{"title":"A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS","authors":"Babita Majhi, Prastavana","doi":"10.1007/s12083-024-01720-z","DOIUrl":null,"url":null,"abstract":"<p>There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"8 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01720-z","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.
期刊介绍:
The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security.
The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain.
Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.