تشخیص نفوذ در شبکه‌های رایانه‌ای با استفاده از انتخاب ویژگی ترکیبی مؤثر مبتنی بر روش اشتراک‌گیری اطلاعات متقابل، آزمون F تحلیل واریانس و الگوریتم ژنتیک

نوع مقاله : کامپیوتر - محاسبات نرم و هوش مصنوعی

نویسندگان

1 استادیار، گروه مطالعات علم و فناوری دانشگاه فرماندهی و ستاد آجا، تهران، ایران

2 دانشیار، گروه مهندسی برق دانشگاه علوم و فنون هوایی شهید ستاری، تهران، ایران

چکیده

سامانه تشخیص نفوذ (IDS) حجم عظیمی از داده‌ها را مدیریت می‌کند که شامل ویژگی‌های نامرتبط و زائد است که منجر به مصرف منابع قابل توجه، روندهای آموزش و آزمایش طولانی مدت و نرخ تشخیص پایین می‌شود. از این رو، انتخاب ویژگی یک گام مهم در تشخیص نفوذ در نظر گرفته شده است. هدف این پژوهش، معرفی یک راهبرد مبتنی بر اشتراک است که به‌طور بهینه ویژگی‌ها را برای طبقه‌بندی انتخاب می‌کند. این انتخاب ویژگی شامل اشتراک‌گیری از روش‌های اطلاعات متقابل بر اساس مدل انتقال (MIT-MIT)، آزمون F تحلیل واریانس و الگوریتم ژنتیک (GA) است. یک مجموعه داده معیار، به نام NSL-KDD، برای ارزیابی اثربخشی رویکرد پیشنهادی استفاده می‌شود. این مطالعه شامل صحت، دقت، یادآوری و امتیاز F1  به‌عنوان معیارهای ارزیابی برای IDS است که روش پیشنهادی را با طبقه‌بندی کننده‌های پیشرفته تحلیل می‌کند. نتایج ارزیابی تأیید کرده است که الگوریتم انتخاب ویژگی ما ویژگی‌های ضروری‌تری را برای IDS جهت دستیابی به دقت بالا فراهم می‌نماید و از سایر الگوریتم‌های مقایسه‌ای برتری می‌جوید.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

Network Intrusion Detection in Computer Networks Using an Efficacious Combined Feature Selection Technique Based on the Intersection Method of Mutual Information, Anova F-Test and Genetic Algorithm

نویسندگان [English]

  • Jalil Mazloum 1
  • hamid bigdeli 2
1 Department of Electrical Engineering, Shahid Sattari Aeronautical University of Science and Technology
2 AJA Command & Staff University
چکیده [English]

The intrusion detection system (IDS) manages a massive volume of data that comprises irrelevant and redundant features, leading to more significant resource consumption, long-time training and testing procedures, and low detection rate. Hence, feature selection is a crucial phase in intrusion detection. The aim of this paper is to introduce an intersection-based strategy that optimally selects the features for classification. This feature selection involves an intersection of simultaneous mutual information based on the transductive model (MIT-MIT), Anova F-test, and genetic algorithm (GA) methods. A benchmark dataset, named NSL-KDD, is applied to evaluate the effectiveness of the proposed approach. This study includes accuracy, precision, recall, and F1 score as the evaluation metrics for IDS, which analyzes the proposed method with state-of-the-art classifiers. The evaluation results confirm that our feature selection algorithm provides more essential features for IDS to achieve high accuracy, outperforming other comparative algorithms.

کلیدواژه‌ها [English]

  • Intrusion Detection System
  • Feature Selection
  • Mutual Information
  • Anova F-Test
  • Genetic Algorithm

Smiley face

  1. [1] Mehanović, D.; Kečo, D.; Kevrić, J.; Jukić, S.; Miljković, A.; Mašetić, Z. “Feature Selection Using Cloud-based Parallel Genetic Algorithm for Intrusion Detection Data Classification”; Neural Computing and Applications 2021, 33, 11861-11873.
  2. [2] ‏Najafi, M.; Rafeh, R. “A New Light Weight Intrusion Detection Algorithm for Computer Networks”; Adv. Defence Sci.& 2017, 10, 191-200 (In Persian).
  3. [3] Dubey, G. P.; Bhujade, R. K. “Optimal Feature Selection for Machine Learning Based Intrusion Detection System by Exploiting Attribute Dependence”; Materials Today: Proc. 2021, 47, 6325-6331.‏
  4. [4] Kamalov, F.; Moussa, S.; Zgheib, R.; Mashaal, O. “Feature Selection for Intrusion Detection Systems”; 13th Symp. on Computational Intelligence and Design, IEEE, 2020.‏
  5. [5] Shakeela, S.; Shankar, N. S.; Reddy, P. M.; Tulasi, T. K.; Sai, M. M. “Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS”; Int. J. of Electronics and Telecommunications 2021, 67, 267-275.‏
  6. [6] Ibrahim, Z. K.; Thanon, M. Y. “Performance Comparison of Intrusion Detection System Using Three Different Machine Learning Algorithms”; 6th Conf. on Inventive Computation Tech., IEEE, 2021.‏
  7. [7] Kalimuthan, C.; Renjit, J. A. “Review on Intrusion Detection Using Feature Selection with Machine Learning Techniques”; Materials Today: Proc. 2020, 33, 3794-3802.‏
  8. [8] Tajari Siahmarzkooh, A. A. “Intrusion Detection in Computer Networks Using Decision Tree and Feature Reduction”; Electron. Cyber Defence 2017, 9, 99-108 (In Persian).
  9. [9] Sarhan, M.; Layeghy, S.; Portmann, M. “Towards a Standard Feature Set for Network Intrusion Detection System Datasets”; Mobile Networks and Applications 2021, 1-14.‏
  10. [10] Moualla, S.; Khorzom, K.; Jafar, A. “Improving the Performance of Machine Learning-based Network Intrusion Detection Systems on the UNSW-NB15 Dataset”; Computational Intelligence and Neuroscience 2021, 1-13.
  11. [11] ‏Khafajeh, H. A. Y. E. L. “An Efficient Intrusion Detection Approach Using Light Gradient Boosting”; J. Theor. Appl. Inform. Technol. 2020, 98, 825-835.‏
  12. [12] Çalışır, S.; Atay, R.; Pehlivanoğlu, M. K.; Duru, N. “Intrusion Detection Using Machine Learning and Deep Learning Techniques”; 4th Conf. Comput. Sci. Eng., IEEE, 2019.‏
  13. [13] Taheri, R.; Parsaei, M. R.; Javidan, R. “Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection”; Adv. Defence Sci. & Technol. 2017, 10, 251-263 (In Persian).
  14. [14] Mohammadi, M.; Rashid, T. A.; Karim, S. H. T.; Aldalwie, A. H. M.; Tho, Q. T.; Bidaki, M.;... Hosseinzadeh, M. “A Comprehensive Survey and Taxonomy of the SVM-based Intrusion Detection Systems”; J. Network Comput. App. 2021, 178, 102983.‏
  15. [15] Alizadeh, M.; Beheshti, M. T.; Ramezani, A.; Saadatinezhad, H. “Network Traffic Forecasting Based on Fixed Telecommunication Data Using Deep Learning”; 6th Iranian Conf. Signal Proc. Intell. Syst., IEEE, 2020.‏
  16. [16] Thakkar, A.; Lohiya, R. “A Survey on Intrusion Detection System: Feature Selection, Model, Performance Measures, Application Perspective, Challenges, and Future Research Directions”; Artificial Intelligence Review 2021, 1-111.‏
  17. [17] Sultana, N.; Chilamkurti, N.; Peng, W.; Alhadad, R. “Survey on SDN Based Network Intrusion Detection System Using Machine Learning Approaches”; Peer-to-Peer Networking 2019, 12, 493-501.‏
  18. [18] Alizadeh, M.; Mousavi, S. E.; Beheshti, M. T.; Ostadi, A. “Combination of Feature Selection and Hybrid Classifier for Network Intrusion Detection System Based on GWO, BAT, and FA Algorithms”; 6th Iranian Conf. Signal Proc.   Syst., IEEE, 2020.‏
  19. [19] ‏Desale, K. S.; Ade, R. “Genetic Algorithm Based Feature Selection Approach for Effective Intrusion Detection System”; Int. Conf. Comput. Commun. Inform., IEEE, 2015.
  20. [20] ‏Saba, T.; Sadad, T.; Rehman, A.; Mehmood, Z.; Javaid, Q. “Intrusion Detection System through Advance Machine Learning for the Internet of Things Networks”; IT Prof. 2021, 23, 58-64.‏
  21. [21] Lin, C.; Li, A.; Jiang, R. “Automatic Feature Selection and Ensemble Classifier for Intrusion Detection”; J. Phys.: Conf. Series Vol. 1856. No. 1. IOP Publishing, 2021.‏
  22. [22] Dey, S. K.; Rahman, M. M. “Flow Based Anomaly Detection in Software Defined Networking: a Deep Learning Approach with Feature Selection Method”; 4th Conf. Electrical Eng. Inform. & Commun. Tech., IEEE, 2018.
  23. [23] ‏Selvakumar, B.; Muneeswaran, K. “Firefly Algorithm Based Feature Selection for Network Intrusion Detection”; Computers & Security 2019, 81, 148-155.‏
  24. [24] Mohammadi, S.; Desai, V.; Karimipour, H. “Multivariate Mutual Information-based Feature Selection for Cyber Intrusion Detection”; IEEE Electrical Power and Energy Conf., IEEE, 2018.‏
  25. [25] Abhale, A. B.; Manivannan, S. S. “Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network”; Optical Memory and Neural Networks 2020, 29, 244-256.‏
  26. [26] Faker, O.; Dogdu, E. “Intrusion Detection Using Big Data and Deep Learning Techniques”; Proc. 2019 ACM Southeast Conf. 2019.‏
  27. [27] Dobson, A.; Roy, K.; Yuan, X.; Xu, J. “Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection”; 28th Telecommun. Networks App. Conf., IEEE, 2018.‏
  28. [28] Afuwape, A. A.; Xu, Y.; Anajemba, J. H.; Srivastava, G. “Performance Evaluation of Secured Network Traffic Classification Using a Machine Learning Approach”; Computer Standards & Interfaces 2021, 78, 103545.‏
  29. [29] Alrowaily, M.; Alenezi, F.; Lu, Z. “Effectiveness of Machine Learning Based Intrusion Detection Systems”; Int. Conf. Security, Privacy and Anonymity in Computation, Communication and Storage, Springer, Cham, 2019.‏
  30. [30] Dhanabal, L.; Shantharajah, S. P. “A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification ALlgorithms”; Int. J. Adv. Res. Comput. Commun. Eng. 2015, 4, 446-452.‏
  31. [31] Wang, Z.; Tang, M.; Deng, J.; Wang, Y.; Qian, J., Chen, X. “A New Feature Selection Method for Intrusion Detection”; Int. Conf. Ubiquitous Comput. & Commun. and Data Sci. and Computational Intelligence and Smart Computing, Networking and Services, IEEE, 2019.
  32. [32] Sharifiasn, M.; Karshenas, H.; Sharifiasn, S. “Improving Network Intrusion Detection by Identifying Effective Features using Evolutionary Algorithms based on Support Vector Machine”; Comput. Intell. Electrical Eng. 2020, 11, 29-42.‏
  33. [33] Alkafagi, S. S.; Almuttairi; R. M. “A Proactive Model for Optimizing Swarm Search Algorithms for Intrusion Detection System”; J. Phys.: Conf. Series, Vol. 1818, IOP Publishing, 2021.‏