تعداد نشریات | 38 |
تعداد شمارهها | 1,240 |
تعداد مقالات | 8,994 |
تعداد مشاهده مقاله | 7,845,023 |
تعداد دریافت فایل اصل مقاله | 4,706,637 |
شبکه عصبی عمیق ترکیبی بهینه ادغام شده با انتخاب ویژگی برای سامانه تشخیص نفوذ در حملات سایبری | ||
پدافند الکترونیکی و سایبری | ||
مقاله 5، دوره 10، شماره 4 - شماره پیاپی 40، بهمن 1401، صفحه 41-51 اصل مقاله (1.1 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسندگان | ||
جلیل مظلوم* 1؛ حمید بیگدلی2 | ||
1دانشیار، دانشکده مهندسی برق، دانشگاه علوم و فنون هوایی شهید ستاری، تهران، ایران | ||
2استادیار، دانشگاه فرماندهی و ستاد آجا، تهران، ایران | ||
تاریخ دریافت: 14 دی 1400، تاریخ بازنگری: 01 اسفند 1400، تاریخ پذیرش: 18 مرداد 1401 | ||
چکیده | ||
امروزه در عصر دیجیتال، از آنجا که مسائل امنیتی و حملات سایبری، حریم اطلاعات ایمن و حیاتی سازمانها یا افراد را مختل میکنند، بسیار جدی و لازم توجه به شمار میروند. بنابراین، تشخیص به موقع این آسیبها از طرف نفوذگران ضروری است، بهطوری که سنگبنای امنیت تحت عنوان سیستم تشخیص نفوذ (IDS)، حریم خصوصی دادههای کاربر را حفظ نماید. از طرف دیگر، همراه با پیشرفت سریع روشهای یادگیری ماشین (ML) و یادگیری عمیق (DL) در دنیای داده، یکی از کاربردهای مهم آنها در زمینه IDS با استفاده از الگوریتمهای طبقهبندی پیشرفته است که در سالهای اخیر موضوع تحقیقات متعددی جهت افزایش دقت و قابلیت اطمینان بوده است. در نتیجه، این مقاله یک مدل ترکیبی IDS را ارائه میکند که به ادغام انتخاب ویژگی، طبقهبندی و بهینهسازی هایپرپارامترها پرداخته است. ابتدا، ویژگیهای انبوه اولیه به طور جداگانه به روشهای اطلاعات متقابل اصلاحشده (MMI)، الگوریتم ژنتیک (GA)، و آزمون F تحلیل واریانس وارد میشوند و پس از آن، اشتراکگیری از خروجی آنها بهعنوان ویژگیهای نهایی مؤثر و کاهشیافته صورت میپذیرد. در ادامه، یک طبقهبند ترکیبی CNN و LSTM (CNN-LSTM) به کار گرفته میشود که هایپرپارامترهای آن بهجای روش سعی و خطای زمانبر دستی، توسط یک الگوریتم بهینهسازی به نام گرگ خاکستری - نهنگ با جابهجایی تصادفی (RS-GWO-WOA) تعیین خواهد شد. نهایتاً، بهمنظور تجزیهوتحلیل طرح پیشنهادی، مقایسهای با سایر روشها از نظر صحت، دقت، یادآوری، امتیاز F1 و مدتزمان در مجموعهداده NSL-KDD انجام شده است که برتری رویکرد توسعهیافته را تأیید مینماید. | ||
کلیدواژهها | ||
سیستم تشخیص نفوذ؛ انتخاب ویژگی؛ بهینهسازی هایپرپارامترها؛ اطلاعات متقابل؛ الگوریتم ژنتیک؛ آزمون F تحلیل واریانس؛ الگوریتم بهینهسازی گرگ خاکستری؛ الگوریتم بهینهسازی نهنگ | ||
عنوان مقاله [English] | ||
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks | ||
نویسندگان [English] | ||
Jalil Mazloum1؛ Hamid Bigdeli2 | ||
1Associate Professor, Faculty of Electrical Engineering, Shahid Sattari University of Aeronautical Sciences and Technology, Tehran, Iran | ||
2Assistant Professor, Command University and Aja Headquarters, Tehran, Iran | ||
چکیده [English] | ||
In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely detection of these vulnerabilities made by intruders is essential, wherein the cornerstone of security ensures the user's data privacy as an intrusion detection system (IDS). On the other hand, with the rapid development of machine learning (ML) and deep learning (DL) methods in the data world, one of their significant applications is dedicated to IDS using state-of-the-art classification algorithms, which has been the subject of numerous research to enhance accuracy and reliability in recent years. As a consequence, this paper presents a hybrid model integrating feature selection, classification, and hyper-parameters optimization. First, the initial massive features are subjected separately to the modified mutual information (MMI), genetic algorithm (GA), and Anova F-value approaches, followed by extracting the common outputs as optimal and reduced final features. Subsequently, a compound CNN and LSTM classifier (CNN-LSTM) is employed, where its hyper-parameters will be determined through a random switch grey wolf-whale optimization algorithm (RS-GWO-WOA) instead of a time-consuming trial and error manual process. Ultimately, to analyze the suggested scheme, a comparison with other strategies in terms of accuracy, precision, recall, F1 score, and periods of time on the NSL-KDD dataset has been accomplished, confirming the superiority of the developed approach. | ||
کلیدواژهها [English] | ||
Intrusion Detection System, Feature Selection, Hyper-parameter Optimization, Mutual Information, Genetic Algorithm, Anova F-value, Grey Wolf Optimization Algorithm, Whale Optimization Algorithm | ||
مراجع | ||
[1] Di Mauro, M; Galatro, G; Fortino, G; & Liotta, A, "Supervised Feature Selection Techniques in Network Intrusion Detection: A Critical Review," Engineering Application of Artificial Intelligence, vol. 101, pp. 104-216, 2021. [2] Thakkar, A. & Lohiya, R. "A Survey on Intrusion Detection System: Feature Selection, Model, Performance Measures, Application Perspective, Challenges, and Future Research Directions," Artifical Intellignce Review, vol. 55, no. 1, pp. 453-563, 2022. [3] Almasoudy, F. H. Al-Yaseen, W. L. & Idrees, A. K. "Differential Evolution Wrapper Feature Selection for Intrusion Detection System," Procedia Computer Science, vol. 167, pp. 1230-1239, 2020. [4] Musa, U. S. Chakraborty, S. Abdullahi, M. M. & Maini, T. "A Review on Intrusion Detection System using Machine Learning Techniques," International Conference on Computing, Communication, and Intelligence Systems (ICCCIS). IEEE, pp. 541-549, 2021. [5] Panigrahi, R. Borah, S. Bhoi, A. K. Ijaz, M. F. Pramanik, M. Jhaveri, R. H. & Chowdhary, C. L. "Performance Assessment of Supervised Classifiers for Designing Intrusion Detection Systems: A Comprehensive Review and Recommendations for Future Research," Mathematics, vol. 9, no. 6, pp. 690, 2021. [6] Ozkan-Okay, M. Samet, R. Aslan, Ö. & Gupta, D. "A Comprehensive Systematic Literature Review on Intrusion Detection Systems," IEEE Access, vol. 9, pp. 157727-157760, 2021. [7] Hodo, E. Bellekens, X. Hamilton, A. Tachtatzis, C. & Atkinson, R. "Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey," arXiv preprint, arXiv:1701.02145, 2017. [8] Lansky, J. Ali, S. Mohammadi, M. Majeed, M. K. Karim, S. H. T. Rashidi, S. ... & Rahmani, A. M. "Deep Learning-Based Intrusion Detection Systems: A Systematic Review," IEEE Access, vol. 9, pp. 101574-101599, 2021. [9] Lee, S. W. Mohammadi, M. Rashidi, S. Rahmani, A. M. Masdari, M. & Hosseinzadeh, M. "Towards Secure Intrusion Detection Systems using Deep Learning Techniques: Comprehensive Analysis and Review," Journal of Network Computer Application, vol. 187, pp. 103-111, 2021. [10] Ahmad, Z. Shahid Khan, A. Wai Shiang, C. Abdullah, J. & Ahmad, F. "Network Intrusion Detection System: A Systematic Study of Machine Mearning and Deep Learning Approaches," Transaction on Emerging Telecommunications Technologies, vol. 32, no. 1, pp. 41-50, 2021. [11] Akay, B. Karaboga, D. & Akay, R. "A Comprehensive Survey on Optimizing Deep Learning Models by Metaheuristics," Artifical Intelligence Review, pp. 1-66, 2022. [12] Abd Elaziz, M. Dahou, A. Abualigah, L. Yu, L. Alshinwan, M. Khasawneh, A. M. & Lu, S. "Advanced Metaheuristic Optimization Techniques in Applications of Deep Neural Networks: a Review," Neural Computing and Applications, pp. 1-21, 2021. [13] Wang, C. Ye, X. He, X. Tian, Y. & Gong, L. "Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection," Internation Conference, Security and Privacy in New Computing Environments, Springer, Cham, pp. 689-696, 2019. [14] Wang, Z. Tang, M. Deng, J. Wang, Y. Qian, J. & Chen, X. "A New Feature Selection Method for Intrusion Detection," IEEE International Conference on Ubiquitous Computing and Communication (IUCC) Data Science Computational Intelligence (DSCI) Smart Computing Networking and Services (SmartCNS), pp. 298-304, 2019. [15] Najafi, M. & Rafeh, R. "A New Light Weight Intrusion Detection Algorithm for Computer Networks," Advance Defence Science Technology, vol. 8, no. 29, pp. 191-200, 2017. (In Persian) [16] Keshavarzi, M.; & Momenzadeh, H. "Improving Intrusion Detection Systems by Feature Reducing Based on Genetic Algorithm and Data Mining Techniques," Communication Engineering, vol. 8, no. 32, pp. 1-13, 2019. (In Persian) [17] Parsa, S.; & Aarabi, S. H. R. "A New Approach to Network Intrusion Detection Based on Hybrid Methods," Electronic and Cyber Defence, vol. 5, no. 3, pp. 79-93, 2017. (In Persian) [18] Gaur, V.; & Kumar, R. "Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices," Arabian Journal for Science Engineerig, vol. 47, no. 2, pp. 1353-1374, 2022. [19] Hooshmand, M. K. "Using Ensemble Learning Approach to Identify Rare Cyber-Attacks in Network Traffic Data," International Conference on Advanced Computer science and Information Systems (ICACSIS) IEEE, pp. 141-146, 2020. [20] Kazemitabar, J.; Taheri, R.; & Kheradmandian, GH. " A Novel Technique for Improvement of Intrusion Detection via Combining Random Forrest and Genetic Algorithm," Advanced Defence Science Technology, vol. 10, no. 37, pp. 287-296, 2019. (In Persian) [21] Taheri, R. Parsaei, M. R. & Javidan, R. "Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection," Advanced Defence Science Technology, vol. 8, no. 29, pp. 251-263, 2017. (In Persian) [22] Upadhyay, D. Manero, J. Zaman, M. & Sampalli, S. "Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model with Majority Vote Ensemble Algorithm," IEEE Transaction on Network Science and Engineering, vol. 8, no. 3, pp. 2559-2574, 2021. [23] Hassan Nataj Solhdar, M. Janinasab Solahdar, M. & Eskandari, S. "An Intrusion Detection System with a Parallel Multi-Layer Neural Network," Journal of Mathematical Modeling, vol. 9, no. 3, pp. 437-450, 2021. [24] Haghighat, M. H. & Li, J. "Intrusion Detection System using Voting-based Neural Network," Tsinghua Science and Technology, vol. 26, no. 4, pp. 484-495, 2021. [25] Haghnegahdar, L. & Wang, Y. "A Whale Optimization Algorithm-Trained Artificial Neural Network for Smart Grid Cyber Intrusion Detection," Neural Computing and Applications, vol. 32, no. 13, pp. 9427-9441, 2020. [26] Yang, H. & Zhou, Z. "A Novel Intrusion Detection Scheme using Cloud Grey Wolf Optimizer," 37th Chinese Control Conference (CCC) IEEE, pp. 8297-8302, 2018. [27] Chen, C. Song, L. Bo, C. & Shuo, W. "A Support Vector Machine with Particle Swarm Optimization Grey Wolf Optimizer for Network Intrusion Detection, " International Conference on Big Data Analysis Computer Science (BDACS) IEEE, pp. 199-204, 2021. [28] Bala, R. & Nagpal, R. "A Review on Kdd cup99 and Nsl Nsl-kdd Dataset," International Journal Advanced Reserarch in Computer Science, vol. 10, no. 2, 2019. [29] Amiri, F. Yousefi, M. R. Lucas, C. Shakery, A. & Yazdani, N."Mutual Information-based Feature Selection for Intrusion Detection Systems," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1184-1199, 2011. [30] Shakeela, S. Shankar, N. S. Reddy, P. M. Tulasi, T. K. & Sai, M. M. "Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS," International Journal of Electronics and Telecommunications, vol. 67, no. 2, pp. 267-275, 2021. | ||
آمار تعداد مشاهده مقاله: 257 تعداد دریافت فایل اصل مقاله: 268 |