UMP Institutional Repository

An efficient IDS using hybrid Magnetic swarm optimization in WANETs

Sadiq, Ali Safa and Alkazemi, Basem Y. and Mirjalili, Seyedali and Noraziah, Ahmad and Khan, Suleman and Ihsan, Ali and Pathan, Al-Sakib Khan and Ghafoor, Kayhan Zrar (2018) An efficient IDS using hybrid Magnetic swarm optimization in WANETs. IEEE Access, 6. pp. 29041-29053. ISSN 2169-3536

[img]
Preview
Pdf
An efficient IDS using hybrid Magnetic swarm optimization in WANETs.pdf

Download (274kB) | Preview

Abstract

Sophisticated Intrusion attacks against various types of networks are ever increasing today with the exploitation of modern technologies which often severely affect wireless networks. In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. Though, numerous studies have contributed in various ways to improve the utilization of data mining for IDS, effective solution often depends on the network setting where the IDS is deployed. In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. These features are extracted by tagged index values that represent the information gain out of the training course of the classifier to be used as a base for our developed IDS. In order to improve the accuracy of artificial neural network (ANN) classifier, we have integrated our proposed hybrid magnetic optimization algorithm-particle swarm optimization (MOA-PSO) technique. Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. Updated KDD CUP data set is formed and used during the training and testing phases, where this data set consists of mixed data traffics between attacks and normal activities. Our results show significant gain in terms of efficiency compared to other alternative mechanisms.

Item Type: Article
Additional Information: Indexed by Scopus
Uncontrolled Keywords: Intrusion detection; Feature extraction; Optimization; Security; Network flow analysis; Computational intelligence
Subjects: Q Science > QA Mathematics > QA76 Computer software
Faculty/Division: Faculty of Computer System And Software Engineering
Centre of Excellence: IBM Centre of Excellence
Depositing User: Mrs. Neng Sury Sulaiman
Date Deposited: 28 Jan 2019 09:03
Last Modified: 28 Jan 2019 09:03
URI: http://umpir.ump.edu.my/id/eprint/23053
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item