Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 231100054-7.doi: 10.11896/jsjkx.231100054

• Information Security • Previous Articles     Next Articles

Intrusion Detection Model Based on Combinatorial Optimization of Improved Pigeon SwarmAlgorithm

WANG Chundong, LEI Jiebin   

  1. School of Computer Science and Engineering,Tianjin University of Technology,Tianjin 300384,China
    National Engineering Laboratory for Computer Virus Prevention and Control Technology,Tianjin 300384,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:WANG Chundong,born in 1969,Ph.D,professor,is a senior member of CCF(No.16230M).His main research interests include network information security,mobile intelligent terminal security,public opinion analysis and control,Internet of Things security and security situation awareness.
  • Supported by:
    Joint Foundation Program of National Natural Science Foundation of China(U1536122) and Tianjin Municipal Science and Technology Commission Major Project(15ZXDSGX00030).

Abstract: Intrusion detection,as a security defense technique to protect the network from attacks,plays an important role in the field of network security.Researchers have proposed different network intrusion detection models using machine learning techniques.However,the problems of feature redundancy and machine learning parameter optimization are still challenges for intrusion detection systems.Existing studies considerthe two as independent problems and optimized them separately.However,the machine learning parameters are closely related to the features in the training data,and changes in the feature set are likely to cause changes in the optimal machine learning parameters.To address this problem,an intrusion detection method based on combined optimization of improved pigeon flocking algorithm(ICOPIO)is proposed.It can simultaneously achieve feature screening and machine learning parameter optimization,avoiding the interference of human parameter settings,reducing the influence of redundant and irrelevant features,and further improving the performance of the intrusion detection model.In addition,Spark is used to parallelize ICOPIO to improve the efficiency of ICOPIO.Finally,two intrusion detection standard datasets,NSL-KDD and UNSW-NB15,are used to evaluate the model,and by comparing with several existing related methods,the proposed model achieves the best results in the evaluation metrics of TPR,FPR,and average accuracy,and it proves that ICOPIO has good scalability.

Key words: Feature selection, Parameter optimization, Intrusion detection, Parallelization, Pigeon swarm algorithm

CLC Number: 

  • TP393
[1]NASIR M H,KHAN S A,KHAN M M,et al.Swarm intelli-gence inspired intrusion detection systems-a systematic literature review[J].Computer Networks,2022,205:108708.
[2]DAMTEW Y G,CHEN H,YUAN Z.Heterogeneous Ensemble Feature Selection for Network Intrusion Detection System[J].International Journal of Computational Intelligence Systems,2023,16(1):9.
[3]DAMTEW Y G,CHEN H,YUAN Z.Heterogeneous Ensemble Feature Selection for Network Intrusion Detection System[J].International Journal of Computational Intelligence Systems,2023,16(1):9.
[4]ALQARNI A A.Toward support-vector machine-based ant col-ony optimization algorithms for intrusion detection[J].Soft Computing,2023,27(10):6297-6305.
[5]PAN J S,TIAN A Q,CHU S C,et al.Improved binary pigeon-inspired optimization and its application for feature selection[J].Applied Intelligence,2021,51(12):8661-8679.
[6]KARLUPIA N,ABROL P.Wrapper-based optimized feature selection using nature-inspired algorithms[J].Neural Computing and Applications,2023,35(17):12675-12689.
[7]TALITA A S,NATAZA O S,RUSTAM Z.Naïve bayes classifier and particle swarm optimization feature selection method for classifying intrusion detection system dataset[C]//Journal of Physics:Conference Series.IOP Publishing,2021.
[8]DAI M.Based on the parallel feature selection and classification methods of network intrusion detection [J].Computer engineering and design,2019,40(3):654-661.
[9]ALMASOUDY F H,AL-YASEEN W L,IDREES A K.Differential evolution wrapper feature selection for intrusion detection system[J].Procedia Computer Science,2020,167:1230-1239.
[10]HASSAN I H,ABDULLAHI M,ALIYU M M,et al.An im-proved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection[J].Intelligent Systems with Applications,2022,16:200114.
[11]STANLEY K O,CLUNE J,LEHMAN J,et al.Designing neural networks through neuroevolution[J].Nature Machine Intelligence,2019,1(1):24-35.
[12]DANG J W,TAN L.Improved Drosophila Algorithm to Optimize Weighted Extreme Learning Machine for Intrusion detection [J].Journal of System Simulation,2021,33(2):331-338.
[13]SERHAT K.PSO+ GWO:a hybrid particle swarm optimization and Grey Wolf optimization based Algorithm for fine-tuning hyper-parameters of convolutional neural networks for Cardiovascular Disease Detection[J].Journal of Ambient Intelligence and Humanized Computing,2023,14(1):87-97.
[14]NIU X,ZHENG Y,FOURNIER-VIGER P,et al.Parallel grid-based density peak clustering of big trajectory data[J].Applied Intelligence,2021:1-16.
[15]LOU P,LU G,JIANG X,et al.Cyber intrusion detectionthrough association rule mining on multi-source logs[J].Applied Intelligence,2021,51:4043-4057.
[16]CHEN H,LIU D,HAN L,et al.A spark-based distributeddragonfly algorithm for feature selection[C]//2020 15th Inter-national Conference on Computer Science & Education(ICCSE).IEEE,2020:419-423.
[17]DUAN H B,YE F.Research Progress of pigeon swarm optimization algorithm [J].Journal of Beijing University of Technology,2017,43(1):1-7.
[18]LIANG X W,JIANG A P,WANG G T,et al.Multi-residue signal Recognition Technique of Sealed Relays based on Parameter Optimization Decision Tree Algorithm[J].Journal of Electronic Measurement & Instrument,20,34(1):178-185.
[19]HARRIS A,MINTARIA A E,STIAWAN D,et al.Improvingthe anomaly detection by combining pso search methods and j48 algorithm[C]//2020 7th International Conference on Electrical Engineering,Computer Sciences and Informatics(EECSI).IEEE,2020:119-126.
[1] TANG Dehong, YANG Hao, WEN Longfei, XU Zhengqiu. Domain Analysis Based Approach to Obtain Identical Results on Varying Number of Processors for Structural Linear Static Software [J]. Computer Science, 2024, 51(9): 87-95.
[2] LI Haixia, SONG Danlei, KONG Jianing, SONG Yafei, CHANG Haiyan. Evaluation of Hyperparameter Optimization Techniques for Traditional Machine Learning Models [J]. Computer Science, 2024, 51(8): 242-255.
[3] SUN Lin, MA Tianjiao. Multilabel Feature Selection Based on Fisher Score with Center Shift and Neighborhood IntuitionisticFuzzy Entropy [J]. Computer Science, 2024, 51(7): 96-107.
[4] LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8.
[5] BAI Xuefei, SHEN Wucheng, WANG Wenjian. Salient Object Detection Based on Feature Attention Purification [J]. Computer Science, 2024, 51(5): 125-133.
[6] GU Chumei, CAO Jianjun, WANG Baowei, XU Yuxin. Specific Emitter Identification Based on Hybrid Feature Selection [J]. Computer Science, 2024, 51(5): 267-276.
[7] WANG Chundong, ZHANG Jiakai. Study on Open Set Based Intrusion Detection Method [J]. Computer Science, 2024, 51(11A): 231000033-6.
[8] FAN Yi, HU Tao, YI Peng. System Call Host Intrusion Detection Technology Based on Generative Adversarial Network [J]. Computer Science, 2024, 51(10): 408-415.
[9] LIU Peigang, SUN Jie, YANG Chaozhi, LI Zongmin. Crowd Counting Based on Multi-scale Feature Aggregation in Dense Scenes [J]. Computer Science, 2023, 50(9): 235-241.
[10] LIANG Yunhui, GAN Jianwen, CHEN Yan, ZHOU Peng, DU Liang. Unsupervised Feature Selection Algorithm Based on Dual Manifold Re-ranking [J]. Computer Science, 2023, 50(7): 72-81.
[11] HUANG Yuhang, SONG You, WANG Baohui. Improved Forest Optimization Feature Selection Algorithm for Credit Evaluation [J]. Computer Science, 2023, 50(6A): 220600241-6.
[12] YIN Xingzi, PENG Ningning, ZHAN Xueyan. Filtered Feature Selection Algorithm Based on Persistent Homology [J]. Computer Science, 2023, 50(6): 159-166.
[13] SUN Lin, LI Mengmeng, XU Jiucheng. Binary Harris Hawk Optimization and Its Feature Selection Algorithm [J]. Computer Science, 2023, 50(5): 277-291.
[14] YANG Pengfei, CAI Ruijie, GUO Shichen, LIU Shengli. Container-based Intrusion Detection Method for Cisco IOS-XE [J]. Computer Science, 2023, 50(4): 298-307.
[15] HU Zhongyuan, XUE Yu, ZHA Jiajie. Survey on Evolutionary Recurrent Neural Networks [J]. Computer Science, 2023, 50(3): 254-265.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!