(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Information Security (TIS)

ISSN (Print):XXXX    ISSN (Online):2455-7196
Volume-7 Issue-28 October-2022
Full-Text PDF
Paper Title : Enhancing network security: ACO-KM algorithm for intrusion detection
Author Name : Ashvin Subhashchandra Pandey and Mohan Kumar Patel
Abstract :

In todays world, ensuring the security and integrity of networks is of utmost importance. With the evolving digital landscape, malicious actors employ increasingly sophisticated tactics to gain unauthorized access to sensitive information. Intrusion Detection Systems (IDSs) are pivotal in safeguarding networks by identifying abnormal activities or intrusions. Traditional rule-based IDSs have limitations in detecting evolving threats, leading to the emergence of machine learning-based approaches. This paper explores the integration of Ant Colony Optimization (ACO) and K-means clustering (ACO-KM) to enhance intrusion detection on the NSL-KDD dataset, addressing the need for adaptive IDSs capable of identifying emerging threats. The paper presents a comprehensive literature review, details the ACO-KM algorithm, and evaluates intrusion detection performance. The approach is implemented using NETBEANS IDE and provides flexibility in data selection and classification. Results indicate superior accuracy in detecting Denial of Service (DoS) attacks, emphasizing the efficacy of the proposed ACO-KM algorithm in bolstering network security.

Keywords : Intrusion detection, Network security, Ant colony optimization, NSL-KDD dataset.
Cite this article : Pandey AS, Patel MK. Enhancing network security: ACO-KM algorithm for intrusion detection. ACCENTS Transactions on Information Security. 2022; 7 (28): 23-29. DOI:10.19101/TIS.2022.725014.
References :
[1]Liao HJ, Lin CH, Lin YC, Tung KY. Intrusion detection system: a comprehensive review. Journal of Network and Computer Applications. 2013; 36(1):16-24.
[Crossref] [Google Scholar]
[2]Heidari A, Jabraeil Jamali MA. Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Computing. 2022:1-28.
[Crossref] [Google Scholar]
[3]Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019; 2(1):1-22.
[Crossref] [Google Scholar]
[4]Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. IEEE Access. 2019; 7:41525-50.
[Crossref] [Google Scholar]
[5]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[6]Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F. Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies. 2021; 32(1):e4150.
[Crossref] [Google Scholar]
[7]Smys S, Basar A, Wang H. Hybrid intrusion detection system for internet of things (IoT). Journal of ISMAC. 2020; 2(04):190-9.
[Google Scholar]
[8]Saranya T, Sridevi S, Deisy C, Chung TD, Khan MA. Performance analysis of machine learning algorithms in intrusion detection system: a review. Procedia Computer Science. 2020; 171:1251-60.
[Crossref] [Google Scholar]
[9]Albulayhi K, Abu Al-Haija Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT. IoT intrusion detection using machine learning with a novel high performing feature selection method. Applied Sciences. 2022; 12(10):5015.
[Crossref] [Google Scholar]
[10]Vijay A, Patidar K, Yadav M, Kushwah R. An analytical survey on the role of machine learning algorithms in case of intrusion detection. ACCENTS Transactions on Information Security. 2020; 5 (19): 32-35.
[Crossref] [Google Scholar]
[11]Naseri TS, Gharehchopogh FS. A feature selection based on the farmland fertility algorithm for improved intrusion detection systems. Journal of Network and Systems Management. 2022; 30(3):40.
[Crossref] [Google Scholar]
[12]Ferdiana R. A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods. In 4th international conference on informatics and computational sciences (ICICoS) 2020 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[13]Kopecky S, Dwyer C. Nature inspired metaheuristic techniques of firefly and grey wolf algorithms implemented in phishing intrusion detection systems. In science and information conference 2023 (pp. 1309-32). Cham: Springer Nature Switzerland.
[Crossref] [Google Scholar]
[14]GSR ES, Azees M, Vinodkumar CR, Parthasarathy G. Hybrid optimization enabled deep learning technique for multi-level intrusion detection. Advances in Engineering Software. 2022; 173:103197.
[Crossref] [Google Scholar]
[15]Kumar A, Kumar SA, Dutt V, Kumar Dubey A, Narang S. A hybrid secure cloud platform maintenance based on improved attribute-based encryption strategies. International Journal of Interactive Multimedia and Artificial Intelligence. 2023; 8(2): 150-157.
[Crossref] [Google Scholar]
[16]Hassan IH, Mohammed A, Masama MA. Metaheuristic algorithms in network intrusion detection. Comprehensive Metaheuristics. 2023:95-129.
[Crossref] [Google Scholar]
[17]Liu Z, Xu B, Cheng B, Hu X, Darbandi M. Intrusion detection systems in the cloud computing: a comprehensive and deep literature review. Concurrency and Computation: Practice and Experience. 2022; 34(4):e6646.
[Crossref] [Google Scholar]
[18]Almasoud AS. Intelligent deep learning enabled wild forest fire detection system. Computer Systems Science & Engineering. 2023; 44(2).
[Crossref] [Google Scholar]
[19]Duhayyim MA, Alissa KA, Alrayes FS, Alotaibi SS, Tag El Din EM, Abdelmageed AA, et al. Evolutionary-based deep stacked autoencoder for intrusion detection in a cloud-based cyber-physical system. Applied Sciences. 2022; 12(14):6875.
[Crossref] [Google Scholar]
[20]Maldonado J, Riff MC, Neveu B. A review of recent approaches on wrapper feature selection for intrusion detection. Expert Systems with Applications. 2022; 198:116822.
[Crossref] [Google Scholar]
[21]Zhang C, Jia D, Wang L, Wang W, Liu F, Yang A. Comparative research on network intrusion detection methods based on machine learning. Computers & Security. 2022: 102861.
[Crossref] [Google Scholar]
[22]Balyan AK, Ahuja S, Lilhore UK, Sharma SK, Manoharan P, Algarni AD, et al. A hybrid intrusion detection model using ega-pso and improved random forest method. Sensors. 2022; 22(16):5986.
[Crossref] [Google Scholar]
[23]Ullah MU, Hassan A, Asif M, Farooq MS, Saleem M. Intelligent intrusion detection system for apache web server empowered with machine learning approaches. International Journal of Computational and Innovative Sciences. 2022; 1(1):21-7.
[Google Scholar]
[24]Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA. Anomaly-based intrusion detection system for IoT networks through deep learning model. Computers and Electrical Engineering. 2022; 99:107810.
[Crossref] [Google Scholar]
[25]Liu G, Zhao H, Fan F, Liu G, Xu Q, Nazir S. An enhanced intrusion detection model based on improved kNN in WSNs. Sensors. 2022; 22(4):1407.
[Crossref] [Google Scholar]
[26]Fu Y, Du Y, Cao Z, Li Q, Xiang W. A deep learning model for network intrusion detection with imbalanced data. Electronics. 2022; 11(6):898.
[Crossref] [Google Scholar]
[27]Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R. A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal. 2022; 61(12):9395-409.
[Crossref] [Google Scholar]
[28]Mushtaq E, Zameer A, Umer M, Abbasi AA. A two-stage intrusion detection system with auto-encoder and LSTMs. Applied Soft Computing. 2022; 121:108768.
[Crossref] [Google Scholar]
[29]Wahab OA. Intrusion detection in the iot under data and concept drifts: Online deep learning approach. IEEE Internet of Things Journal. 2022; 9(20):19706-16.
[Crossref] [Google Scholar]
[30]Thakkar A, Lohiya R. Fusion of statistical importance for feature selection in deep neural network-based intrusion detection system. Information Fusion. 2023; 90:353-63.
[Crossref] [Google Scholar]