Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning

IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS
A. Afolabi, O. A. Akinola
{"title":"Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning","authors":"A. Afolabi, O. A. Akinola","doi":"10.1155/2024/7302909","DOIUrl":null,"url":null,"abstract":"The security of communication networks can be compromised through both known and novel attack methods. Protection against such attacks may be achieved through the use of an intrusion detection system (IDS), which can be designed by training machine learning models to detect cyberattacks. In this paper, the KOMIG (knapsack optimization and mutual information gain) IDS was developed to detect network intrusions. The KOMIG IDS combined the strengths of optimization and machine learning together to achieve a high intrusion detection performance. Specifically, KOMIG IDS comprises a 2-stage feature selection procedure; the first was accomplished with a knapsack optimization algorithm and the second with a mutual information gain filter. In particular, we developed an optimization model for the selection of the most important features from a network intrusion dataset. Then, a new set of features was synthesized from the selected features and combined with the selected features to form a candidate features set. Next, we applied an information gain filter to the candidate features set to prune out redundant features, leaving only the features that possess the maximum information gain, which were used to train machine learning models. The proposed KOMIG IDS was applied to the UNSW-NB15 dataset, which is a well-known network intrusion evaluation dataset, and the resulting data, after optimization operation, were used to train four machine learning models, namely, logistic regression (LR), random forest (RF), decision tree (DT), and K-nearest neighbors (KNN). Simulation experiments were conducted, and the results revealed that our proposed KNN-based KOMIG IDS outperformed comparative schemes by achieving an accuracy score of 97.14%, a recall score of 99.46%, a precision score of 95.53%, and an F1 score of 97.46%.","PeriodicalId":46573,"journal":{"name":"Journal of Electrical and Computer Engineering","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electrical and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2024/7302909","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The security of communication networks can be compromised through both known and novel attack methods. Protection against such attacks may be achieved through the use of an intrusion detection system (IDS), which can be designed by training machine learning models to detect cyberattacks. In this paper, the KOMIG (knapsack optimization and mutual information gain) IDS was developed to detect network intrusions. The KOMIG IDS combined the strengths of optimization and machine learning together to achieve a high intrusion detection performance. Specifically, KOMIG IDS comprises a 2-stage feature selection procedure; the first was accomplished with a knapsack optimization algorithm and the second with a mutual information gain filter. In particular, we developed an optimization model for the selection of the most important features from a network intrusion dataset. Then, a new set of features was synthesized from the selected features and combined with the selected features to form a candidate features set. Next, we applied an information gain filter to the candidate features set to prune out redundant features, leaving only the features that possess the maximum information gain, which were used to train machine learning models. The proposed KOMIG IDS was applied to the UNSW-NB15 dataset, which is a well-known network intrusion evaluation dataset, and the resulting data, after optimization operation, were used to train four machine learning models, namely, logistic regression (LR), random forest (RF), decision tree (DT), and K-nearest neighbors (KNN). Simulation experiments were conducted, and the results revealed that our proposed KNN-based KOMIG IDS outperformed comparative schemes by achieving an accuracy score of 97.14%, a recall score of 99.46%, a precision score of 95.53%, and an F1 score of 97.46%.
利用 Knapsack 优化、互信息增益和机器学习进行网络入侵检测
通信网络的安全可能会通过已知和新颖的攻击方法受到破坏。可通过使用入侵检测系统(IDS)来防范此类攻击,该系统可通过训练机器学习模型来检测网络攻击。本文开发了 KOMIG(knapsack optimization and mutual information gain)入侵检测系统来检测网络入侵。KOMIG IDS 将优化和机器学习的优势结合在一起,实现了较高的入侵检测性能。具体来说,KOMIG IDS 包括一个两阶段的特征选择程序;第一阶段采用 Knapsack 优化算法,第二阶段采用互信息增益过滤器。具体而言,我们开发了一个优化模型,用于从网络入侵数据集中选择最重要的特征。然后,从所选特征中合成一组新特征,并与所选特征相结合,形成候选特征集。接着,我们对候选特征集进行信息增益过滤,剪除冗余特征,只留下具有最大信息增益的特征,用于训练机器学习模型。我们将所提出的 KOMIG IDS 应用于 UNSW-NB15 数据集(这是一个著名的网络入侵评估数据集),并将优化后的数据用于训练四个机器学习模型,即逻辑回归(LR)、随机森林(RF)、决策树(DT)和 K 近邻(KNN)。仿真实验结果表明,我们提出的基于 KNN 的 KOMIG IDS 的准确率为 97.14%,召回率为 99.46%,精确率为 95.53%,F1 分数为 97.46%,优于同类方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Electrical and Computer Engineering
Journal of Electrical and Computer Engineering COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
4.20
自引率
0.00%
发文量
152
审稿时长
19 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信