Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Multi-Objective Whale Optimized With Recurrent Deep Learning For Efficient Intrusion Detection In High Sensitive Network Traffic


Affiliations
1 Department of Computer Science, Sri Sarada College for Women, India
     

   Subscribe/Renew Journal


Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precise manner. By swift technological development, in recent years network systems are becoming highly susceptible to numerous revolutionary intrusion types. However, Deep learning based models are significant with accessible technique for detecting network intrusions of high network traffic. In this work, a method called, Multi-objective Whale Optimized with Recurrent Deep Learning (MWO-RDL) classifier for intrusion detection in high sensitive network traffic is proposed. With high sensitive network traffic as input, initially, Robust Scaler and Multi-objective Whale Optimization-based feature selection is designed for developing feature selection procedure as well as improving accuracy and finally the intrusion detection. The main idea behind the design of model is employed for assessing chosen feature subset that was explored in specified exploration space. Next, a classifier model called, Discrete Mutual Information-based Recurrent Deep Neural Learning is applied to the optimal selected features for classifying according to the characteristics of network traffic features into different type of attacks, normal traffic. Multi-objective Whale Optimized with Recurrent Deep Learning (MWO-RDL) is very suitable for modeling an intrusion detection model with high classification accuracy, intrusion detection rate and that its performance is comparatively better to that of traditional deep learning classification methods in multiclass classification. The MWO-RDL method minimizes false alarm rate of intrusion detection in a timely manner and bestows a novel research of high network traffic.

Keywords

Deep Learning, Multi-objective Whale Optimization, Robust Scaler, Recurrent Deep Learning, Discrete Mutual Information
Subscription Login to verify subscription
User
Notifications
Font Size

  • F. Laghrissi, S. Douzi, K. Douzi and B. Hssina, “Intrusion Detection Systems using Long Short-Term Memory (LSTM)”, Journal of Big Data, Vol. 8, pp. 1-6, 2021.
  • S. Zavrak and M. Iskefiyeli, “Anomaly-based Intrusion Detection from Network Flow Features using Variational Autoencoder”, IEEE Access, Vol. 10, No. 8, pp. 108346-108358, 2020.
  • A. Shenfield and D. Day D, “Intelligent Intrusion Detection Systems using Artificial Neural Networks”, ICT Express, Vol. 1, No. 4, pp. 95-99, 2018.
  • M. Mazini, B. Shirazi and I. Mahdavi, “Anomaly Network-Based Intrusion Detection System using a Reliable Hybrid Artificial Bee Colony and AdaBoost Algorithms”, Journal of King Saud University-Computer and Information Sciences, Vol. 31, No. 4, pp. 541-553, 2019.
  • A.S. Alzahrani, R.A. Shah, Y. Qian and M. Ali, “A Novel Method for Feature Learning and Network Intrusion Classification”, Alexandria Engineering Journal, Vol. 59, No. 3, pp. 1159-1169, 2020.
  • I. Ullah and Q.H. Mahmoud, “Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks”, IEEE Access, Vol. 9, pp. 103906-103926, 2021.
  • O.A. Sarumi, A.O. Adetunmbi and F.A. Adetoye, “Discovering Computer Networks Intrusion using Data Analytics and Machine Intelligence”, Scientific African Journal, Vol. 9, pp. 1-9, 2020.
  • Y. Zhou and M. Dai, “Building an Efficient Intrusion Detection System based on Feature Selection and Ensemble Classifier”, Computer Networks, Vol. 19, pp. 1-15, 2020.
  • Z. Ji, J. Gong and J. Feng, “A Novel Deep Learning Approach for Anomaly Detection of Time Series Data”, Scientific Programming, Vol. 2021, pp. 1-12, 2021.
  • N. Thomas Rincy and Roopam Gupta, “Design and Development of an Efficient Network Intrusion Detection System using Machine Learning Techniques”, Wireless Communications and Mobile Computing, Vol. 2021, pp. 1-11, 2021.
  • J. Lansky, “Deep Learning-Based Intrusion Detection Systems: A Systematic Review”, IEEE Access, Vol. 9, pp. 101574-101599, 2021.
  • A. Drewek Ossowicka, M. Pietrołaj and J. Ruminski, “A Survey of Neural Networks usage for Intrusion Detection Systems”, Journal of Ambient Intelligence and Humanized Computing, Vol. 12, No. 1, pp. 497-514, 2021.
  • N. Moustafa and J. Slay, “UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set)”, Proceedings of International Conference on Military Communications and Information Systems, pp. 1-6, 2015.
  • R.A. Bridges and Q. Chen, “A Survey of Intrusion Detection Systems Leveraging Host Data”, ACM Computing Surveys, Vol. 52, No. 6, pp. 1-35, 2019.
  • Jiadong Ren, Jiawei Guo, Wang Qian,Huang Yuan, Xiaobing Hao and Hu Jingjing, “Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms”, Security and Communication Networks, Vol. 13, No. 1, pp. 1-13, 2019.
  • Soulaiman Moualla, Khaldoun Khorzom and Assef Jafar, “Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset”, Computational Intelligence and Neuroscience, Vol. 2021, pp. 1-13, 2021.
  • Y. Li, R. Qiu and S. Jing, “Intrusion Detection System using Online Sequence Extreme Learning Machine (OS-ELM) in Advanced Metering Infrastructure of Smart Grid”, PloS One, Vol. 13, No. 2, pp. 1-13, 2018.
  • M.J. Kang and J.W. Kang, “Intrusion Detection System using Deep Neural Network for in-Vehicle Network Security”, PloS One, Vol. 11, No. 6, pp. 1-13, 2016.
  • F. Laghrissi, S. Douzi and K. Douzi, “Intrusion Detection Systems using Long Short-Term Memory (LSTM)”, Journal on Big Data, Vol. 8, pp. 65-79, 2021.
  • UNSW Dataset, Available at https://research.unsw.edu.au/projects/unsw-nb15-dataset, Accessed at 2020.

Abstract Views: 120

PDF Views: 2




  • Multi-Objective Whale Optimized With Recurrent Deep Learning For Efficient Intrusion Detection In High Sensitive Network Traffic

Abstract Views: 120  |  PDF Views: 2

Authors

P. Roshni Mol
Department of Computer Science, Sri Sarada College for Women, India
C. Immaculate Mary
Department of Computer Science, Sri Sarada College for Women, India

Abstract


Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precise manner. By swift technological development, in recent years network systems are becoming highly susceptible to numerous revolutionary intrusion types. However, Deep learning based models are significant with accessible technique for detecting network intrusions of high network traffic. In this work, a method called, Multi-objective Whale Optimized with Recurrent Deep Learning (MWO-RDL) classifier for intrusion detection in high sensitive network traffic is proposed. With high sensitive network traffic as input, initially, Robust Scaler and Multi-objective Whale Optimization-based feature selection is designed for developing feature selection procedure as well as improving accuracy and finally the intrusion detection. The main idea behind the design of model is employed for assessing chosen feature subset that was explored in specified exploration space. Next, a classifier model called, Discrete Mutual Information-based Recurrent Deep Neural Learning is applied to the optimal selected features for classifying according to the characteristics of network traffic features into different type of attacks, normal traffic. Multi-objective Whale Optimized with Recurrent Deep Learning (MWO-RDL) is very suitable for modeling an intrusion detection model with high classification accuracy, intrusion detection rate and that its performance is comparatively better to that of traditional deep learning classification methods in multiclass classification. The MWO-RDL method minimizes false alarm rate of intrusion detection in a timely manner and bestows a novel research of high network traffic.

Keywords


Deep Learning, Multi-objective Whale Optimization, Robust Scaler, Recurrent Deep Learning, Discrete Mutual Information

References