An Improved K-Means Clustering Feature Selection and Biogeography Based Optimization for Intrusion Detection

سال انتشار: 1402
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 24

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJWR-6-2_005

تاریخ نمایه سازی: 27 فروردین 1403

چکیده مقاله:

In order to resolve the issues with Intrusion Detection Systems (IDS), a preprocessing step known as feature selection is utilized. The main objectives of this step are to enhance the accuracy of classification, improve the clustering operation on imbalance dataset and reduce the storage space required. During feature selection, a subset of pertinent and non-duplicative features is chosen from the original set. In this paper, a novel approach for feature selection in intrusion detection is introduced, leveraging an enhanced k-means clustering algorithm. The clustering operation is further improved using the combination of Gravity Search Algorithm (GSA) and Particle Swarm Optimization (PSO) techniques. Additionally, Biogeography Based Optimization (BBO) technique known for its successful performance in addressing classification problems is also employed. To evaluate the proposed approach, it is tested on the UNSW-NB۱۵ intrusion detection dataset. Finally, a comparative analysis is conducted, and the results demonstrate the effectiveness of the proposed approach, in such a way that the value of the detection accuracy parameter in the proposed method was ۹۹.۸% and in other methods it was a maximum of ۹۹.۲%.

کلیدواژه ها:

Intrusion Detection ، Gravity Search Algorithm (GSA) ، Biogeography Based Optimization (BBO) ، K-means Clustering ، Particle Swarm Optimization (PSO)

نویسندگان

Aliakbar Tajari Siahmarzkooh

Department of Computer Sciences, Golestan University, Gorgan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Capellupo, J. Liranzo, M.Z.A. Bhuiyan, T. Hayajneh, and G. Wang, ...
  • Xu, F. Wang, R. Egli, A. Fives, R. Howell, \and ...
  • K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, ...
  • Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, “A ...
  • Kumar, H. Chauhan, and D. Panwar, “K-means clustering approach to ...
  • N. Soe, P. I. Santosa, and R. Hartanto, “Ddos attack ...
  • Subba, S. Biswas, and S. Karmakar, “A neural network based ...
  • A. Taher, B. Mohammed Yasin Jisan, and M.M Rahman, “Network ...
  • Yang, L. Wu, G. Yin, L. Li, and H. Zhao, ...
  • Maniriho, E. Niyigaba, Z. Bizimana, V. Twiringiyimana, L.J. Mahoro, and ...
  • Mamdouh, M.A. Elrukhsi, and A. Khattab, “Securing the Internet of ...
  • Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri, and ...
  • Gurung, M.K. Ghose, and A. Subedi, “Deep learning approach on ...
  • Van Huong, and D.V. Hung, “Intrusion detection in IoT systems ...
  • Choras, and M. Pawlicki, “Intrusion detection approach based on optimised ...
  • Qaddoura, A. Al-Zoubi, I. Almomani, and H. Faris, “A multi-stage ...
  • Saba, T. Sadad, A. Rehman, Z. Mehmood, and Q. Javaid, ...
  • Roopak, G.Y. Tian, and J. Chambers, “An intrusion detection system ...
  • Moustafa, and J. Slay, “A hybrid feature selection for network ...
  • Gharaee, and H.A. Hosseinvand, “A new feature selection IDS based ...
  • Belouch, S. El Hadaj, and M. Idhammad, “A two-stage classifier ...
  • Derhab, A. Aldweesh, A.Z. Emam, and F.A. Khan, “Intrusion detection ...
  • Ge, X. Fu, N. Syed, Z. Baig, G. Teo, and, ...
  • Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. Lloret, “Network traffic ...
  • Yihan, X. Cheng, Z. Taining, and Z. Zhongkai, “An intrusion ...
  • M. Baig, M.M. Awais, E.S.M. El-Alfy, “A multiclass cascade of ...
  • Al-Zewairi, S. Almajali, and A. Awajan, “Experimental evaluation of a ...
  • Guha, S.S. Yau, A.B. Buduru, “Attack detection in cloud infrastructures ...
  • K. Nguyen, D.T. Hoang, D. Niyato, P. Wang, D. Nguyen, ...
  • Moustafa, G. Misra, and J. Slay, “Generalized outlier gaussian mixture ...
  • Moustafa, E. Adi, B. Turnbull, J. Hu, “A new threat ...
  • Simon, “Biogeography-based optimization,” IEEE Transactions on Evolutionary Computation, vol. ۱۲, ...
  • Albashish, A.I. Hammouri, M. Braik, J. Atwan, and S. Sahran, ...
  • Ananda, M.Z. Naf’an, A.B. Arifa, and A. Burhanuddin, “Sistem Rekomendasi ...
  • C. Benabdellah, A. Benghabrit, and I. Bouhaddou, “A survey of ...
  • Zhang, C. Zhang, and H. Zhang, “Improved K-means Algorithm Based ...
  • Waskle, L. Parashar, and U. Singh, “Intrusion detection system using ...
  • Mafarja, I. Aljarah, A.A. Heidari, A.I. Hammouri, H. Faris, A.-Z. ...
  • Mafarja, I. Aljarah, H. Faris, A.I. Hammouri, A.-Z. Ala’M, and ...
  • Expert Systems and Applications, vol. ۱۱۷, pp. ۲۶۷-۲۸۶, ۲۰۱۹ ...
  • Samunnisa, G. Kumar, and K. Madhavi, “Intrusion detection system in ...
  • Sivamohan, S.S. Sridhar, and S. Krishnaveni, “An effective recurrent neural ...
  • نمایش کامل مراجع