(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-10 Issue-105 August-2023
Full-Text PDF
Paper Title : Network intrusion detection system using bacterial foraging optimization with random forest
Author Name : Sudha Rani Chikkalwar and Yugandhar Garapati
Abstract :

Network intrusion detection systems (NIDS) are designed to identify distributed denial of service (DDoS) attacks on networks, which manifest as sudden and significant spikes in network traffic. These attacks aim to disrupt the availability of specific nodes or the entire system by either draining supply node resources or jamming their signals. With the proliferation of attacks facilitated by malicious actors leveraging data transfer through Internet of Things (IoT) devices, security vulnerabilities have become prevalent across many networks. To counter these challenges, a novel approach called bacterial foraging optimization with random forest (BFO-RF) optimization is proposed for the identification and classification of DDoS attacks. The input data undergoes preprocessing using an autoencoder within the network security laboratory-knowledge discovery in databases (NSL-KDD) dataset. Following preprocessing, recursive feature elimination (RFE) is employed to extract pertinent features. Subsequently, the suggested BFO-RF optimization approach divides the data, with a focus on low-rate attacks. Once the feature selection process is complete, attacks are classified using a random forest classifier (RFC). The performance of the proposed BFO-RF optimization approach is evaluated, yielding exceptional results: an accuracy of 99.96%, specificity of 99.27%, recall of 99.98%, and an F-measure of 99.62%. In comparison, the established spider monkey optimization with hierarchical particle swarm optimization (SMO-HPSO) algorithm achieved an accuracy of 99.17%, specificity of 99.01%, recall of 98.33%, and an F-measure of 98.87%. The effectiveness of the suggested BFO-RF optimization approach in identifying attacks surpasses that of the gradient boosting classifier (GBC). The outcome analysis provides clear evidence that the proposed BFO-RF optimization approach is notably more dependable than the existing SMO-HPSO algorithm.

Keywords : Bacterial foraging optimization, Distributed denial of service, Network intrusion detection systems, Random forest, Recursive feature elimination.
Cite this article : Chikkalwar SR, Garapati Y. Network intrusion detection system using bacterial foraging optimization with random forest. International Journal of Advanced Technology and Engineering Exploration. 2023; 10(105):1037-1049. DOI:10.19101/IJATEE.2022.10100475.
References :
[1]Liu G, Quan W, Cheng N, Zhang H, Yu S. Efficient DDoS attacks mitigation for stateful forwarding in internet of things. Journal of Network and Computer Applications. 2019; 130:1-13.
[Crossref] [Google Scholar]
[2]Chen W, Xiao S, Liu L, Jiang X, Tang Z. A DDoS attacks traceback scheme for SDN-based smart city. Computers & Electrical Engineering. 2020; 81:106503.
[Crossref] [Google Scholar]
[3]Om KCU, Sathia BPR. Detecting and confronting flash attacks from IoT botnets. The Journal of Supercomputing. 2019; 75:8312-38.
[Crossref] [Google Scholar]
[4]Choo KK, Gai K, Chiaraviglio L, Yang Q. A multidisciplinary approach to internet of things (IoT) cybersecurity and risk management. Computers & Security. 2021; 102:102136.
[Crossref] [Google Scholar]
[5]Elsayed R, Hamada R, Hammoudeh M, Abdalla M, Elsaid SA. A hierarchical deep learning-based intrusion detection architecture for clustered internet of things. Journal of Sensor and Actuator Networks. 2022; 12(1):1-25.
[Crossref] [Google Scholar]
[6]Galeano-brajones J, Carmona-murillo J, Valenzuela-valdés JF, Luna-valero F. Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach. Sensors. 2020; 20(3):1-18.
[Crossref] [Google Scholar]
[7]Jia Y, Zhong F, Alrawais A, Gong B, Cheng X. Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet of Things Journal. 2020; 7(10):9552-62.
[Crossref] [Google Scholar]
[8]Aktar S, Nur AY. Towards DDoS attack detection using deep learning approach. Computers & Security. 2023; 129:103251.
[Crossref] [Google Scholar]
[9]Balasubramaniam S, Vijesh JC, Sivakumar TA, Prasanth A, Satheesh KK, Kavitha V, et al. Optimization enabled deep learning-based DDoS attack detection in cloud computing. International Journal of Intelligent Systems. 2023; 2023:1-16.
[Crossref] [Google Scholar]
[10]Ortega-fernandez I, Sestelo M, Burguillo JC, Pinon-blanco C. Network intrusion detection system for DDoS attacks in ICS using deep autoencoders. Wireless Networks. 2023:1-7.
[Crossref] [Google Scholar]
[11]Elmasry W, Akbulut A, Zaim AH. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks. 2020; 168:107042.
[Crossref] [Google Scholar]
[12]Su T, Sun H, Zhu J, Wang S, Li Y. BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access. 2020; 8:29575-85.
[Crossref] [Google Scholar]
[13]Gao X, Shan C, Hu C, Niu Z, Liu Z. An adaptive ensemble machine learning model for intrusion detection. IEEE Access. 2019; 7:82512-21.
[Crossref] [Google Scholar]
[14]Çavuşoğlu Ü. A new hybrid approach for intrusion detection using machine learning methods. Applied Intelligence. 2019; 49:2735-61.
[Crossref] [Google Scholar]
[15]Alosaimi S, Almutairi SM. An intrusion detection system using BoT-IoT. Applied Sciences. 2023; 13(9):1-15.
[Crossref] [Google Scholar]
[16]Asgharzadeh H, Ghaffari A, Masdari M, Gharehchopogh FS. Anomaly-based intrusion detection system in the internet of things using a convolutional neural network and multi-objective enhanced capuchin search algorithm. Journal of Parallel and Distributed Computing. 2023; 175:1-21.
[Crossref] [Google Scholar]
[17]Roopak M, Tian GY, Chambers J. Multi‐objective‐based feature selection for DDoS attack detection in IoT networks. IET Networks. 2020; 9(3):120-7.
[Crossref] [Google Scholar]
[18]Thilagam T, Aruna R. Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express. 2021; 7(4):512-20.
[Crossref] [Google Scholar]
[19]Farhan BI, Jasim AD. Performance analysis of intrusion detection for deep learning model based on CSE-CIC-IDS2018 dataset. Indonesian Journal of Electrical Engineering and Computer Science. 2022; 26(2):1165-72.
[Crossref] [Google Scholar]
[20]Kim J, Kim J, Kim H, Shim M, Choi E. CNN-based network intrusion detection against denial-of-service attacks. Electronics. 2020; 9(6):1-21.
[Crossref] [Google Scholar]
[21]Hagar AA, Gawali BW. Apache spark and deep learning models for high-performance network intrusion detection using CSE-CIC-IDS2018. Computational Intelligence and Neuroscience. 2022; 2022:1-11.
[Crossref] [Google Scholar]
[22]Liu L, Wang P, Lin J, Liu L. Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access. 2020; 9:7550-63.
[Crossref] [Google Scholar]
[23]Kunang YN, Nurmaini S, Stiawan D, Suprapto BY. Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. Journal of Information Security and Applications. 2021; 58:102804.
[Crossref] [Google Scholar]
[24]Injadat M, Moubayed A, Nassif AB, Shami A. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Transactions on Network and Service Management. 2020; 18(2):1803-16.
[Crossref] [Google Scholar]
[25]Kan X, Fan Y, Fang Z, Cao L, Xiong NN, Yang D, et al. A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Information Sciences. 2021; 568:147-62.
[Crossref] [Google Scholar]
[26]Kunhare N, Tiwari R, Dhar J. Particle swarm optimization and feature selection for intrusion detection system. Sādhanā. 2020; 45:1-4.
[Crossref] [Google Scholar]
[27]Atefinia R, Ahmadi M. Network intrusion detection using multi-architectural modular deep neural network. The Journal of Supercomputing. 2021; 77:3571-93.
[Crossref] [Google Scholar]
[28]Zhou Y, Cheng G, Jiang S, Dai M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Networks. 2020; 174:107247.
[Crossref] [Google Scholar]
[29]Ethala S, Kumarappan A. A hybrid spider monkey and hierarchical particle swarm optimization approach for intrusion detection on internet of things. Sensors. 2022; 22(21):1-18.
[Crossref] [Google Scholar]
[30]Hsu CM, Hsieh HY, Prakosa SW, Azhari MZ, Leu JS. Using long-short-term memory based convolutional neural networks for network intrusion detection. In wireless internet: 11th EAI international conference, WiCON, Taipei, Taiwan, 2018, proceedings 2019 (pp. 86-94). Springer International Publishing.
[Crossref] [Google Scholar]
[31]Choudhary S, Kesswani N. Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Computer Science. 2020; 167:1561-73.
[Crossref] [Google Scholar]
[32]Abu AQ, Al-dala’ien MA. ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks. Journal of Sensor and Actuator Networks. 2022; 11(1):1-15.
[Crossref] [Google Scholar]
[33]Batchu RK, Seetha H. A hybrid detection system for DDoS attacks based on deep sparse autoencoder and light gradient boost machine. Journal of Information & Knowledge Management. 2023; 22(01):2250071.
[Crossref] [Google Scholar]
[34]Agrawal A, Singh R, Khari M, Vimal S, Lim S. Autoencoder for design of mitigation model for DDOS attacks via M-DBNN. Wireless Communications and Mobile Computing. 2022; 2022:1-14.
[Crossref] [Google Scholar]
[35]A RA, D VF, Castro AGA, Niyaz Q, Devabhaktuni V. A machine learning based two-stage Wi-Fi network intrusion detection system. Electronics. 2020; 9(10):1-18.
[Crossref] [Google Scholar]
[36]Kannari PR, Chowdary NS, Biradar RL. An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection. Theoretical Computer Science. 2022; 931:56-64.
[Crossref] [Google Scholar]
[37]Kilincer IF, Ertam F, Sengur A, Tan RS, Acharya UR. Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybernetics and Biomedical Engineering. 2023; 43(1):30-41.
[Crossref] [Google Scholar]
[38]Faysal JA, Mostafa ST, Tamanna JS, Mumenin KM, Arifin MM, Awal MA, et al. XGB-RF: a hybrid machine learning approach for IoT intrusion detection. In Telecom 2022 (pp. 52-69). MDPI.
[Crossref] [Google Scholar]
[39]Chen H, Zhang Q, Luo J, Xu Y, Zhang X. An enhanced bacterial foraging optimization and its application for training kernel extreme learning machine. Applied Soft Computing. 2020; 86:105884.
[Crossref] [Google Scholar]
[40]Khayyat MM. Improved bacterial foraging optimization with deep learning based anomaly detection in smart cities. Alexandria Engineering Journal. 2023; 75:407-17.
[Crossref] [Google Scholar]
[41]Long Y, Liu S, Qiu D, Li C, Guo X, Shi B, et al. Local path planning with multiple constraints for USV based on improved bacterial foraging optimization algorithm. Journal of Marine Science and Engineering. 2023; 11(3):1-13.
[Crossref] [Google Scholar]
[42]Li X, Chen W, Zhang Q, Wu L. Building auto-encoder intrusion detection system based on random forest feature selection. Computers & Security. 2020; 95:101851.
[Crossref] [Google Scholar]
[43]Fei H, Fan Z, Wang C, Zhang N, Wang T, Chen R, et al. Cotton classification method at the county scale based on multi-features and random forest feature selection algorithm and classifier. Remote Sensing. 2022; 14(4):1-28.
[Crossref] [Google Scholar]
[44]Hassan IH, Abdullahi M, Aliyu MM, Yusuf SA, Abdulrahim A. An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intelligent Systems with Applications. 2022; 16:200114.
[Crossref] [Google Scholar]
[45]Balaram A, Vasundra S. Prediction of software fault-prone classes using ensemble random forest with adaptive synthetic sampling algorithm. Automated Software Engineering. 2022; 29(1):6.
[Crossref] [Google Scholar]