Abstract
Over the past ten years, there has been a significant increase in computer network intrusions, partly due to a thriving black market for cybercrime and the availability of advanced tools for committing such breaches. The most effective method for stopping unwanted intrusions and identifying abnormal network behavioral patterns is an intrusion detection system (IDS). In IDS, transfer learning techniques are frequently employed. An ML-based IDS experiences problems with data imbalance and a greater false detection ratio due to a small training dataset. These ID systems can quickly and automatically recognize harmful threats. The network requires a complex security solution because dangerous threats constantly develop and appear. As a result, developing an efficient and intelligent ID system is a substantial scientific challenge. We suggested an effective ensemble strategy that improved the spotted hyena optimization algorithm (ISHO) and the honey badger algorithm (HBA) to address the data imbalance and overfitting problem. The dataset is balanced by increasing the number of data samples and the detection precision. The Squeeze-and-Excitation (SE)-Deep Residual Network 152 (SE-ResNet152) approach is utilized to remove the less critical features. Every iterative phase includes using a list of decision trees, which monitor the performance of the categorizer and prevent overfitting issues. We use the datasets UNSW-NB15, CSE-CIC IDS 2018, and CICIDS2019 to simulate and assess the model. Compared to other approaches, the proposed approach performs well on three datasets and obtains above 99% accuracy, precision, recall, and F-measure.














Similar content being viewed by others
Data availability
Not applicable.
References
Zhou, X., Liang, W., Li, W., Yan, K., Shimizu, S., Kevin, I., Wang, K.: Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system. IEEE Internet Things J. 9(12), 9310–9319 (2021)
Sarhan, M., Layeghy, S., Portmann, M.: Towards a standard feature set for network intrusion detection system datasets. In: Mobile Networks and Applications, pp. 1–14 (2022).
Alzahrani, A.O., Alenazi, M.J.: Designing a network intrusion detection system based on machine learning for software-defined networks. Future Internet 13(5), 111 (2021)
Choi, H., Kim, M., Lee, G., Kim, W.: Unsupervised learning approach for network intrusion detection system using autoencoders. J. Supercomput.Supercomput. 75, 5597–5621 (2019)
Ashiku, L., Dagli, C.: Network intrusion detection system using deep learning. Procedia Comput. Sci. 185, 239–247 (2021)
Devan, P., Khare, N.: An efficient XGBoost–DNN-based classification model for network intrusion detection system. Neural Comput. Appl.Comput. Appl. 32, 12499–12514 (2020)
Liu, J., Gao, Y., Hu, F.: A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM. Comput. Secur.. Secur. 106, 102289 (2021)
Pawlicki, M., Choraś, M., Kozik, R.: Defending network intrusion detection systems against adversarial evasion attacks. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 110, 148–154 (2020)
Alhajjar, E., Maxwell, P., Bastian, N.: Adversarial machine learning in network intrusion detection systems. Expert Syst. Appl. 186, 115782 (2021)
Wang, H., Cao, Z., Hong, B.: A network intrusion detection system based on a convolutional neural network. J. Intell. Fuzzy Syst. 38(6), 7623–7637 (2020)
Mebawondu, J.O., Alowolodu, O.D., Mebawondu, J.O., Adetunmbi, A.O.: Network intrusion detection system using supervised learning paradigm. Sci. Afr. 9, e00497 (2020)
Gao, Y., Wu, H., Song, B., Jin, Y., Luo, X., Zeng, X.: A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc networks. IEEE Access 7, 154560–154571 (2019)
Zhang, W., Han, D., Li, K.C., Massetto, F.I.: Wireless sensor network intrusion detection system based on MK-ELM. Soft. Comput.Comput. 24, 12361–12374 (2020)
Sakr, M.M., Tawfeeq, M.A., El-Sisi, A.B.: Network intrusion detection system based PSO-SVM for cloud computing. Int. J. Comput. Netw. Inf. Secur. 11(3), 22 (2019)
Mendonça, R.V., Teodoro, A.A., Rosa, R.L., Saadi, M., Melgarejo, D.C., Nardelli, P.H., Rodríguez, D.Z.: Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access 9, 61024–61034 (2021)
Aliyu, I., Feliciano, M.C., Van Engelenburg, S., Kim, D.O., Lim, C.G.: A blockchain-based federated forest for SDN-enabled in-vehicle network intrusion detection system. IEEE Access 9, 102593–102608 (2021)
Moualla, S., Khorzom, K., Jafar, A.: Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Comput. Intell. Neurosci.. Intell. Neurosci. 2021, 1–13 (2021)
Musafer, H., Abuzneid, A., Faezipour, M., Mahmood, A.: An enhanced design of sparse autoencoder for latent features extraction based on trigonometric simplexes for network intrusion detection systems. Electronics 9(2), 259 (2020)
Sohi, S.M., Seifert, J.P., Ganji, F.: RNNIDS: enhancing network intrusion detection systems through deep learning. Comput. Secur.. Secur. 102, 102151 (2021)
Lee, J., Park, K.: GAN-based imbalanced data intrusion detection system. Pers. Ubiquit. Comput.Ubiquit. Comput. 25, 121–128 (2021)
Huang, S., Lei, K.: IGAN-IDS: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw.Netw. 105, 102177 (2020)
Fu, Y., Du, Y., Cao, Z., Li, Q., Xiang, W.: A deep learning model for network intrusion detection with imbalanced data. Electronics 11(6), 898 (2022)
Zhang, H., Huang, L., Wu, C.Q., Li, Z.: An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Comput. Netw.. Netw. 177, 107315 (2020)
Cui, J., Zong, L., Xie, J., Tang, M.: A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl. Intell.Intell. 53(1), 272–288 (2023)
Babu, K.S., Rao, Y.N.: MCGAN: modified conditional generative adversarial network (MCGAN) for class imbalance problems in network intrusion detection system. Appl. Sci. 13(4), 2576 (2023)
Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with the deep hierarchical network. IEEE Access 8, 32464–32476 (2020)
Kunang, Y.N., Nurmaini, S., Stiawan, D., Suprapto, B.Y.: Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J. Inf. Secur. Appl. 58, 102804 (2021)
Prakash, P.J., Lalitha, B.: Optimized ensemble classifier based network intrusion detection system for RPL-based internet of things. Wireless Pers. Commun.Commun. 125(4), 3603–3626 (2022)
Rao, Y.N., Suresh Babu, K.: An imbalanced generative adversarial network-based approach for network intrusion detection in an imbalanced dataset. Sensors 23(1), 550 (2023)
Dina, A.S., Manivannan, D.: Intrusion detection based on machine learning techniques in computer networks. Internet Things 16, 100462 (2021)
Mazini, M., Shirazi, B., Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J. King Saud Univ. Comput. Inf. Sci. 31(4), 541–553 (2019)
Ding, H., Chen, L., Dong, L., Fu, Z., Cui, X.: Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 131, 240–254 (2022)
Guezzaz, A., Benkirane, S., Azrour, M., Khurram, S.: A reliable network intrusion detection approach using a decision tree with enhanced data quality. Secur. Commun. Netw. 2021, 1–8 (2021)
Kanna, P.R., Santhi, P.: Hybrid intrusion detection using mapreduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst. Appl. 194, 116545 (2022)
Khan, M.A.: HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system. Processes 9(5), 834 (2021)
Bu, S.J., Cho, S.B.: Genetic algorithm-based deep learning ensemble for detecting database intrusion via insider attack. In: Hybrid Artificial Intelligent Systems: 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedings 14 (pp. 145–156). Springer (2019).
Qureshi, A.U.H., Larijani, H., Mtetwa, N., Javed, A., Ahmad, J.: RNN-ABC: a new swarm optimization-based technique for anomaly detection. Computers 8(3), 59 (2019)
Althubiti, S.A., Jones, E.M., Roy, K.: LSTM for anomaly-based network intrusion detection. In: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–3. IEEE (2018).
Liu, X., Li, K., Wang, W., Yan, Y., Sha, Y., Chen, J., Qin, J.: Improved RBF network intrusion detection model based on edge computing with multi-algorithm fusion. Int. J. Comput. Commun. Control 16(4) (2021).
Hu, Z., Wang, L., Qi, L., Li, Y., Yang, W.: A novel wireless network intrusion detection method based on adaptive synthetic sampling and an improved convolutional neural network. IEEE Access 8, 195741–195751 (2020)
Tama, B.A., Comuzzi, M., Rhee, K.H.: TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497–94507 (2019)
Safaldin, M., Otair, M., Abualigah, L.: Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput.Intell. Humaniz. Comput. 12, 1559–1576 (2021)
Acknowledgements
We declare that this manuscript is original, has not been published before, and is not currently being considered for publication elsewhere.
Author information
Authors and Affiliations
Contributions
The author confirms sole responsibility for the following: study conception and design, data collection, analysis and interpretation of results, and manuscript preparation.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Ethics approval
This material is the author's original work, which has not been published elsewhere. The paper reflects the author's research and analysis truthfully and completely.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Saikam, J., Ch, K. An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152. Int. J. Inf. Secur. 23, 1037–1054 (2024). https://doi.org/10.1007/s10207-023-00777-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-023-00777-w