An Improved K-Means Clustering Feature Selection and Biogeography Based Optimization for Intrusion Detection

Document Type : Original Article

Author

Department of Computer Sciences, Golestan University, Gorgan, Iran

10.22133/ijwr.2024.423344.1192

Abstract

In order to resolve the issues with Intrusion Detection Systems (IDS), a preprocessing step known as feature selection is utilized. The main objectives of this step are to enhance the accuracy of classification, improve the clustering operation on imbalance dataset and reduce the storage space required. During feature selection, a subset of pertinent and non-duplicative features is chosen from the original set. In this paper, a novel approach for feature selection in intrusion detection is introduced, leveraging an enhanced k-means clustering algorithm. The clustering operation is further improved using the combination of Gravity Search Algorithm (GSA) and Particle Swarm Optimization (PSO) techniques. Additionally, Biogeography Based Optimization (BBO) technique known for its successful performance in addressing classification problems is also employed. To evaluate the proposed approach, it is tested on the UNSW-NB15 intrusion detection dataset. Finally, a comparative analysis is conducted, and the results demonstrate the effectiveness of the proposed approach, in such a way that the value of the detection accuracy parameter in the proposed method was 99.8% and in other methods it was a maximum of 99.2%.

Keywords

Main Subjects


  • Capellupo, J. Liranzo, M.Z.A. Bhuiyan, T. Hayajneh, and G. Wang, “Security and Attack Vector Analysis of IoT Devices,” International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Guangzhou, 2017, pp. 593-606.
  • Xu, F. Wang, R. Egli, A. Fives, R. Howell, \and O. Mcintyre, “Object-Oriented Big Data Security Analytics: A Case Study on Home Network Traffic.” International Conference on Wireless Algorithms, Systems, and Applications, Harbin, 2014, pp. 313-323.
  • K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, and R. Colomo-Palacios, “A machine learning-based intrusion detection for detecting internet of things network attacks,” Alexandria Engineering Journal, vol. 61, pp. 9395-9409, 2022.
  • Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, “A machine learning security framework for iot systems,” IEEE Access, vol. 8, pp. 114066- 114077, 2022.
  • Kumar, H. Chauhan, and D. Panwar, “K-means clustering approach to analyze NSL-KDD intrusion detection dataset,” International Journal of Soft Computing and Engineering (IJSCE), vol. 3, pp. 1-4, 2013.
  • N. Soe, P. I. Santosa, and R. Hartanto, “Ddos attack detection based on simple ann with smote for iot environment,” fourth international conference on informatics and computing (ICIC), 2019, pp. 1-5.
  • Subba, S. Biswas, and S. Karmakar, “A neural network based system for intrusion detection and attack classification,” twenty second national conference on communication (NCC), 2016, pp. 1–6.
  • A. Taher, B. Mohammed Yasin Jisan, and M.M Rahman, “Network intrusion detection using supervised machine learning technique with feature selection,” international conference on robotics, electrical and signal processing techniques (ICREST), 2019, pp. 643–646.
  • Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,” IEEE Internet of Things Journal, vol. 4, pp. 1250–1258, 2017.
  • Maniriho, E. Niyigaba, Z. Bizimana, V. Twiringiyimana, L.J. Mahoro, and T. Ahmad, “Anomaly-based intrusion detection approach for iot networks using machine learning,” international conference on computer engineering, network, and intelligent multimedia (CENIM), 2020, pp. 303–308.
  • Mamdouh, M.A. Elrukhsi, and A. Khattab, “Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey,” International Conference on Computer and Applications, 2018, pp. 215-218.
  • Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri, and G. Baldini, “Security and Privacy Issues for an IoT Based Smart Home,” 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, 2017, pp. 1292-1297.
  • Gurung, M.K. Ghose, and A. Subedi, “Deep learning approach on network intrusion detection system using NSL-KDD dataset,” International Journal of Computer Network and Information Security,” vol. 11, pp. 8-14, 2019.
  • Van Huong, and D.V. Hung, “Intrusion detection in IoT systems based on deep learning using convolutional neural network,” 6th NAFOSTED Conference on Information and Computer Science (NICS), 2019, pp. 448-453.
  • Choras, and M. Pawlicki, “Intrusion detection approach based on optimised artificial neural network,” Neurocomputing, vol. 452, pp. 705-715, 2021.
  • Qaddoura, A. Al-Zoubi, I. Almomani, and H. Faris, “A multi-stage classification approach for iot intrusion detection based on clustering with oversampling,” Applied Sciences, vol. 11, 2021.
  • Saba, T. Sadad, A. Rehman, Z. Mehmood, and Q. Javaid, “Intrusion detection system through advance machine learning for the internet of things networks,” IT Professional, vol. 23, pp.58–64, 2021.
  • Roopak, G.Y. Tian, and J. Chambers, “An intrusion detection system against ddos attacks in iot networks,” 10th annual computing and communication workshop and conference (CCWC), 2020, pp. 562-567.
  • Moustafa, and J. Slay, “A hybrid feature selection for network intrusion detection systems: Central points,” arXiv 2017, arXiv:1707.05505.
  • Gharaee, and H.A. Hosseinvand, “A new feature selection IDS based on genetic algorithm and SVM,” Proceedings of the 2016 8th International Symposium on Telecommunications (IST), 2016, pp. 139-144.
  • Belouch, S. El Hadaj, and M. Idhammad, “A two-stage classifier approach using reptree algorithm for network intrusion detection,” International Journla of Advanced Computing Sciences and Applications, vol. 8, pp. 389–394, 2017.
  • Derhab, A. Aldweesh, A.Z. Emam, and F.A. Khan, “Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering,” Wireless Communications and Mobile Computing, 2020.
  • Ge, X. Fu, N. Syed, Z. Baig, G. Teo, and, A. Robles-Kelly, “learning-based intrusion detection for IoT networks,” IEEE 24th pacific rim international symposium on dependable computing (PRDC), 2019, pp. 256-25609.
  • Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. Lloret, “Network traffic classifier with convolutional and recurrent neural networks for Internet of Things,” IEEE access, vol. 5, pp. 18042-18050, 2017.
  • Yihan, X. Cheng, Z. Taining, and Z. Zhongkai, “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE Access, vol. 7, pp. 42210-42219, 2019.
  • M. Baig, M.M. Awais, E.S.M. El-Alfy, “A multiclass cascade of artificial neural network for network intrusion detection,” Journal of Intelligent and Fuzzy Systems,” vol. 32, pp. 2875–2883, 2017.
  • Al-Zewairi, S. Almajali, and A. Awajan, “Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system,” Proceedings of the 2017 International Conference on New Trends in Computing Sciences (ICTCS), 2017, pp. 167-172.
  • Guha, S.S. Yau, A.B. Buduru, “Attack detection in cloud infrastructures using artificial neural network with genetic feature selection,” Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 2016, pp. 414-419.
  • K. Nguyen, D.T. Hoang, D. Niyato, P. Wang, D. Nguyen, and E. Dutkiewicz, “Cyberattack detection in mobile cloud computing: A deep learning approach,” Proceedings of the 2018 IEEE wireless communications and networking conference (WCNC), 2018, pp. 1–6.
  • Moustafa, G. Misra, and J. Slay, “Generalized outlier gaussian mixture technique based on automated association features for simulating and detecting web application attacks,” IEEE Transanctions on Sustainable Computing, vol. 6, pp. 245–256, 2018.
  • Moustafa, E. Adi, B. Turnbull, J. Hu, “A new threat intelligence scheme for safeguarding industry 4.0 systems,” IEEE Access, vol. 6, pp. 32910–32924, 2018.
  • Simon, “Biogeography-based optimization,” IEEE Transactions on Evolutionary Computation, vol. 12, pp. 702–713, 2008.
  • Albashish, A.I. Hammouri, M. Braik, J. Atwan, and S. Sahran, “Binary biogeography-based optimization based SVM-RFE for feature selection,” Applied Soft Computing, v. 101, pp. 1-19, 2021.
  • Ananda, M.Z. Naf’an, A.B. Arifa, and A. Burhanuddin, “Sistem Rekomendasi Pemilihan Peminatan Menggunakan Density Canopy K-Means,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 4, pp. 172- 179, 2020.
  • C. Benabdellah, A. Benghabrit, and I. Bouhaddou, “A survey of clustering algorithms for an industrial context,” Procedia computer science, vol. 148, pp. 291-302, 2019.
  • Zhang, C. Zhang, and H. Zhang, “Improved K-means Algorithm Based on Density Canopy,” Knowledge-Based Systems, vol. 145, 2018.
  • Waskle, L. Parashar, and U. Singh, “Intrusion detection system using PCA with random forest approach,” International Conference on Electronics and Sustainable Communication Systems (ICESC), (ICESC), 2020, pp. 803-808.
  • Mafarja, I. Aljarah, A.A. Heidari, A.I. Hammouri, H. Faris, A.-Z. Ala’M, S. Mirjalili, “Evolutionary population dynamics and grasshopper optimization approaches for feature selection problems,” Knowledge-Based Systems, vol. 145, pp. 25–45, 2018.
  • Mafarja, I. Aljarah, H. Faris, A.I. Hammouri, A.-Z. Ala’M, and S. Mirjalili, “Binary grasshopper optimisation algorithm approaches for feature selection problems,”
  • Expert Systems and Applications, vol. 117, pp. 267-286, 2019.
  • Samunnisa, G. Kumar, and K. Madhavi, “Intrusion detection system in distributed cloud computing: hybrid clustering and classification methods,” Measurement: Sensors, vol. 25, 100612, 2023.
  • Sivamohan, S.S. Sridhar, and S. Krishnaveni, “An effective recurrent neural network (RNN) based intrusion detection via bi-directional long short-term memory,” International Conference on Intelligent Technologies (CONIT), IEEE, 2021, pp. 1-5.