Hybrid Feature Selection Approach to Improve the Deep Neural Network on New Flow-Based Dataset for NIDS

Authors

  • Rawaa Ismael Farhan Department of Computer Science, University of Technology, Wasit University, Iraq
  • Abeer Tariq Maolood Department of Computer Science, University of Technology, Iraq
  • NidaaFlaih Hassan Department of Computer Science, University of Technology, Iraq

DOI:

https://doi.org/10.31185/wjcm.Vol1.Iss1.10

Keywords:

Network Intrusion Detection System, Feature Selection

Abstract

Network Intrusion Detection System (NIDS) detects normal and malicious behavior by analyzing network traffic, this analysis has the potential to detect novel attacks especially in IoT environments. Deep Learning (DL)has proven its outperformance compared to machine learning algorithms in solving the complex problems of the real-world like NIDS. Although, this approach needs more computational resources and consumes a long time. Feature selection plays a significant role in choosing the best features only that describe the target concept optimally during a classification process. However, when handling a large number of features the selecting such relevant features becomes a difficult task. Therefore, this paper proposes Enhanced BPSO using Binary Particle Swarm Optimization (BPSO) and correlation–based (CFS) classical statistical feature selection approach to solve the problem on BPSO feature selection. The selected feature subset has evaluated on Deep Neural Networks (DNN) classifiers and the new flow-based CSE-CIC-IDS2018 dataset. Experimental results have shown a high accuracy of 95% based on processing time, detection rate, and false alarm rate compared with other benchmark classifiers.

References

S. Mishra, R. Sagban, A. Y. & Niketa, and Gandhi, “Swarm intelligence in anomaly detection system: an overview,” International Journal of Computers and Application, 2018.

B. B. Zarpelao, “A Survey of Intrusion Detection in Internet of Things,” Journal of Network and Computer Applications.

H. Liu and B. Lang Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey, vol. 9, pp. 439–439, 2019.

S. Lu, “New Era of Deep learning -Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning,” ArXiv, 2019.

R. C. Staudemeyer, “Applying long short-term memory recurrent neural networks to Intrusion detection,” SACJ, no. 56, 2015.

N. Chockwanich and Vasakavisoottiviseth, “Intrusion Detection by Deep Learning with TensorFlow,” International Conference on Advanced Communications (ICACT), 2019.

Y. Hao, “Variant-Gated Recurrent Units with Encoders to Preprocess Packets for Payload-Aware Intrusion Detection,” IEEE, vol. 7, 2019.

C. Li, “Using a Recurrent Neural Network and Restricted Boltzmann Machines for Malicious Traffic Detection,” Neuro Quantology, vol. 16, 2018.

A. Nisioti, A. Mylonas, P. D. Yoo, and V. Katos From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods.

M. K. Ibraheem Network Intrusion Detection Using Deep Learning Based On Dimensionality Reduction.

C. Kolias, V. Kolias, and G. Kambourakis, “TermID : a distributed swarm intelligence-based approach for wireless intrusion detection,” Int. J. Inf. Secur, 2016.

H. Mujahid and Khalifa, “Particle Swarm Optimization for Deep learning of Convolution Neural Network,” Sudan Conference on Computer Science and Information Technology (SCCSIT), 2017.

G. Vrbanci ˇ c, I. Fister, and V. Podgorelec, “Swarm Intelligence Approaches for Parameter Setting of Deep Learning Neural Network: Case Study ˇ on Phishing Websites Classification,” in International Conference on Web Intelligence, Mining and Semantics, ACM, 2018.

P. Wei, “An Optimization Method for Intrusion Detection Classification Model based on Deep Belief Network,” IEEE.

O. Almomani, . Pso, Gwo, and Algorithms, “A Feature Selection Model for Network Intrusion Detection System Based on,” Symmetry 2020, vol. 12, 1046.

W. Elmasry, A. Akbulut, and A. H. Zaim, “Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic,” Computer Networks, 2019.

. J. Arif, W. Malik, F. A. Shahzad, and Khan, “Network intrusion detection using hybrid binary PSOand random forests algorithm,” Networks, vol. 8, pp. 2646–2660, 2015.

I. Sharafaldin, A. Lashkari, and A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,”

Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), pp. 108–116.

I. Sharafaldin, “Towards a Reliable Intrusion Detection Benchmark Dataset,” Journal of Software Networking, pp. 177–200.

N. Kunhare, R. Tiwari, and J. Dhar, “Particle swarm optimization and feature selection for intrusion detection system,” Sadhana (2020) 45:109.

S. M. H. Bamakan, “A New Intrusion Detection Approach using PSO based Multiple Criteria Linear Programming,” Procedia Computer Science, vol. 55, pp. 231–237, 2015.

D. A. A. G. Singh, “Enhancing the Performance of Classifier Using Particle SwarmOptimization (PSO) - based Dimensionality Reduction,” International Journal of Energy, Information and Communications, vol. 6, pp. 19–26, 2015.

H. Nezamabadi-Pour, M. Rostami-Shahrbabaki, and M. M. Farsangi, “Binary Particle Swarm Optimization: challenges and New Solutions”,” The Journal of Computer Society of Iran (CSI) On Computer Science and Engineering (JCSE), vol. 6, pp. 21–32, 2008.

S. Mahdavifar and A. A. Ghorbani Application of deep learning to cybersecurity: A survey, vol. 347, pp. 149–176, 2019.

M. Mohammadi, “Deep Learning for IoT Big Data and Streaming Analytics: A Survey,” IEEE Communications Surveys & Tutorials, 2018.

R. Ismael, F. Abeer, T. M. Nidaa, and F. H, “Performance Analysis of Flow-Based Attacks Detection on CSE-CIC-IDS2018 Dataset Using Deep Learning,” IJEECS, vol. 20, no. 3, 2020

Downloads

Published

2021-03-30

Issue

Section

Computer

How to Cite

[1]
R. I. . Farhan, A. T. . Maolood, and N. . Hassan, “Hybrid Feature Selection Approach to Improve the Deep Neural Network on New Flow-Based Dataset for NIDS”, WJCMS, pp. 49–61, Mar. 2021, doi: 10.31185/wjcm.Vol1.Iss1.10.