تشخیص نفوذ در شبکه با استفاده از الگوریتم بهینه‌سازی ترکیبی تبادل حرارتی و مرغ دریایی

نوع مقاله : مقاله پژوهشی (کاربردی)

نویسندگان

1 استادیار، گروه مهندسی کامپیوتر، دانشگاه پیام نور، تهران، ایران.

2 دکترای مدیریت فناوری اطلاعات، سازمان محیط زیست، تهران، ایران.

10.48301/kssa.2023.389398.2481

چکیده

رشد روزافزون رایانه و اینترنت، بستر جدید و پرکاربردی برای ارائه خدمات شبکه‌ای فراهم نموده است. این امر میزان ارائه خدمات اداری، اجتماعی، مالی، آموزشی و تفریحی را بر روی شبکه و به‌ ویژه اینترنت به طور چشمگیری افزایش داده است. گسترش استفاده از کاربردهای اینترنت، فرصتی برای سوءاستفاده از شبکه و اطلاعات آن برای مقاصد مجرمانه به وجود می‌آورد. براین‌اساس نفوذ در شبکه و دسترسی غیرمجاز به اطلاعات، به یکی از اصلی‌ترین نگرانی‌های کاربران شبکه‌ها و همچنین مدیران شبکه تبدیل شده است. سیستم‌های  تشخیص نفوذ شامل مجموعه‌ای از ابزارها و سازوکارها برای نظارت بر سیستم‌های رایانه‌ای و ترافیک شبکه می‌باشد. روش‌های مختلفی برای تشخیص نفوذ مورداستفاده قرار می‌گیرد، مانند تکنیک‌های آماری، روش‌های مبتنی بردانش و همچنین روش‌های یادگیری ماشین. در این مقاله، یک روش برای تشخیص نفوذ با استفاده از الگوریتم‌های یادگیری ماشین بررسی و پیشنهاد شده است. مدل پیشنهادی، یک روش چند کلاسه می‌باشد که علاوه بر تشخیص نفوذ، نوع حمله را نیز مشخص می‌نماید. این روش یک مدل ترکیبی بوده که در آن از ترکیب الگوریتم­های بهینه‌سازی مرغ دریایی و تبادل حرارتی و الگوریتم جنگل تصادفی استفاده شده است. به‌منظور تحلیل در این پژوهش، مجموعه‌داده CICIDS-2017 به‌کاررفته است. روش پیشنهادی با چندین الگوریتم‌ مختلف مقایسه شده و مقدار دقت در روش پیشنهادی  برابر با 8/98 به‌دست‌آمده که نسبت به بسیاری از روش‌های یادگیری ماشین دارای مقدار بالاتری می‌باشد.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

Network Intrusion Detection Using Thermal Exchange Optimization and Seagull Optimization Algorithm

نویسندگان [English]

  • Mona Emadi 1
  • Mahmoud Niaei 2
1 Assistant Professor, Department of Computer Engineering, Payame Noor University, Tehran, Iran.
2 PhD of Information Technology Management, Environment Protection Agency, Tehran, Iran.
چکیده [English]

The increasing growth of computers and the internet has provided a new and widely used platform for providing network services. This has significantly increased the provision of administrative, social, financial, educational and recreational services on the network, particularly the internet. The expansion of the use of Internet applications creates an opportunity to abuse the network and its information for criminal purposes. Based on this, intrusion into the network and unauthorized access to information have become the main concerns of network users as well as network managers. Intrusion detection systems include a set of tools and mechanisms for monitoring computer systems and network traffic. Various methods are used for intrusion detection, such as statistical techniques, cognitive-based methods, and machine learning methods. In the present research, a method for intrusion detection using machine learning algorithms was reviewed and proposed. The proposed model is a multi-class method that, in addition to intrusion detection, also determines the type of attack. This method is a hybrid model in which the combination of the Seagull optimization algorithm, thermal exchange optimization algorithms and random forest algorithm are used. CICIDS-2017 dataset was used for analysis in this research. The proposed method was compared with several different algorithms and the accuracy value of the proposed method was equal to 98.8, which is higher than that of many machine learning methods.

کلیدواژه‌ها [English]

  • Intrusion Detection Thermal Exchange Optimization Seagull Optimization Algorithm Random Forest CICIDS
  • 2017
[1] Kappagantu, M., Villamor, D. E. V., Bullock, J. M., & Eastwell, K. C. (2017). A rapid isothermal assay for the detection of Hop stunt viroid in hop plants (Humulus lupulus), and its application in disease surveys. Journal of Virological Methods, 245, 81-85. https://d oi.org/10.1016/j.jviromet.2017.04.002
[2] Dhiman, G., & Kumar, V. (2019). Seagull optimization algorithm: Theory and its applications for large-scale industrial engineering problems. Knowledge-Based Systems, 165, 169-196. https://doi.org/10.1016/j.knosys.2018.11.024
[3] Kaveh, A., & Dadras, A. (2017). A novel meta-heuristic optimization algorithm: Thermal exchange optimization. Advances in Engineering Software, 110, 69-84. https://doi.o rg/10.1016/j.advengsoft.2017.03.014
[4] Mohammadi, S., Mirvaziri, H., Ghazizadeh Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80-88. https://doi.org/10.1016/j.jisa.2018.11.007
[5] Rios, A. L. G., Li, Z., Bekshentayeva, K., & Trajković, L. (2020, October 12-14). Detection of Denial of Service Attacks in Communication Networks. 2020 Institute of Electrical and Electronics Engineers International Symposium on Circuits and Systems Seville, Spain. https://doi.org/10.1109/ISCAS45731.2020.9180445
[6] Bedi, P., Gupta, N., & Jindal, V. (2020). Siam-IDS: Handling class imbalance problem in Intrusion Detection Systems using Siamese Neural Network. Procedia Computer Science, 171, 780-789. https://doi.org/10.1016/j.procs.2020.04.085
[7] Marir, N., Wang, H., Feng, G., Li, B., & Jia, M. (2018). Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark. Institute of Electrical and Electronics Engineers Access, 6, 59657-59671. https://doi .org/10.1109/ACCESS.2018.2875045
[8] Kurochkin, I., & Volkov, S. (2020, September 6-13). Using GRU based deep neural network for intrusion detection in software-defined networks. Institute of Physics Conference Series: Materials Science and Engineering 2020:  XIII International Conference on Applied Mathematics and Mechanics in the Aerospace Industry, Alushta, Russia. ht tps://doi.org/10.1088/1757-899X/927/1/012035
[9] Mulyanto, M., Faisal, M., Prakosa, S. W., & Leu, J-S. (2021). Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems. Symmetry, 13(1), 4. https://doi.org/10.3390/sym13010004
[10] Abdolhosseini, M., Abdollahi, R., & Rajaee, M. (2021). Designing of PIλDδ controller for PMBLDC motor using metaheuristic algorithms. Karafan Quarterly Scientific Journal, 17(4), 149-165. https://doi.org/10.48301/kssa.2021.128401
[11] Tama, B. A., & Lim, S. (2021). A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection. Computers Materials & Continua, 66(2), 2217 - 2227. https://doi.org/10.32604/cmc.2020.012432
[12] Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep Learning Approach for Intelligent Intrusion Detection System. Institute of Electrical and Electronics Engineers Access, 7, 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334
[13] Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018, January 22-24). Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, Madeira, Portugal. https://doi.org/10.5220/0006639801080116
[14] Singh Panwar, S., Raiwani, Y., & Panwar, L. S. (2019, March 15). Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset. International Conference on Advances in Engineering Science Management & Technology 2019 Uttaranchal University, Dehradun, India. http://dx.doi.org/10.2 139/ssrn.3394103
[15] Gao, D., Zhang, Y-X., & Zhao, Y-H. (2009). Random forest algorithm for classification of multiwavelength data. Research in Astronomy and Astrophysics, 9(2), 220-226. https://doi.org/10.1088/1674-4527/9/2/011
[16] Bhavani, T. T., Rao, M. K., & Reddy, A. M. (2020). Network Intrusion Detection System Using Random Forest and Decision Tree Machine Learning Techniques. In A. K. Luhach, J. A. Kosa, R. C. Poonia, X.-Z. Gao, & D. Singh (Eds.), First International Conference on Sustainable Technologies for Computational Intelligence. Springer Singapore. h ttps://doi.org/10.1007/978-981-15-0029-9_50
[17] Mirjalili, S. (2016). Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Computing and Applications, 27(4), 1053-1073. https://doi.org/10.1007/s00521-015-1920-1
[18] Rohart, F., Gautier, B., Singh, A., & Lê Cao, K-A. (2017). mixOmics: An R package for ‘omics feature selection and multiple data integration. PLoS computational biology, 13(11), e1005752. https://doi.org/10.1371/journal.pcbi.1005752
[19] Rashno, A., Nazari, B., Sadri, S., & Saraee, M. (2017). Effective pixel classification of Mars images based on ant colony optimization feature selection and extreme learning machine. Neurocomputing, 226, 66-79. https://doi.org/10.1016/j.neucom.2016.11.030
[20] Joshi, R. (2016). Accuracy, Precision, Recall & F1 Score: interpretation of performance measures.