Skip to main content
Log in

Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Privacy is a significant problem in communications networks. As a factor, trustworthy knowledge sharing in computer networks is essential. Intrusion Detection Systems consist of security tools frequently used in communication networks to monitor, detect, and effectively respond to abnormal network activity. We integrate current technologies in this paper to develop an anomaly-based Intrusion Detection System. Machine Learning methods have progressively featured to enhance intelligent Anomaly Detection Systems capable of identifying new attacks. Thus, this evidence demonstrates a novel approach for intrusion detection introduced by training an artificial neural network with an optimized Bat algorithm. An essential task of an Intrusion Detection System is to maintain the highest quality and eliminate irrelevant characteristics from the attack. The recommended BAT algorithm is used to select the 41 best features to address this problem. Machine Learning based SVM classifier is used for identifying the False Detection Rate. The design is being verified using the KDD99 dataset benchmark. Our solution optimizes the standard SVM classifier. We attain optimal measures for abnormal behavior, including 97.2 %, the attack detection rate is 97.40 %, and a false-positive rate of 0.029 %.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Yang, X.-S. and He, X. (2013). Bat algorithm: Literature review and applications. International Journal of Bio-Inspired Computation, 5(3):141–14

    Article  Google Scholar 

  2. Yang, X.-S. and Deb, S. (2009). Cuckoo search via l´evy flights. In Proceedings of the World Congress on Nature & Biologically Inspired Computing, pages 210– 214. IEEE

  3. Wang, J., Li, T., and Ren, R. (2010). A real-time IDSs based on artificial bee colony-support vector machine algorithm. In Proceedings in the International Workshop on Advanced Computational Intelligence, pages 91–96. IEEE.

  4. Shadi Aljawarneh, Monther Aldwairi, and Muneer Bani Yassein. (2018). “Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model.” Journal of Computational Science, 25, 152–160

    Article  Google Scholar 

  5. Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, and Citra Dwi Perkasa. (2011). “A novel intrusion detection system based on hierarchical clustering and support vector machines.” Expert systems with Applications, 38(1), 306–313.

    Article  Google Scholar 

  6. X Zhu, Z Huang, H Zhoul, Design of a Multi-agent Based Intelligent Intrusion Detection System. IEEE International Symposium on Pervasive Computing and Applications (IEEE, Amsterdam, 2006), pp. 290–295

  7. G Bourkache, M Mezghiche, K Tamine, A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network, in the 2011 Sixth IEEE International Conference on Availability, Reliability, and Security, Vienna, August 2011 (IEEE, Amsterdam, 2011), pp. 569–572

  8. C-h Fonk, GP Parr, PJ Morrow, Security schemes for Mobile Agent-based Network and System Management Framework. J. Networks Syst. Manag. Springer 19, 232–256 (2011)

    Google Scholar 

  9. L Zadeh, Role of soft computing and fuzzy logic in the conception, design, and development of information/intelligent systems, in Computational Intelligence: Soft Computing and Fuzzy-neuro Integration with Applications, ed. by O Kaynak, L Zadeh, B Turksen, I Rudas. Proceedings of the NATO Advanced Study Institute on Soft Computing and its Applications held at Manavgat, Antalya, Turkey, 21–31 August 1996, volume 162 of NATO ASI Series (Springer, Berlin, 1998), pp. 1–9

  10. M. S. Hoque, Md.A. Mukit, and Md.A. N. Bikas, “An implementation of intrusion detection system using genetic algorithm,” International Journal of Network Security & Its Applications, vol. 4, no. 2, pp. 109–120, 2012.

    Article  Google Scholar 

  11. T. T. H. Le, Y. Kim, and H. Kim, “Network intrusion detection based on novel feature selection model and various recurrent neural networks,” Applied Science, vol. 9, no. 1392, pp. 1–29, 2019

    Google Scholar 

  12. S.-B. Cho and H.-J. Park, “Efficient anomaly detection by modeling privilege flows using hidden Markov model,” Computers & Security, vol. 22, no. 1, pp. 45–55, 2003.

    Article  Google Scholar 

  13. W. Wei and C. Guo, “A text semantic topic discovery method based on the conditional co-occurrence degree,” Neurocomputing, vol. 368, pp. 11–24, 2019.

    Article  Google Scholar 

  14. P. Sun, P. Liu, Q. Li et al., “DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system,” Security and Communication Networks, vol. 2020, Article ID 8890306, 11 pages, 2020.

  15. G. Farahani, “Feature selection based on cross-correlation for the intrusion detection system,” Security & Communication Networks, vol. 2020, Article ID 8875404, 17 pages, 2020.

  16. D. Smith, Q. Guan, and S. Fu, “An anomaly detection framework for autonomic management of compute cloud systems,” in Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, pp. 376–381, IEEE, Seoul, South Korea, July 2010

  17. H. B. Nguyen, B. Xue, P. Andreae, et al., “Particle swarm optimization with genetic operators for feature selection,” in Proceedings of the 17 IEEE Congress on Evolutionary Computation (CEC), pp. 286–293, IEEE, San Sebastian, Spain, June 2017.

  18. M. H. Aghdam and P. Kabiri, “Feature selection for intrusion detection system using ant colony optimization,” International Journal of Network Security, vol. 18, no. 3, pp. 420–432, 2016.

    Google Scholar 

  19. B. Alsalibi, L. Abualigah and A.T. Khader 2021 “A novel bat algorithm with dynamic membrane structure for optimization problems”, Electronics, vol. 10, pp. 1992–2017.

  20. D. Mustafa Abdullah and A. Mohsin Abdulazeez, “Machine Learning Applications based on SVM Classification A Review”, Qubahan Academic Journal, vol. 1, no. 2, pp. 81–90, 2021.

    Article  Google Scholar 

Download references

Funding

Not Applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudhakar Sengan.

Ethics declarations

Conflict of interest

The author declares their is no conflict of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Narayanasami, S., Sengan, S., Khurram, S. et al. Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT. Wireless Pers Commun 127, 1763–1785 (2022). https://doi.org/10.1007/s11277-021-08721-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08721-8

Keywords

Navigation