A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS

IF 3.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Babita Majhi, Prastavana
{"title":"A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS","authors":"Babita Majhi, Prastavana","doi":"10.1007/s12083-024-01720-z","DOIUrl":null,"url":null,"abstract":"<p>There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"8 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01720-z","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.

Abstract Image

利用二叉 FOX 优化和 V 型传递函数的网络 IDS 特征选择模型
互联网在日常生活中的日常使用方式大幅增加。在连接物联网、通过在线教育提供帮助、通过在线游戏提供娱乐、做出商业决策等方面都有显著的表现。因此,所有这些活动都会产生大量数据,也需要对其进行管理。有必要确保这些网络免受恶意攻击,以防止任何有害行为。网络安全仍然是一个具有吸引力的研究课题。本文在实验中考虑了基于网流的数据集 NF-UNSWNB15-v2,并试图解决在构建 IDS 时遇到的问题。通过利用 FOX 优化和 V 型传递函数进行二值化,并选择最佳特征,解决了处理大量特征等问题。使用 Light-GBM 对其进行进一步分类,并评估二元分类和多类分类的结果。与其他现有方法相比,所提出的模型能为二元分类和多类分类选择最少的特征。在对各种参数进行进一步评估后,发现所提出的方法性能令人满意,并提高了对 DoS、Exploits、Fuzzers 等各种攻击的检测率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Peer-To-Peer Networking and Applications
Peer-To-Peer Networking and Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
8.00
自引率
7.10%
发文量
145
审稿时长
12 months
期刊介绍: The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security. The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain. Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信