A novel network intrusion detection method based on metaheuristic optimisation algorithms
نویسندگان
چکیده
Abstract The growing use of the Internet with its vulnerabilities has necessitated adoption Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect outsider infiltrations, unauthorised accesses and malfunctions occurring in computer networks. Intrusions can be detected reported network administrator by using various pieces information such as port scanning irregular traffic detection. detection is a classification problem, identifying effective features an essential aspect methods. Standard methods used for neural networks, fuzzy logic, data mining techniques metaheuristics. One novel metaheuristic algorithms introduced address optimisation problems Horse herd Optimisation Algorithm (HOA). This paper introduces new approach on basis HOA intrusion method uses horse behaviours select intrusions interactions between features. For purpose approach, first updated into discrete algorithm floor function. binarised then converted quantum-inspired optimiser integrating concepts quantum computing improve social horses herd. In computing, Q-bit Q-gate aid striking greater balance exploration exploitation processes. resulting multi-objective algorithm, where objectives chosen from set optimal solutions. MQBHOA, which problem. classification, K-Nearest Neighbour (KNN) classifier applied. To evaluate algorithm’s performance, two sets, NSL-KDD (Network Security Laboratory—Knowledge Discovery Data Mining) CSE-CIC-IDS2018, employed packets classified five categories: normal plus four packet types Denial Service (DoS), User Root (U2R), Remote Local (R2L) Probing (Prob). performance was evaluated compared other well-known algorithms, influence parameters degree investigated. results show 6% more success rate average size feature selection accuracy comparison algorithms. It also demonstrates 99.8% detecting
منابع مشابه
Intrusion Detection based on a Novel Hybrid Learning Approach
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...
متن کاملA Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders
Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...
متن کاملA Novel Anomaly-network Intrusion Detection System Using Abc Algorithms
Network Intrusion Detection Systems (NIDSs) are increasingly in demand today as the widespread of networked machines and Internet technologies emerge rapidly. As a result, many unauthorized activities by external and internal attackers within organizations need to be detected in recent years. Thus, it is crucial that organizations should have the capability to detect these unlawful activities s...
متن کاملA Novel Intrusion Detection Method
It is an important issue for the security of network that how to detect new intrusions attack. This paper investigates unsupervised intrusion detection method. A distance definition for mixed attributes, a simple method calculating cluster radius threshold, a outlier factor measured deviating degree of a cluster, and a novel intrusion detection method are proposed in this paper. The experimenta...
متن کاملA Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Ambient Intelligence and Humanized Computing
سال: 2023
ISSN: ['1868-5137', '1868-5145']
DOI: https://doi.org/10.1007/s12652-023-04571-3