Skip to main content

Research of Network Intrusion Detection Based on Improved Seagull Optimization Algorithm with Deep Learning

  • Conference paper
  • First Online:
Computer Science and Education. Computer Science and Technology (ICCSE 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2023))

Included in the following conference series:

  • 184 Accesses

Abstract

In this paper, we study a network intrusion detection method based on deep learning combined with improved seagull optimization algorithm, which extracts the information traces inevitably generated during network intrusion by deep neural network and optimizes the parameters of deep neural network model by improved seagull optimization algorithm, so as to build an efficient network intrusion detection model. The traditional seagull optimization algorithm is improved and applied to the deep learning model hyperparameter optimization. For the shortcomings of the traditional seagull optimization algorithm with strong randomness of population initialization and easy to produce extreme individuals, a reverse learning method is presented to the initialization of the group. And a nonlinear convergence factor is used to enhance the convergence speed, thus improving the performance of the seagull optimization algorithm. The improved algorithm was demonstrated by using standard test functions, and the improved algorithm was used for parameter optimization of the deep learning model. To address the shortcomings of classical rule-based, host behavior analysis, and machine learning network traffic classification methods in performing network intrusion detection with less attention to the temporal correlation characteristics of samples, we propose to apply deep learning techniques to network intrusion detection, and design a network intrusion detection method based on gated cyclic units and multilayer perceptron, and also apply the improved seagull optimization algorithm to the method optimization of hyperparameters in the model, thus improving the performance of the model and achieving better network intrusion detection results on the NSK-KDD dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company (1980)

    Google Scholar 

  2. Sherstinsky, A.: Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D 404, 132306 (2020)

    Article  MathSciNet  Google Scholar 

  3. Chung, J., Gulcehre, C., Cho, K.H., et al.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)

  4. Hong, Y., Goodnight, G.T.: How to think about cyber sovereignty: the case of China. Chin. J. Commun. 13(1), 8–26 (2020)

    Article  Google Scholar 

  5. Coşkun, M., Yildirim, Ö., Ayşegül, U., et al.: An overview of popular deep learning methods. Eur. J. Tech. (EJT) 7(2), 165–176 (2017)

    Google Scholar 

  6. Denning, D.E.: An intrusion-detection model. IEEE Trans. Software Eng. 2, 222–232 (1987)

    Article  Google Scholar 

  7. Heberlein, L.T., Dias, G.V., Levitt, K.N., et al.: A network security monitor. Lawrence Livermore National Lab., CA (USA); California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science (1989)

    Google Scholar 

  8. Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305–316. IEEE (2010)

    Google Scholar 

  9. Song, W., Beshley, M., Przystupa, K., et al.: A software deep packet inspection system for network traffic analysis and anomaly detection. Sensors 20(6), 1637 (2020)

    Article  Google Scholar 

  10. Saleh, A.I., Talaat, F.M., Labib, L.M.: A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers. Artif. Intell. Rev. 51(3), 403–443 (2019)

    Article  Google Scholar 

  11. Chen, S., Peng, M., Xiong, H., Yu, X.: SVM intrusion detection model based on compressed sampling. J. Electr. Comput. Eng. 2016, 1–6 (2016)

    Article  Google Scholar 

  12. De La Hoz, E., Ortiz, A., Ortega, J., Prieto, B.: PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing 164, 71–81 (2015)

    Article  Google Scholar 

  13. Xu, H., Przystupa, K., Fang, C., Marciniak, A., et al.: A combination strategy of feature selection based on an integrated optimization algorithm and weighted k-nearest neighbor to improve the performance of network intrusion detection. Electronics 9(8), 1206 (2020)

    Article  Google Scholar 

Download references

Acknowledgment

This work is funded by the National Natural Science Foundation of China under Grant No. 61772180, the Key R & D plan of Hubei Province (2020BHB004, 2020BAB012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hai Lan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lan, H. (2024). Research of Network Intrusion Detection Based on Improved Seagull Optimization Algorithm with Deep Learning. In: Hong, W., Kanaparan, G. (eds) Computer Science and Education. Computer Science and Technology. ICCSE 2023. Communications in Computer and Information Science, vol 2023. Springer, Singapore. https://doi.org/10.1007/978-981-97-0730-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0730-0_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0729-4

  • Online ISBN: 978-981-97-0730-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics