Skip to main content
Log in

Intrusion detection system based on a modified binary grey wolf optimisation

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, wherein the network traffic performance is unpredictable, and the problematic space features are numerous. These make intrusion detection systems (IDSs) a challenge within the research arena. Hence, selecting the essential aspects for intrusion detection is crucial in information security and with that, this study identified the related features in building a computationally efficient and effective intrusion system. Accordingly, a modified feature selection (FS) algorithm called modified binary grey wolf optimisation (MBGWO) is proposed in this study. The proposed algorithm is based on binary grey wolf optimisation to boost the performance of IDS. The new FS algorithm selected an optimal number of features. In order to evaluate the proposed algorithm, the benchmark of NSL-KDD network intrusion, which was modified from 99-data set KDD cup to assess issues linked with IDS, had been applied in this study. Additionally, the support vector machine was employed to classify the data set effectively. The proposed FS and classification algorithms enhanced the performance of the IDS in detecting attacks. The simulation outcomes portrayed that the proposed algorithm enhanced the accuracy of intrusion detection up to 99.22% and reduction in the number of features from 41 to 14.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700

    Article  MathSciNet  Google Scholar 

  2. Anbar M, Abdullah R, Hasbullah IH, Chong YW, Elejla OE (2016) Comparative performance analysis of classification algorithms for intrusion detection system. In: 2016 14th annual conference on privacy, security and trust (PST). IEEE, pp 282–288

  3. Hamed T, Ernst JB, Kremer SC (2018) A survey and taxonomy on data and pre-processing techniques of intrusion detection systems. Computer and network security essentials. Springer, Cham, pp 113–134

    Google Scholar 

  4. Debar H, Dacier M, Wespi A (2000) A revised taxonomy for intrusion-detection systems. Ann Telecommun 55(7):361–378

    Google Scholar 

  5. Balasaraswathi VR, Sugumaran M, Hamid Y (2017) Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J Commun Inf Netw 2(4):107–119

    Article  Google Scholar 

  6. Pereira LAM, Rodrigues D, Almeida TN, Ramos CC, Souza AN, Yang XS, Papa JP (2014) A binary cuckoo search and its application for feature selection. In: Cuckoo search and firefly algorithm. Springer, Cham, pp 141–154

  7. Kumar K, Batth JS (2016) Network intrusion detection with feature selection techniques using machine-learning algorithms. Int J Comput Appl 150(12):1–13

    Google Scholar 

  8. Kabir M, Shahjahan M, Murase K (2013) Ant colony optimization toward feature selection. In: Ant colony optimization-techniques and applications. InTech

  9. Xue B, Fu W, Zhang M (2014) Multi-objective feature selection in classification: a differential evolution approach. In: Asia-Pacific conference on simulated evolution and learning. Springer, Cham, pp 516–528

  10. Shoghian S, Kouzehgar M (2012) A Comparison among wolf pack search and four other optimization algorithms. World Acad Sci Eng Technol 6(12):447–452

    Google Scholar 

  11. Bamakan SMH, Amiri B, Mirzabagheri M, Shi Y (2015) A new intrusion detection approach using PSO based multiple criteria linear programming. Proc Comput Sci 55:231–237

    Article  Google Scholar 

  12. Mazini M, Shirazi B, Mahdavi I (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2018.03.011

    Article  Google Scholar 

  13. Sailaja M, Kumar RK, Murty PSR, Prasad PESNK (2012) A novel approach for intrusion detection using swarm intelligence. In: Proceedings of the international conference on information systems design and intelligent application held in Visakhapatnam, India. January 2012. Springer, Berlin, Heidelberg, pp 469–479

  14. Parsian A, Ramezani M, Ghadimi N (2017) A hybrid neural network-gray wolf optimization algorithm for melanoma detection. Biomed Res 28(8):3408–3411

    Google Scholar 

  15. Mittal N, Singh U, Sohi BS (2016) Modified grey wolf optimizer for global engineering optimization. Appl Comput Intell Soft Comput 8:1–16

    Article  Google Scholar 

  16. Zhu A, Xu C, Li Z, Wu J, Liu Z (2015) Hybridizing grey wolf optimization with differential evolution for global optimization and test scheduling for 3D stacked SoC. J Syst Eng Electron 26(2):317–328

    Article  Google Scholar 

  17. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61

    Article  Google Scholar 

  18. Seth JK, Chandra S (2016) Intrusion detection based on key feature selection using binary GWO. In: 3rd international conference on computing for sustainable global development, Mar 2016. IEEE, pp 3735–3740

  19. Faris H, Aljarah I, Al-Betar MA, Mirjalili S (2018) Grey wolf optimizer: a review of recent variants and applications. Neural Comput Appl 30:413–435

    Article  Google Scholar 

  20. Al-Betar MA, Awadallah MA, Faris H, Aljarah I, Hammouri AI (2018) Natural selection methods for Grey Wolf Optimizer. Expert Syst Appl 113:481–498

    Article  Google Scholar 

  21. Devi R, Suganthe RC (2017) Feature selection in intrusion detection grey wolf optimizer. Asian J Res Soc Sci Humanit 7(3):671–682

    Google Scholar 

  22. Elngar AA, El DA, Mohamed A, Ghaleb FFM (2013) A real-time anomaly network intrusion detection system with high accuracy. Inf Sci Lett 2(2):49–56

    Google Scholar 

  23. Amudha P, Karthik S, Sivakumari S (2015) A hybrid swarm intelligence algorithm for intrusion detection using significant features. Sci World J 1:1–16

    Article  Google Scholar 

  24. Kim DS, Nguyen HN, Park JS (2005) Genetic algorithm to improve SVM based network intrusion detection system. In: 19th international conference on advanced information networking and applications (AINA), vol 2. IEEE, pp 155–158

  25. Gharaee H, Hosseinvand H (2016) A new feature selection IDS based on genetic algorithm and SVM. In: 8th international symposium on telecommunications (IST). IEEE, pp 139–144

  26. Emary E, Zawbaa HM, Hassanien AE (2016) Binary grey wolf optimization approaches for feature selection. Neurocomputing 172:371–381

    Article  Google Scholar 

  27. Lee S, Soak S, Oh S, Pedrycz W, Jeon M (2008) Modified binary particle swarm optimization. Prog Nat Sci 18(9):1161–1166

    Article  MathSciNet  Google Scholar 

  28. Mirjalili S, Mirjalili SM, Yang XS (2014) Binary bat algorithm. Neural Comput Appl 25(3–4):663–681

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Anbar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alzubi, Q.M., Anbar, M., Alqattan, Z.N.M. et al. Intrusion detection system based on a modified binary grey wolf optimisation. Neural Comput & Applic 32, 6125–6137 (2020). https://doi.org/10.1007/s00521-019-04103-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-019-04103-1

Keywords

Navigation