Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm

Published: 25 June 2024 Publication History

Abstract

In recent years, the widespread use of the Internet has created many issues, especially in the area of cybersecurity. It is critical to detect intrusions in network traffic, and researchers have developed network intrusion and anomaly detection systems to cope with high numbers of attacks and attack variations. In particular, machine learning and meta-heuristic methods have been widely used for network intrusion detection systems (NIDS). However, existing studies on these systems usually suffer from low performance results such as accuracy, F1-measure, false positive rate, and false negative rate, and generally do not use automatic parameter tuning techniques. To address these challenges, this study proposes a novel approach based on a logistic regression model trained using a parallel artificial bee colony (LR-ABC) algorithm with a hyper-parameter optimization technique. The performance of the proposed model is evaluated against state-of-the-art machine learning and deep learning models on two publicly available NIDS datasets. Comparative performance evaluations show that the proposed method achieved satisfactory results with accuracy of 88.25% on the UNSW-NB15 dataset and 90.11% on the NSL-KDD dataset, and F1-measures of 88.26% and 90.15%, respectively. These findings demonstrate the efficacy of the proposed LR-ABC model in enhancing the accuracy and reliability, while providing a scalable solution to adapt to the dynamic and evolving landscape of cybersecurity threats.

Highlights

Logistic Regression (LR) trained by Artificial Bee Colony (ABC) algorithm is proposed.
CPU and GPU parallelization versions are developed to reduce training time of LR-ABC.
The hyper-parameter optimization technique is used on classification methods.
Comparative analysis are conducted on UNSW-NB15 and NSL-KDD datasets.
LR-ABC model’s performance compared with machine and deep learning models.
LR-ABC model is reliable, robust, and scalable for dynamic cybersecurity threats.

References

[1]
Kemp S., Digital 2019: Global digital overview, 2019, URL https://datareportal.com/reports/digital-2019-global-digital-overview. (Accessed 20March 2022).
[2]
[3]
Sommer R., Paxson V., Outside the closed world: On using machine learning for network intrusion detection, in: Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010, pp. 305–316,.
[4]
Thakkar A., Lohiya R., Role of swarm and evolutionary algorithms for intrusion detection system: A survey, Swarm Evol. Comput. 53 (2020),.
[5]
Bäck T., Fogel D.B., Michalewicz Z., Evolutionary Computation 1: Basic Algorithms and Operators, CRC Press, 2018.
[6]
Balasaraswathi V.R., Sugumaran M., Hamid Y., Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms, J. Commun. Inf. Netw. 2 (4) (2017) 107–119,.
[7]
Peltier T.R., Information security policies, procedures, and standards: Guidelines for effective information security management, CRC Press, 2016.
[8]
Han Y., Yang M., Qi H., He X., Li S., The improved logistic regression models for spam filtering, in: Proceedings of the 2009 International Conference on Asian Language Processing, 2009, pp. 314–317,.
[9]
Karaboga D., An idea based on honey bee swarm for numerical optimization, Erciyes University, Engineering Faculty, Computer Engineering Department, 2005, pp. 1–10.
[10]
Karaboga D., Akay B., A comparative study of artificial bee colony algorithm, Appl. Math. Comput. 214 (1) (2009) 108–132,.
[11]
Akay B., Karaboga D., A modified artificial bee colony algorithm for real-parameter optimization, Inform. Sci. 192 (2012) 120–142,.
[12]
Liu H., Lang B., Machine learning and deep learning methods for intrusion detection systems: A survey, Appl. Sci. 9 (20) (2019) 4396,.
[13]
Hajisalem V., Babaie S., A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection, Comput. Netw. 136 (2018) 37–50,.
[14]
Qureshi A.U.H., Larijani H., Mtetwa N., Javed A., Ahmad J., RNN-ABC: A new swarm optimization based technique for anomaly detection, Computers 8 (3) (2019) 59,.
[15]
Mazini M., Shirazi B., Mahdavi I., Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms, J. King Saud University - Computer and Information Sciences 31 (4) (2019) 541–553,.
[16]
Gu T., Chen H., Chang L., Li L., Intrusion detection system based on improved ABC algorithm with tabu search, IEEJ Trans. Electr. Electron. Eng. 14 (11) (2019) 1652–1660,.
[17]
M. Rani, Employing Artificial Bee Colony Algorithm for Feature Selection in Intrusion Detection System, in: Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development, INDIACom, 2021, pp. 496–500.
[18]
Rani M., Effective network intrusion detection by addressing class imbalance with deep neural networks, Multimedia Tools Appl. 81 (6) (2022) 8499–8518,.
[19]
Dedeturk B.K., Akay B., Spam filtering using a logistic regression model trained by an artificial bee colony algorithm, Appl. Soft Comput. 91 (2020),.
[20]
Kasongo S.M., Sun Y., Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset, J. Big Data 7 (1) (2020) 1–20,.
[21]
S. Solani, N.K. Jadav, A Novel Approach to Reduce False-Negative Alarm Rate in Network-Based Intrusion Detection System Using Linear Discriminant Analysis, in: Proceedings of the Conference on Inventive Communication and Computational Technologies, 2021, pp. 911–921, https://doi.org/10.1007/978-981-15-7345-3_77.
[22]
Meftah S., Rachidi T., Assem N., Network based intrusion detection using the UNSW-NB15 dataset, Int. J. Comput. Digital Syst. 8 (5) (2019) 478–487,.
[23]
Lopez-Martin M., Carro B., Sanchez-Esguevillas A., Lloret J., Shallow neural network with kernel approximation for prediction problems in highly demanding data networks, Expert Syst. Appl. 124 (2019) 196–208,.
[24]
Jing D., Chen H.B., SVM based network intrusion detection for the UNSW-NB15 dataset, in: Proceedings of the 2019 IEEE 13th International Conference on ASIC, ASICON, 2019, pp. 1–4,.
[25]
Moustafa N., Slay J., UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), in: Proceedings of the 2015 Military Communications and Information Systems Conference, MilCIS, 2015, pp. 1–6,.
[26]
Tavallaee M., Bagheri E., Lu W., Ghorbani A., A detailed analysis of the KDD cup 99 data set, in: Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA, 2009, pp. 1–6,.
[27]
Huang C., Li Y., Yao X., A survey of automatic parameter tuning methods for metaheuristics, IEEE Trans. Evol. Comput. 24 (2) (2019) 201–216,.
[28]
Gormez Y., Aydin Z., Karademir R., Gungor V.C., A deep learning approach with Bayesian optimization and ensemble classifiers for detecting denial of service attacks, Int. J. Commun. Syst. 33 (11) (2020),.
[29]
Harris C.R., et al., Array programming with NumPy, Nature 585 (7825) (2020) 357–362,.
[30]
Okuta Ryosuke, Unno Yuya, Nishino Daisuke, Hido Shohei, Loomis Crissman, CuPy: A numpy-compatible library for NVIDIA GPU calculations, in: Proceedings of the Workshop on Machine Learning Systems (LearningSys) At the 31st Conference on Neural Information Processing Systems (NIPS), 2017, URL http://learningsys.org/nips17/assets/papers/paper_16.pdf.
[31]
PyPI : ABC-LR, 2022, URL https://pypi.org/project/abcLR/. (Accessed: 23 March 2022).
[32]
GitHub : ABC-LR, 2022, URL https://github.com/kagandedeturk/ABC-LR. (Accessed: 23 March 2022).
[33]
Pedregosa F., et al., Scikit-learn: Machine learning in python, J. Mach. Learn. Res. 12 (2011) 2825–2830.
[34]
Chollet F., et al., Keras, 2015, https://keras.io.
[35]
Van Rossum G., Drake F.L., Python 3 Reference Manual, CreateSpace, Scotts Valley, CA, 2009.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computer Standards & Interfaces
Computer Standards & Interfaces  Volume 89, Issue C
Apr 2024
269 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 25 June 2024

Author Tags

  1. Network intrusion detection system
  2. Anomaly detection
  3. Machine learning
  4. Artificial bee colony
  5. Logistic regression
  6. UNSW-NB15
  7. NSL-KDD

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Sep 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media