Abstract
One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, wherein the network traffic performance is unpredictable, and the problematic space features are numerous. These make intrusion detection systems (IDSs) a challenge within the research arena. Hence, selecting the essential aspects for intrusion detection is crucial in information security and with that, this study identified the related features in building a computationally efficient and effective intrusion system. Accordingly, a modified feature selection (FS) algorithm called modified binary grey wolf optimisation (MBGWO) is proposed in this study. The proposed algorithm is based on binary grey wolf optimisation to boost the performance of IDS. The new FS algorithm selected an optimal number of features. In order to evaluate the proposed algorithm, the benchmark of NSL-KDD network intrusion, which was modified from 99-data set KDD cup to assess issues linked with IDS, had been applied in this study. Additionally, the support vector machine was employed to classify the data set effectively. The proposed FS and classification algorithms enhanced the performance of the IDS in detecting attacks. The simulation outcomes portrayed that the proposed algorithm enhanced the accuracy of intrusion detection up to 99.22% and reduction in the number of features from 41 to 14.





Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700
Anbar M, Abdullah R, Hasbullah IH, Chong YW, Elejla OE (2016) Comparative performance analysis of classification algorithms for intrusion detection system. In: 2016 14th annual conference on privacy, security and trust (PST). IEEE, pp 282–288
Hamed T, Ernst JB, Kremer SC (2018) A survey and taxonomy on data and pre-processing techniques of intrusion detection systems. Computer and network security essentials. Springer, Cham, pp 113–134
Debar H, Dacier M, Wespi A (2000) A revised taxonomy for intrusion-detection systems. Ann Telecommun 55(7):361–378
Balasaraswathi VR, Sugumaran M, Hamid Y (2017) Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J Commun Inf Netw 2(4):107–119
Pereira LAM, Rodrigues D, Almeida TN, Ramos CC, Souza AN, Yang XS, Papa JP (2014) A binary cuckoo search and its application for feature selection. In: Cuckoo search and firefly algorithm. Springer, Cham, pp 141–154
Kumar K, Batth JS (2016) Network intrusion detection with feature selection techniques using machine-learning algorithms. Int J Comput Appl 150(12):1–13
Kabir M, Shahjahan M, Murase K (2013) Ant colony optimization toward feature selection. In: Ant colony optimization-techniques and applications. InTech
Xue B, Fu W, Zhang M (2014) Multi-objective feature selection in classification: a differential evolution approach. In: Asia-Pacific conference on simulated evolution and learning. Springer, Cham, pp 516–528
Shoghian S, Kouzehgar M (2012) A Comparison among wolf pack search and four other optimization algorithms. World Acad Sci Eng Technol 6(12):447–452
Bamakan SMH, Amiri B, Mirzabagheri M, Shi Y (2015) A new intrusion detection approach using PSO based multiple criteria linear programming. Proc Comput Sci 55:231–237
Mazini M, Shirazi B, Mahdavi I (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2018.03.011
Sailaja M, Kumar RK, Murty PSR, Prasad PESNK (2012) A novel approach for intrusion detection using swarm intelligence. In: Proceedings of the international conference on information systems design and intelligent application held in Visakhapatnam, India. January 2012. Springer, Berlin, Heidelberg, pp 469–479
Parsian A, Ramezani M, Ghadimi N (2017) A hybrid neural network-gray wolf optimization algorithm for melanoma detection. Biomed Res 28(8):3408–3411
Mittal N, Singh U, Sohi BS (2016) Modified grey wolf optimizer for global engineering optimization. Appl Comput Intell Soft Comput 8:1–16
Zhu A, Xu C, Li Z, Wu J, Liu Z (2015) Hybridizing grey wolf optimization with differential evolution for global optimization and test scheduling for 3D stacked SoC. J Syst Eng Electron 26(2):317–328
Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61
Seth JK, Chandra S (2016) Intrusion detection based on key feature selection using binary GWO. In: 3rd international conference on computing for sustainable global development, Mar 2016. IEEE, pp 3735–3740
Faris H, Aljarah I, Al-Betar MA, Mirjalili S (2018) Grey wolf optimizer: a review of recent variants and applications. Neural Comput Appl 30:413–435
Al-Betar MA, Awadallah MA, Faris H, Aljarah I, Hammouri AI (2018) Natural selection methods for Grey Wolf Optimizer. Expert Syst Appl 113:481–498
Devi R, Suganthe RC (2017) Feature selection in intrusion detection grey wolf optimizer. Asian J Res Soc Sci Humanit 7(3):671–682
Elngar AA, El DA, Mohamed A, Ghaleb FFM (2013) A real-time anomaly network intrusion detection system with high accuracy. Inf Sci Lett 2(2):49–56
Amudha P, Karthik S, Sivakumari S (2015) A hybrid swarm intelligence algorithm for intrusion detection using significant features. Sci World J 1:1–16
Kim DS, Nguyen HN, Park JS (2005) Genetic algorithm to improve SVM based network intrusion detection system. In: 19th international conference on advanced information networking and applications (AINA), vol 2. IEEE, pp 155–158
Gharaee H, Hosseinvand H (2016) A new feature selection IDS based on genetic algorithm and SVM. In: 8th international symposium on telecommunications (IST). IEEE, pp 139–144
Emary E, Zawbaa HM, Hassanien AE (2016) Binary grey wolf optimization approaches for feature selection. Neurocomputing 172:371–381
Lee S, Soak S, Oh S, Pedrycz W, Jeon M (2008) Modified binary particle swarm optimization. Prog Nat Sci 18(9):1161–1166
Mirjalili S, Mirjalili SM, Yang XS (2014) Binary bat algorithm. Neural Comput Appl 25(3–4):663–681
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alzubi, Q.M., Anbar, M., Alqattan, Z.N.M. et al. Intrusion detection system based on a modified binary grey wolf optimisation. Neural Comput & Applic 32, 6125–6137 (2020). https://doi.org/10.1007/s00521-019-04103-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-019-04103-1