An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks

Document Type : Original Article

Authors

1 Associate Professor, Faculty of Electrical Engineering, Shahid Sattari University of Aeronautical Sciences and Technology, Tehran, Iran

2 Assistant Professor, Command University and Aja Headquarters, Tehran, Iran

Abstract

In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely detection of these vulnerabilities made by intruders is essential, wherein the cornerstone of security ensures the user's data privacy as an intrusion detection system (IDS). On the other hand, with the rapid development of machine learning (ML) and deep learning (DL) methods in the data world, one of their significant applications is dedicated to IDS using state-of-the-art classification algorithms, which has been the subject of numerous research to enhance accuracy and reliability in recent years. As a consequence, this paper presents a hybrid model integrating feature selection, classification, and hyper-parameters optimization. First, the initial massive features are subjected separately to the modified mutual information (MMI), genetic algorithm (GA), and Anova F-value approaches, followed by extracting the common outputs as optimal and reduced final features. Subsequently, a compound CNN and LSTM classifier (CNN-LSTM) is employed, where its hyper-parameters will be determined through a random switch grey wolf-whale optimization algorithm (RS-GWO-WOA) instead of a time-consuming trial and error manual process. Ultimately, to analyze the suggested scheme, a comparison with other strategies in terms of accuracy, precision, recall, F1 score, and periods of time on the NSL-KDD dataset has been accomplished, confirming the superiority of the developed approach.

Keywords


Smiley face

[1] Di Mauro, M; Galatro, G; Fortino, G; & Liotta, A, "Supervised Feature Selection Techniques in Network Intrusion Detection: A Critical Review," Engineering Application of Artificial Intelligence, vol. 101, pp. 104-216, 2021.‏
[2] Thakkar, A. & Lohiya, R. "A Survey on Intrusion Detection System: Feature Selection, Model, Performance Measures, Application Perspective, Challenges, and Future Research Directions," Artifical Intellignce Review, vol. 55, no. 1, pp. 453-563, 2022.
[3] Almasoudy, F. H. Al-Yaseen, W. L. & Idrees, A. K. "Differential Evolution Wrapper Feature Selection for Intrusion Detection System," Procedia Computer Science, vol. 167, pp. 1230-1239, 2020.
[4] Musa, U. S. Chakraborty, S. Abdullahi, M. M. & Maini, T. "A Review on Intrusion Detection System using Machine Learning Techniques," International Conference on Computing, Communication, and Intelligence Systems (ICCCIS). IEEE, pp. 541-549, 2021.
[5] Panigrahi, R. Borah, S. Bhoi, A. K. Ijaz, M. F. Pramanik, M. Jhaveri, R. H. & Chowdhary, C. L. "Performance Assessment of Supervised Classifiers for Designing Intrusion Detection Systems: A Comprehensive Review and Recommendations for Future Research," Mathematics, vol. 9, no. 6, pp. 690, 2021.
[6] Ozkan-Okay, M. Samet, R. Aslan, Ö. & Gupta, D. "A Comprehensive Systematic Literature Review on Intrusion Detection Systems," IEEE Access, vol. 9, pp. 157727-157760, 2021.
[7] Hodo, E. Bellekens, X. Hamilton, A. Tachtatzis, C. & Atkinson, R. "Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey," arXiv preprint, arXiv:1701.02145, 2017.
[8] Lansky, J. Ali, S. Mohammadi, M. Majeed, M. K. Karim, S. H. T. Rashidi, S. ... & Rahmani, A. M. "Deep Learning-Based Intrusion Detection Systems: A Systematic Review," IEEE Access, vol. 9, pp. 101574-101599, 2021.‏
[9] Lee, S. W. Mohammadi, M. Rashidi, S. Rahmani, A. M. Masdari, M. & Hosseinzadeh, M. "Towards Secure Intrusion Detection Systems using Deep Learning Techniques: Comprehensive Analysis and Review," Journal of Network Computer Application, vol. 187, pp. 103-111, 2021.‏
[10] Ahmad, Z. Shahid Khan, A. Wai Shiang, C. Abdullah, J. & Ahmad, F. "Network Intrusion Detection System: A Systematic Study of Machine Mearning and Deep Learning Approaches," Transaction on Emerging Telecommunications Technologies, vol. 32, no. 1, pp. 41-50, 2021.‏
[11] Akay, B. Karaboga, D. & Akay, R. "A Comprehensive Survey on Optimizing Deep Learning Models by Metaheuristics," Artifical Intelligence Review, pp. 1-66, 2022.‏
[12] Abd Elaziz, M. Dahou, A. Abualigah, L. Yu, L. Alshinwan, M. Khasawneh, A. M. & Lu, S. "Advanced Metaheuristic Optimization Techniques in Applications of Deep Neural Networks: a Review," Neural Computing and Applications, pp. 1-21, 2021.‏
[13] Wang, C. Ye, X. He, X. Tian, Y. & Gong, L. "Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection," Internation Conference, Security and Privacy in New Computing Environments, Springer, Cham, pp. 689-696, 2019.‏
[14] Wang, Z. Tang, M. Deng, J. Wang, Y. Qian, J. & Chen, X. "A New Feature Selection Method for Intrusion Detection," IEEE International Conference on Ubiquitous Computing and Communication (IUCC) Data Science Computational Intelligence (DSCI) Smart Computing Networking and Services (SmartCNS), pp. 298-304, 2019.‏
[15] Najafi, M. & Rafeh, R. "A New Light Weight Intrusion Detection Algorithm for Computer Networks," Advance Defence Science Technology, vol. 8, no. 29, pp. 191-200, 2017. (In Persian)
[16] Keshavarzi, M.; & Momenzadeh, H. "Improving Intrusion Detection Systems by Feature Reducing Based on Genetic Algorithm and Data Mining Techniques," Communication Engineering, vol. 8, no. 32, pp. 1-13, 2019. (In Persian)
[17] Parsa, S.; & Aarabi, S. H. R. "A New Approach to Network Intrusion Detection Based on Hybrid Methods," Electronic and Cyber Defence, vol. 5, no. 3, pp. 79-93, 2017. (In Persian)
[18] Gaur, V.; & Kumar, R. "Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices," Arabian Journal for Science Engineerig, vol. 47, no. 2, pp. 1353-1374, 2022.‏
[19] Hooshmand, M. K. "Using Ensemble Learning Approach to Identify Rare Cyber-Attacks in Network Traffic Data," International Conference on Advanced Computer science and Information Systems (ICACSIS) IEEE, pp. 141-146, 2020.‏
[20] Kazemitabar, J.; Taheri, R.; & Kheradmandian, GH. " A Novel Technique for Improvement of Intrusion Detection via Combining Random Forrest and Genetic Algorithm," Advanced Defence Science Technology, vol. 10, no. 37, pp. 287-296, 2019. (In Persian)
[21] Taheri, R. Parsaei, M. R. & Javidan, R.  "Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection," Advanced Defence Science Technology, vol. 8, no. 29, pp. 251-263, 2017. (In Persian)
[22] Upadhyay, D. Manero, J. Zaman, M. & Sampalli, S. "Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model with Majority Vote Ensemble Algorithm," IEEE Transaction on Network Science and Engineering, vol. 8, no. 3, pp. 2559-2574, 2021.‏
[23] Hassan Nataj Solhdar, M. Janinasab Solahdar, M. & Eskandari, S. "An Intrusion Detection System with a Parallel Multi-Layer Neural Network," Journal of Mathematical Modeling, vol. 9, no. 3, pp. 437-450, 2021.‏
[24] Haghighat, M. H. & Li, J. "Intrusion Detection System using Voting-based Neural Network," Tsinghua Science and Technology, vol. 26, no. 4, pp. 484-495, 2021.‏
[25] Haghnegahdar, L. & Wang, Y. "A Whale Optimization Algorithm-Trained Artificial Neural Network for Smart Grid Cyber Intrusion Detection," Neural Computing and Applications, vol. 32, no. 13, pp. 9427-9441, 2020.‏
[26] Yang, H. & Zhou, Z. "A Novel Intrusion Detection Scheme using Cloud Grey Wolf Optimizer," 37th Chinese Control Conference (CCC) IEEE, pp. 8297-8302, 2018.‏
[27] Chen, C. Song, L. Bo, C. & Shuo, W. "A Support Vector Machine with Particle Swarm Optimization Grey Wolf Optimizer for Network Intrusion Detection, " International Conference on Big Data Analysis Computer Science (BDACS) IEEE, pp. 199-204, 2021.‏
[28] Bala, R. & Nagpal, R. "A Review on Kdd cup99 and Nsl Nsl-kdd Dataset," International Journal Advanced Reserarch in Computer Science, vol. 10, no. 2, 2019.
[29] Amiri, F. Yousefi, M. R. Lucas, C. Shakery, A. & Yazdani, N."Mutual Information-based Feature Selection for Intrusion Detection Systems," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1184-1199, 2011.‏
[30] Shakeela, S. Shankar, N. S. Reddy, P. M. Tulasi, T. K. & Sai, M. M. "Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS," International Journal of Electronics and Telecommunications, vol. 67, no. 2, pp. 267-275, 2021.‏
  • Receive Date: 04 January 2022
  • Revise Date: 20 February 2022
  • Accept Date: 09 August 2022
  • Publish Date: 21 January 2023