Abstract
Network users are heavily targeted by data integrity attacks that affect the development of new security techniques. The main challenge in network security is to identify this kind of attack for the improvement of growing mechanisms. In this paper, a data integrity based effective intrusion detection system (DI-EIDS) is constructed to prevent the network with a high detection rate and low false alarm rates. It is classified into two phases; data sampling and selection of features. In the data sampling process, attacks are detected and inference based on the sample signatures. In this process, the Deviation forest (d-forest) is used to remove barriers; Grey Wolf Optimization (GWO) is used for sampling ratio optimization and Black forest (BF) classifier to obtain the best training data. To select the best features, GWO and BF are repeatedly used. Finally, DI-EIDS based on the black forest is constructed using the best training data set obtained by data sampling and feature selection. Rare Integrity attacks are detected in this technique when compared with other algorithms. Experimental results are analyzed using different datasets with a 22% sampling rate. The performance results show a higher rate of detection with low false-positive rates.




Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Availability of data and materials
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Al-Yaseen Z, Othman A, Nazri MZ (2015) Intrusion detection system based on modified k-means and multi-level support vector machines. In: Proceedings of the international conference on soft computing in data science proceedings, vol 545, pp 265–274
Al-Yaseen WL, Othman ZA, Nazri MZA (2015b) Hybrid modified k-means with c4.5 for intrusion detection systems in multiagent systems. Sci World J 2015:14
Al-Yaseen WL, Ali Othman Z, Ahmad Nazri MZ (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl 67:296–303
Chen X, Zhang F, Susilo W, Tian H, Li J, Kim K (2014) Identity-based chameleon hashing and signatures without key exposure. Inf Sci 265:198–210
Faris H, Al-Zoubi AM, Heidari AA (2018) An intelligent system for spam detection and identification of the most relevant features based on evolutionary Random Weight Networks. Inf Fus 48:67–83
Gauthama Raman MR, Somu N, Jagarapu S (2019) An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif Intell Rev. https://doi.org/10.1007/s10462-019-09762-z
George A (2012) Anomaly detection based on machine learning dimensionality reduction using PCA and classification using SVM. Int J Comput Appl 47:5–8
Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37–50
Hamamoto AH, Carvalho LF, Sampaio LDH, Abrao T, Proencia ML (2017) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 67:390–402
Khammassi C, Krichen S (2017) A GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255–277
Koc L, Mazzuchi TA, Sarkani S (2012) A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier. Expert Syst Appl 18(39):13492–13500
Lee W, Zhen L, et al. (2017) Hin2vec: Explore metapaths in heterogeneous information networks for representation learning. In: ACM conference on information and knowledge management, pp 1797–1806
Ma J, Sun L, Wang H, Zhang Y, Aickelin U (2016) Supervised anomaly detection in uncertain sensor data streams. ACM Trans Internet Technol 16:20
Sasan P, Sharma M (2016) Intrusion detection using feature selection and machine learning algorithm with misuse detection. Int J Comput Sci Inf Technol 8:17–25
Vijayanand R, Devaraj D, Kannapiran B (2018) Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput Secur 77:304–314
Wang D, Zhang Z, Wang P, Yan J, Huang X (2016) Targeted online password guessing: an underestimated threat. In: ACM conference on computer and communications security, pp 1242–1254
Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl-Based Syst 136:130–139
Zhang J, Peng M, Wang H, Cao J, Wang G, Zhang X (2016a) A probabilistic method for emerging topic tracking in microblog stream. World Wide Web 20:1–26
Zhang Y, Shen Y, Wang H, Yong J, Jiang X (2016b) On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans Autom Sci Eng 13:1281–1293
Acknowledgment
This research work has been confidentially acknowledged by Anna University recognized research center lab at V V College of Engineering, Tisaiyanvilai, India.
Funding
No funding source has been acknowledged.
Author information
Authors and Affiliations
Contributions
R.B.Benisha has published two SCI journals four International conference papers and one International journal paper. Dr.S.Raja Ratna has published Four SCI journals and five Scopus indexed journals. Her research interests include denial-of-service attacks, jamming attacks, secure routing algorithm and security in networks.
Corresponding author
Ethics declarations
Conflict of interest
R. B. Benisha and Dr. S. Raja Ratna declares that they have no Competing interests.
Animal rights
This article does not contain any studies with animal subjects performed by the any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Benisha, R.B., Ratna, S.R. Detection of data integrity attacks by constructing an effective intrusion detection system. J Ambient Intell Human Comput 11, 5233–5244 (2020). https://doi.org/10.1007/s12652-020-01850-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-01850-1