher>Switzerland: MDPI AG</publisher><subject>Accuracy ; Algorithms ; anomaly detection ; Back propagation ; Back propagation networks ; Classification ; Communication ; cybersecurity ; Datasets ; Detectors ; Experiments ; Feature selection ; Genetic algorithms ; Intrusion detection systems ; Machine learning ; Mathematical optimization ; Methods ; network intrusion ; network intrusion detection ; Neural networks ; Neural Networks, Computer ; Optimization algorithms ; Propagation ; Reproduction ; Safety and security measures ; Security software ; Support vector machines</subject><ispartof>Sensors (Basel, Switzerland), 2022-11, Vol.22 (23), p.9318</ispartof><rights>COPYRIGHT 2022 MDPI AG</rights><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2022 by the authors. 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c508t-d5649676ff197b53159e519bcf7b4a8c969c07f005698d87b81a3d6740184c893</citedby><cites>FETCH-LOGICAL-c508t-d5649676ff197b53159e519bcf7b4a8c969c07f005698d87b81a3d6740184c893</cites><orcidid>0000-0002-3600-966X ; 0000-0002-8545-599X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2748559123/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2748559123?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,885,25753,27924,27925,37012,37013,44590,53791,53793,75126</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/36502022$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Sheikhi, Saeid</creatorcontrib><creatorcontrib>Kostakos, Panos</creatorcontrib><title>A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection</title><title>Sensors (Basel, Switzerland)</title><addtitle>Sensors (Basel)</addtitle><description>Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion detection systems are confronted with dimensionality difficulties. Prior works have shown that high-dimensional datasets that simulate real-world network data increase the complexity and processing time of IDS system training and testing, while irrelevant features waste resources and reduce the detection rate. In this paper, a new intrusion detection model is presented which uses a genetic algorithm (GA) for feature selection and optimization algorithms for gradient descent. First, the GA-based method is used to select a set of highly correlated features from the NSL-KDD dataset that can significantly improve the detection ability of the proposed model. A Back-Propagation Neural Network (BPNN) is then trained using the HPSOGWO method, a hybrid combination of the Particle Swarm Optimization (PSO) and Grey Wolf Optimization (GWO) algorithms. Finally, the hybrid HPSOGWO-BPNN algorithm is used to solve binary and multi-class classification problems on the NSL-KDD dataset. The experimental outcomes demonstrate that the proposed model achieves better performance than other techniques in terms of accuracy, with a lower error rate and better ability to detect different types of attacks.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>anomaly detection</subject><subject>Back propagation</subject><subject>Back propagation networks</subject><subject>Classification</subject><subject>Communication</subject><subject>cybersecurity</subject><subject>Datasets</subject><subject>Detectors</subject><subject>Experiments</subject><subject>Feature selection</subject><subject>Genetic algorithms</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Mathematical optimization</subject><subject>Methods</subject><subject>network intrusion</subject><subject>network intrusion detection</subject><subject>Neural networks</subject><subject>Neural Networks, Computer</subject><subject>Optimization algorithms</subject><subject>Propagation</subject><subject>Reproduction</subject><subject>Safety and security measures</subject><subject>Security software</subject><subject>Support vector machines</subject><issn>1424-8220</issn><issn>1424-8220</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkk1v1DAQQCMEoqVw4A-gSFzgkOLP2L4gpYUuK5VupVJxtBxnsnhJ4q2dtCq_Hm93WbXIh7HGb5491mTZW4yOKVXoUySEUEWxfJYdYkZYIQlBzx_tD7JXMa4QIpRS-TI7oCVHBBFymN1V-YW_hS6vBt-b7r44MRGafD6MYYrOD_kXGMGOm9133yTuOrphmV9eLWY_F8ViPbre_UkFJ5f5BUzBdCmMdz78zs3Q5LNq5zsDM04B8ivotrbX2YvWdBHe7OJRdn329cfpt-J8MZufVueF5UiORcNLpkpRti1WouYUcwUcq9q2omZGWlUqi0SLEC-VbKSoJTa0KQVDWDIrFT3K5ltv481Kr4PrTbjX3jj9kPBhqU0Yne1AUyiBSVxzUwNr5YO-MSUSmBDe2I3r89a1nuoeGgvpk0z3RPr0ZHC_9NLfaiWo4pImwYedIPibCeKoexctdJ0ZwE9RE8EpxQSjDfr-P3TlpzCkr0oUk5wrTDbU8ZZamtSAG1qf7rVpNdA76wdoXcpXgpWcMopFKvi4LbDBxxig3b8eI72ZJb2fpcS-e9zunvw3PPQv1NXBjQ</recordid><startdate>20221130</startdate><enddate>20221130</enddate><creator>Sheikhi, Saeid</creator><creator>Kostakos, Panos</creator><general>MDPI AG</general><general>MDPI</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>K9.</scope><scope>M0S</scope><scope>M1P</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-3600-966X</orcidid><orcidid>https://orcid.org/0000-0002-8545-599X</orcidid></search><sort><creationdate>20221130</creationdate><title>A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection</title><author>Sheikhi, Saeid ; Kostakos, Panos</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c508t-d5649676ff197b53159e519bcf7b4a8c969c07f005698d87b81a3d6740184c893</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>anomaly detection</topic><topic>Back propagation</topic><topic>Back propagation networks</topic><topic>Classification</topic><topic>Communication</topic><topic>cybersecurity</topic><topic>Datasets</topic><topic>Detectors</topic><topic>Experiments</topic><topic>Feature selection</topic><topic>Genetic algorithms</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Mathematical optimization</topic><topic>Methods</topic><topic>network intrusion</topic><topic>network intrusion detection</topic><topic>Neural networks</topic><topic>Neural Networks, Computer</topic><topic>Optimization algorithms</topic><topic>Propagation</topic><topic>Reproduction</topic><topic>Safety and security measures</topic><topic>Security software</topic><topic>Support vector machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sheikhi, Saeid</creatorcontrib><creatorcontrib>Kostakos, Panos</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>Directory of Open Access Journals</collection><jtitle>Sensors (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sheikhi, Saeid</au><au>Kostakos, Panos</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection</atitle><jtitle>Sensors (Basel, Switzerland)</jtitle><addtitle>Sensors (Basel)</addtitle><date>2022-11-30</date><risdate>2022</risdate><volume>22</volume><issue>23</issue><spage>9318</spage><pages>9318-</pages><issn>1424-8220</issn><eissn>1424-8220</eissn><abstract>Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion detection systems are confronted with dimensionality difficulties. Prior works have shown that high-dimensional datasets that simulate real-world network data increase the complexity and processing time of IDS system training and testing, while irrelevant features waste resources and reduce the detection rate. In this paper, a new intrusion detection model is presented which uses a genetic algorithm (GA) for feature selection and optimization algorithms for gradient descent. First, the GA-based method is used to select a set of highly correlated features from the NSL-KDD dataset that can significantly improve the detection ability of the proposed model. A Back-Propagation Neural Network (BPNN) is then trained using the HPSOGWO method, a hybrid combination of the Particle Swarm Optimization (PSO) and Grey Wolf Optimization (GWO) algorithms. Finally, the hybrid HPSOGWO-BPNN algorithm is used to solve binary and multi-class classification problems on the NSL-KDD dataset. The experimental outcomes demonstrate that the proposed model achieves better performance than other techniques in terms of accuracy, with a lower error rate and better ability to detect different types of attacks.</abstract><cop>Switzerland</cop><pub>MDPI AG</pub><pmid>36502022</pmid><doi>10.3390/s22239318</doi><orcidid>https://orcid.org/0000-0002-3600-966X</orcidid><orcidid>https://orcid.org/0000-0002-8545-599X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1424-8220
ispartof Sensors (Basel, Switzerland), 2022-11, Vol.22 (23), p.9318
issn 1424-8220
1424-8220
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_3e6e481b5abe4f84a8c9da6071225dc9
source Open Access: PubMed Central; Publicly Available Content Database
subjects Accuracy
Algorithms
anomaly detection
Back propagation
Back propagation networks
Classification
Communication
cybersecurity
Datasets
Detectors
Experiments
Feature selection
Genetic algorithms
Intrusion detection systems
Machine learning
Mathematical optimization
Methods
network intrusion
network intrusion detection
Neural networks
Neural Networks, Computer
Optimization algorithms
Propagation
Reproduction
Safety and security measures
Security software
Support vector machines
title A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T17%3A46%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Anomaly-Based%20Intrusion%20Detection%20Model%20Using%20PSOGWO-Optimized%20BP%20Neural%20Network%20and%20GA-Based%20Feature%20Selection&rft.jtitle=Sensors%20(Basel,%20Switzerland)&rft.au=Sheikhi,%20Saeid&rft.date=2022-11-30&rft.volume=22&rft.issue=23&rft.spage=9318&rft.pages=9318-&rft.issn=1424-8220&rft.eissn=1424-8220&rft_id=info:doi/10.3390/s22239318&rft_dat=%3Cgale_doaj_%3EA746534317%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c508t-d5649676ff197b53159e519bcf7b4a8c969c07f005698d87b81a3d6740184c893%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2748559123&rft_id=info:pmid/36502022&rft_galeid=A746534317&rfr_iscdi=true