An Intrusion Detection System in Computer Networks using the Firefly Algorithm and the Fast Learning Network

Document Type : Original Article

Authors

1 Department of Computer Engineering University of Mohaghegh Ardabili

2 Department of Computer Engineering, University of Mohaghegh Ardabili, Ardabil, Iran

Abstract

Due to the extensive use of communication networks and the ease of communicating via wireless networks, these types of networks are increasingly considered. Usability in any environment without the need for monitoring and environmental engineering of these networks has been caused increasing use of it in various fields. It also caused the emergence of security problems in the sending and receiving information that intrusion detection has been raised as the most important issue. Hence, Network intrusion detection system (NIDS) is the process of identifying malicious activity in a network by analyzing the network traffic behavior. A wireless sensor network is composed of sensors that are responsible for collecting information from the environment. These wireless networks, because of the limitation of resources, mobility, and critical tasks, are relatively high vulnerabilities in comparison to other networks. Therefore, forecasting and intrusion detection systems play an important role in providing security in wireless sensor networks that can involve a wide range of attacks. Traffic behavior in the network has many features and dimensions, so dimensionality reduction plays a vital role in IDS, since detecting anomalies from high-dimensional network traffic features is a time-consuming process. Feature selection influences the speed of the analysis and detection. For this purpose, in the current study, a new approach is proposed to predict the intrusion of wireless networks using firefly based feature selection and fast learning network. Selected features in the feature selection phase are used as inputs to the fast learning network to analyze the intrusion of the network in real-time. According to the simulation results, it can be said that the fast neural network method continues training so as to avoid overfitting error. While neural networks further learn training set features until the training process is completed. Thus, the occurrence of overfitting phenomenon in neural networks is common. Therefore, the proposed method grants better performance than the neural network method in predicting new attacks on the network.

Keywords


  • References
    • Liu, X., et al., Information-centric mobile ad hoc networks and content routing: a survey. Ad Hoc Networks, 2017. 58: p. 255-268.
    • Rosas, E., et al., Survey on simulation for mobile ad-hoc communication for disaster scenarios. Journal of Computer Science and Technology, 2016. 31(2): p. 326-349.
    • Rastegari, S., P. Hingston, and C.-P. Lam, Evolving statistical rulesets for network intrusion detection. Applied soft computing, 2015. 33: p. 348-359.
    • Young, C., et al., Survey of Automotive Controller Area Network Intrusion Detection Systems. IEEE Design & Test, 2019.
    • Fotohi, R. and S. Jamali, A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. International journal of Computer Science & Network Solutions, 2014. 2: p. 37-56.
    • Liu, G., Z. Yan, and W. Pedrycz, Data collection for attack detection and security measurement in mobile ad hoc networks: A survey. Journal of Network and Computer Applications, 2018. 105: p. 105-122.
    • Gupta, A.M.V., Comprehensive survey on Blackhole attack with various Detection/Prevention techniques in Ad-hoc network. International Journal of Applied Engineering Research, 2019. 14(8): p. 2009-2017.
    • Yeruru, S.V. and T.R. Rangaswamy, An Anomaly-Based Intrusion Detection System with Multi-Dimensional Trust Parameters for Mobile Ad Hoc Network. International Journal of Intelligence Engineering and Syatems, 2017. 10(4): p. 81-90.
    • Rajalakshmi, D. and K. Meena, A Survey of intrusion detection with higher malicious misbehavior detection in Manet. International journal of civil engineering and technology, 2017. 8.
    • Jamali, S. and V. Shaker, Defense against SYN flooding attacks: a particle swarm optimization approach. Computers & Electrical Engineering, 2014. 40(6): p. 2013-2025.
    • Babasaheb, D.R. and I. Raman. Survey on Fault Tolerance and Security in Mobile Ad Hoc Networks (MANETs). in 2018 3rd International Conference for Convergence in Technology (I2CT). 2018. IEEE.
    • Soms, N. and P. Malathi, Evolution of Intrusion Detection System in MANETs–A Survey. International Journal of Innovations & Advancement in Computer Science (IJIACS), 2017. 6(5).
    • Jamali, S. and R. Fotohi, DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. the Journal of Supercomputing, 2017. 73(12): p. 5173-5196.
    • Scholar, M.T., S. GORAKHPUR, and I.C. Choubey, A survey on malicious nodes in mobile ad hoc network. Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org, 2016. 6(3).
    • Hajimirzaei, B. and N.J. Navimipour, Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express, 2019. 5(1): p. 56-59.
    • Dhanalakshmi, K. and B. Kannapiran, Analysis of KDD CUP Dataset Using Multi-Agent Methodology with Effective Fuzzy Based Intrusion Detection System. Journal of Applied Security Research, 2017. 12(3): p. 424-439.
    • Selvakumar, B. and K. Muneeswaran, Firefly algorithm based feature selection for network intrusion detection. Computers & Security, 2019. 81: p. 148-155.
    • Abedin, M., et al. Performance Analysis of Anomaly Based Network Intrusion Detection Systems. in The 43nd IEEE Conference on Local Computer Networks (LCN). 2018. IEEE Computer Society.
    • Chiba, Z., et al., A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Computers & Security, 2018. 75: p. 36-58.
    • Gupta, A. and A. Dubey, A Survey on Various Applications and Blackhole Attack in Mobile Ad Hoc Network. Recent Trends in Parallel Computing, 2018. 5(1): p. 1-6.
    • Chellam, A., L. Ramanathan, and S. Ramani, Intrusion Detection in Computer Networks using Lazy Learning Algorithm. Procedia computer science, 2018. 132: p. 928-936.
    • Ashfaq, R.A.R., et al., Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 2017. 378: p. 484-497.
    • Karatas, G. and O.K. Sahingoz. Neural network based intrusion detection systems with different training functions. in 2018 6th International Symposium on Digital Forensic and Security (ISDFS). 2018. IEEE.
    • Giokas, I., Systems and methods for self-tuning network intrusion detection and prevention. 2016, Google Patents.
    • Al-Utaibi, K.A. and E.-S.M. El-Alfy, Intrusion detection taxonomy and data pre-processing mechanisms. Journal of Intelligent & Fuzzy Systems, 2018. 34(3): p. 1369-1383.
    • Madbouly, A.I. and T.M. Barakat, Enhanced relevant feature selection model for intrusion detection systems. International Journal of Intelligent Engineering Informatics, 2016. 4(1): p. 21-45.
    • Protić, D. and M. Stanković, Anomaly-Based Intrusion Detection: Feature Selection and Normalization Influence to the Machine Learning Models Accuracy. European Journal of Engineering and Formal Sciences, 2018. 2(3): p. 101-106.
    • Jain, Y.K. and S.K. Bhandare, Min max normalization based data perturbation method for privacy protection. International Journal of Computer & Communication Technology, 2011. 2(8): p. 45-50.
    • Ali, M.H., et al., A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access, 2018. 6: p. 20255-20261.
    • Tilahun, S.L., J.M.T. Ngnotchouye, and N.N. Hamadneh, Continuous versions of firefly algorithm: A review. Artificial Intelligence Review, 2019. 51(3): p. 445-492.
    • Jamali, S. and Y.D. Navaei, A two-level Product Recommender for E-commerce Sites by Using Sequential Pattern Analysis. International Journal of Integrated Engineering, 2016. 8(1).
    • Jamali, S. and G. Shaker, PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm. Computers & Mathematics with Applications, 2012. 63(1): p. 214-221.

    Gurung, S., M.K. Ghose, and A. Subedi, Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset.