A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System
Abdullah Alzaqebah,
Ibrahim Aljarah,
Omar Al-Kadi and
Robertas Damaševičius
Additional contact information
Abdullah Alzaqebah: King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan
Ibrahim Aljarah: King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan
Omar Al-Kadi: King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan
Robertas Damaševičius: Department of Applied Informatics, Vytautas Magnus University, 44404 Kaunas, Lithuania
Mathematics, 2022, vol. 10, issue 6, 1-16
Abstract:
Cyber-attacks and unauthorized application usage have increased due to the extensive use of Internet services and applications over computer networks, posing a threat to the service’s availability and consumers’ privacy. A network Intrusion Detection System (IDS) aims to detect aberrant traffic behavior that firewalls cannot detect. In IDSs, dimension reduction using the feature selection strategy has been shown to be more efficient. By reducing the data dimension and eliminating irrelevant and noisy data, several bio-inspired algorithms have been employed to improve the performance of an IDS. This paper discusses a modified bio-inspired algorithm, which is the Grey Wolf Optimization algorithm (GWO), that enhances the efficacy of the IDS in detecting both normal and anomalous traffic in the network. The main improvements cover the smart initialization phase that combines the filter and wrapper approaches to ensure that the informative features will be included in early iterations. In addition, we adopted a high-speed classification method, the Extreme Learning Machine (ELM), and used the modified GWO to tune the ELM’s parameters. The proposed technique was tested against various meta-heuristic algorithms using the UNSWNB-15 dataset. Because the generic attack is the most common attack type in the dataset, the primary goal of this paper was to detect generic attacks in network traffic. The proposed model outperformed other methods in minimizing the crossover error rate and false positive rate to less than 30%. Furthermore, it obtained the best results with 81%, 78%, and 84% for the accuracy, F1-score, and G-mean measures, respectively.
Keywords: intrusion detection system; bio-inspired algorithms; extreme learning machine; feature selection; information gain (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
https://www.mdpi.com/2227-7390/10/6/999/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/6/999/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:6:p:999-:d:775644
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().