شبکه عصبی عمیق ترکیبی بهینه ادغام شده با انتخاب ویژگی برای سامانه تشخیص نفوذ در حملات سایبری

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشیار، دانشکده مهندسی برق، دانشگاه علوم و فنون هوایی شهید ستاری، تهران، ایران

2 استادیار، دانشگاه فرماندهی و ستاد آجا، تهران، ایران

چکیده

امروزه در عصر دیجیتال، از آنجا که مسائل امنیتی و حملات سایبری، حریم اطلاعات ایمن و حیاتی سازمان‌ها یا افراد را مختل می‌کنند، بسیار جدی و لازم توجه به شمار می‌روند. بنابراین، تشخیص به موقع این آسیب‌‌ها از طرف نفوذگران ضروری است، به‌طوری که سنگ‌بنای امنیت تحت عنوان سیستم تشخیص نفوذ (IDS)، حریم خصوصی داده‌های کاربر را حفظ نماید. از طرف دیگر، همراه با پیشرفت سریع روش‌های یادگیری ماشین (ML) و یادگیری عمیق (DL) در دنیای داده، یکی از کاربردهای مهم آن‌ها در زمینه IDS با استفاده از الگوریتم‌های طبقه‌بندی پیشرفته است که در سال‌های اخیر موضوع تحقیقات متعددی جهت افزایش دقت و قابلیت اطمینان بوده است. در نتیجه، این مقاله یک مدل ترکیبی IDS را ارائه می‌کند که به ادغام انتخاب ویژگی، طبقه‌بندی و بهینه‌سازی هایپرپارامترها پرداخته است. ابتدا، ویژگی‌های انبوه اولیه به طور جداگانه به روش‌های اطلاعات متقابل اصلاح‌شده (MMI)، الگوریتم ژنتیک (GA)، و آزمون F تحلیل واریانس وارد می‌شوند و پس از آن، اشتراک‌گیری از خروجی آن‌ها به‌عنوان ویژگی‌های نهایی مؤثر و کاهش‌یافته صورت می‌پذیرد. در ادامه، یک طبقه‌بند ترکیبی CNN و LSTM (CNN-LSTM) به کار گرفته می‌شود که هایپرپارامترهای آن به‌جای روش سعی و خطای زمان‌بر دستی، توسط یک الگوریتم بهینه‌سازی به نام گرگ خاکستری - نهنگ با جابه‌جایی تصادفی (RS-GWO-WOA) تعیین خواهد شد. نهایتاً، به‌منظور تجزیه‌وتحلیل طرح پیشنهادی، مقایسه‌ای با سایر روش‌ها از نظر صحت، دقت، یادآوری، امتیاز F1 و مدت‌زمان در مجموعه‌داده NSL-KDD انجام شده است که برتری رویکرد توسعه‌یافته را تأیید می‌نماید.

کلیدواژه‌ها


عنوان مقاله [English]

An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks

نویسندگان [English]

  • Jalil Mazloum 1
  • Hamid Bigdeli 2
1 Associate Professor, Faculty of Electrical Engineering, Shahid Sattari University of Aeronautical Sciences and Technology, Tehran, Iran
2 Assistant Professor, Command University and Aja Headquarters, Tehran, Iran
چکیده [English]

In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely detection of these vulnerabilities made by intruders is essential, wherein the cornerstone of security ensures the user's data privacy as an intrusion detection system (IDS). On the other hand, with the rapid development of machine learning (ML) and deep learning (DL) methods in the data world, one of their significant applications is dedicated to IDS using state-of-the-art classification algorithms, which has been the subject of numerous research to enhance accuracy and reliability in recent years. As a consequence, this paper presents a hybrid model integrating feature selection, classification, and hyper-parameters optimization. First, the initial massive features are subjected separately to the modified mutual information (MMI), genetic algorithm (GA), and Anova F-value approaches, followed by extracting the common outputs as optimal and reduced final features. Subsequently, a compound CNN and LSTM classifier (CNN-LSTM) is employed, where its hyper-parameters will be determined through a random switch grey wolf-whale optimization algorithm (RS-GWO-WOA) instead of a time-consuming trial and error manual process. Ultimately, to analyze the suggested scheme, a comparison with other strategies in terms of accuracy, precision, recall, F1 score, and periods of time on the NSL-KDD dataset has been accomplished, confirming the superiority of the developed approach.

کلیدواژه‌ها [English]

  • Intrusion Detection System
  • Feature Selection
  • Hyper-parameter Optimization
  • Mutual Information
  • Genetic Algorithm
  • Anova F-value
  • Grey Wolf Optimization Algorithm
  • Whale Optimization Algorithm

Smiley face

[1] Di Mauro, M; Galatro, G; Fortino, G; & Liotta, A, "Supervised Feature Selection Techniques in Network Intrusion Detection: A Critical Review," Engineering Application of Artificial Intelligence, vol. 101, pp. 104-216, 2021.‏
[2] Thakkar, A. & Lohiya, R. "A Survey on Intrusion Detection System: Feature Selection, Model, Performance Measures, Application Perspective, Challenges, and Future Research Directions," Artifical Intellignce Review, vol. 55, no. 1, pp. 453-563, 2022.
[3] Almasoudy, F. H. Al-Yaseen, W. L. & Idrees, A. K. "Differential Evolution Wrapper Feature Selection for Intrusion Detection System," Procedia Computer Science, vol. 167, pp. 1230-1239, 2020.
[4] Musa, U. S. Chakraborty, S. Abdullahi, M. M. & Maini, T. "A Review on Intrusion Detection System using Machine Learning Techniques," International Conference on Computing, Communication, and Intelligence Systems (ICCCIS). IEEE, pp. 541-549, 2021.
[5] Panigrahi, R. Borah, S. Bhoi, A. K. Ijaz, M. F. Pramanik, M. Jhaveri, R. H. & Chowdhary, C. L. "Performance Assessment of Supervised Classifiers for Designing Intrusion Detection Systems: A Comprehensive Review and Recommendations for Future Research," Mathematics, vol. 9, no. 6, pp. 690, 2021.
[6] Ozkan-Okay, M. Samet, R. Aslan, Ö. & Gupta, D. "A Comprehensive Systematic Literature Review on Intrusion Detection Systems," IEEE Access, vol. 9, pp. 157727-157760, 2021.
[7] Hodo, E. Bellekens, X. Hamilton, A. Tachtatzis, C. & Atkinson, R. "Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey," arXiv preprint, arXiv:1701.02145, 2017.
[8] Lansky, J. Ali, S. Mohammadi, M. Majeed, M. K. Karim, S. H. T. Rashidi, S. ... & Rahmani, A. M. "Deep Learning-Based Intrusion Detection Systems: A Systematic Review," IEEE Access, vol. 9, pp. 101574-101599, 2021.‏
[9] Lee, S. W. Mohammadi, M. Rashidi, S. Rahmani, A. M. Masdari, M. & Hosseinzadeh, M. "Towards Secure Intrusion Detection Systems using Deep Learning Techniques: Comprehensive Analysis and Review," Journal of Network Computer Application, vol. 187, pp. 103-111, 2021.‏
[10] Ahmad, Z. Shahid Khan, A. Wai Shiang, C. Abdullah, J. & Ahmad, F. "Network Intrusion Detection System: A Systematic Study of Machine Mearning and Deep Learning Approaches," Transaction on Emerging Telecommunications Technologies, vol. 32, no. 1, pp. 41-50, 2021.‏
[11] Akay, B. Karaboga, D. & Akay, R. "A Comprehensive Survey on Optimizing Deep Learning Models by Metaheuristics," Artifical Intelligence Review, pp. 1-66, 2022.‏
[12] Abd Elaziz, M. Dahou, A. Abualigah, L. Yu, L. Alshinwan, M. Khasawneh, A. M. & Lu, S. "Advanced Metaheuristic Optimization Techniques in Applications of Deep Neural Networks: a Review," Neural Computing and Applications, pp. 1-21, 2021.‏
[13] Wang, C. Ye, X. He, X. Tian, Y. & Gong, L. "Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection," Internation Conference, Security and Privacy in New Computing Environments, Springer, Cham, pp. 689-696, 2019.‏
[14] Wang, Z. Tang, M. Deng, J. Wang, Y. Qian, J. & Chen, X. "A New Feature Selection Method for Intrusion Detection," IEEE International Conference on Ubiquitous Computing and Communication (IUCC) Data Science Computational Intelligence (DSCI) Smart Computing Networking and Services (SmartCNS), pp. 298-304, 2019.‏
[15] Najafi, M. & Rafeh, R. "A New Light Weight Intrusion Detection Algorithm for Computer Networks," Advance Defence Science Technology, vol. 8, no. 29, pp. 191-200, 2017. (In Persian)
[16] Keshavarzi, M.; & Momenzadeh, H. "Improving Intrusion Detection Systems by Feature Reducing Based on Genetic Algorithm and Data Mining Techniques," Communication Engineering, vol. 8, no. 32, pp. 1-13, 2019. (In Persian)
[17] Parsa, S.; & Aarabi, S. H. R. "A New Approach to Network Intrusion Detection Based on Hybrid Methods," Electronic and Cyber Defence, vol. 5, no. 3, pp. 79-93, 2017. (In Persian)
[18] Gaur, V.; & Kumar, R. "Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices," Arabian Journal for Science Engineerig, vol. 47, no. 2, pp. 1353-1374, 2022.‏
[19] Hooshmand, M. K. "Using Ensemble Learning Approach to Identify Rare Cyber-Attacks in Network Traffic Data," International Conference on Advanced Computer science and Information Systems (ICACSIS) IEEE, pp. 141-146, 2020.‏
[20] Kazemitabar, J.; Taheri, R.; & Kheradmandian, GH. " A Novel Technique for Improvement of Intrusion Detection via Combining Random Forrest and Genetic Algorithm," Advanced Defence Science Technology, vol. 10, no. 37, pp. 287-296, 2019. (In Persian)
[21] Taheri, R. Parsaei, M. R. & Javidan, R.  "Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection," Advanced Defence Science Technology, vol. 8, no. 29, pp. 251-263, 2017. (In Persian)
[22] Upadhyay, D. Manero, J. Zaman, M. & Sampalli, S. "Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model with Majority Vote Ensemble Algorithm," IEEE Transaction on Network Science and Engineering, vol. 8, no. 3, pp. 2559-2574, 2021.‏
[23] Hassan Nataj Solhdar, M. Janinasab Solahdar, M. & Eskandari, S. "An Intrusion Detection System with a Parallel Multi-Layer Neural Network," Journal of Mathematical Modeling, vol. 9, no. 3, pp. 437-450, 2021.‏
[24] Haghighat, M. H. & Li, J. "Intrusion Detection System using Voting-based Neural Network," Tsinghua Science and Technology, vol. 26, no. 4, pp. 484-495, 2021.‏
[25] Haghnegahdar, L. & Wang, Y. "A Whale Optimization Algorithm-Trained Artificial Neural Network for Smart Grid Cyber Intrusion Detection," Neural Computing and Applications, vol. 32, no. 13, pp. 9427-9441, 2020.‏
[26] Yang, H. & Zhou, Z. "A Novel Intrusion Detection Scheme using Cloud Grey Wolf Optimizer," 37th Chinese Control Conference (CCC) IEEE, pp. 8297-8302, 2018.‏
[27] Chen, C. Song, L. Bo, C. & Shuo, W. "A Support Vector Machine with Particle Swarm Optimization Grey Wolf Optimizer for Network Intrusion Detection, " International Conference on Big Data Analysis Computer Science (BDACS) IEEE, pp. 199-204, 2021.‏
[28] Bala, R. & Nagpal, R. "A Review on Kdd cup99 and Nsl Nsl-kdd Dataset," International Journal Advanced Reserarch in Computer Science, vol. 10, no. 2, 2019.
[29] Amiri, F. Yousefi, M. R. Lucas, C. Shakery, A. & Yazdani, N."Mutual Information-based Feature Selection for Intrusion Detection Systems," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1184-1199, 2011.‏
[30] Shakeela, S. Shankar, N. S. Reddy, P. M. Tulasi, T. K. & Sai, M. M. "Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS," International Journal of Electronics and Telecommunications, vol. 67, no. 2, pp. 267-275, 2021.‏
دوره 10، شماره 4 - شماره پیاپی 40
شماره پیاپی 40، فصلنامه زمستان
بهمن 1401
صفحه 41-51
  • تاریخ دریافت: 14 دی 1400
  • تاریخ بازنگری: 01 اسفند 1400
  • تاریخ پذیرش: 18 مرداد 1401
  • تاریخ انتشار: 01 بهمن 1401