Abstract

In this paper, an intrusion detection system is introduced that uses data mining and machine learning concepts to detect network intrusion patterns. In the proposed method, an artificial neural network (ANN) is used as a learning technique in intrusion detection. The metaheuristic algorithm with the swarm-based approach is used to reduce intrusion detection errors. In the proposed method, the Grasshopper Optimization Algorithm (GOA) is used for better and more accurate learning of ANNs to reduce intrusion detection error rate. The role of the GOAMLP algorithm is to minimize the intrusion detection error in the neural network by selecting useful parameters such as weight and bias. Our implementation in MATLAB software and using the KDD and UNSW datasets show that the proposed method detects abnormal, malicious traffic and attacks with high accuracy. The GOAMLP method outperforms and is more accurate than the existing state-of-the-art techniques such as RF, XGBoost, and embedded learning of ANN with BOA, HHO, and BWO algorithms in network intrusion detection.

Highlights

  • Computer networks have grown significantly in recent years

  • One of the standard features of these networks is that each device or node can share its information with other nodes over the internet [4]

  • Developed a multi-objective evolutionary fuzzy system for the Intrusion Detection System (IDS). They presented a method for the network intrusion detection systems (NIDS) using swarm intelligence behavior and artificial neural network Provided a statistical sampling and classification technique with the support vector machine (SVM) technique for the NIDS

Read more

Summary

Introduction

Computer networks have grown significantly in recent years. A variety of them have been introduced and presented for different applications with different benefits. Some good examples include wireless sensor networks (WSNs) [1], vehicular ad hoc networks (VANETs) [2], and the internet of things (IoT) [3]. One of the standard features of these networks is that each device or node can share its information with other nodes over the internet [4]. Attackers and hackers have repeatedly sought gaps to infiltrate the network configuration, steal valuable network information, and disrupt normal function of the network. To this end, hackers or organized cyber-attacks are capable of disrupting entire countries’ computer networks.

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call