A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO

Publish Year: 1399
نوع سند: مقاله ژورنالی
زبان: English
View: 386

This Paper With 17 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JCSE-7-1_005

تاریخ نمایه سازی: 19 بهمن 1399

Abstract:

As a result of an incredibly fast growth of the number and diversity of smart devices connectable to the internet, commonly through open wireless sensor networks (WSNs) in internet of things (IoT), the access of attackers to the network traffic in the form of intercepting, eavesdropping and rebroadcasting has become much easier. Anomaly or intrusion detection system (IDS) is an efficient security mechanism, however despite the maturity of anomaly detection technologies for wired networks, current technologies with high computational complexity are improper for resource-limited WSNs in IoT and they also fail to detect new WSN attacks. Furthermore, dealing with the huge amount of intrusion wireless traffic collected by sensors, causing slow detecting process, higher resource usage and inaccurate detection. Hence, considering WSN limitations for developing an IDS in IoT, establishes a significant challenge for security researchers. This paper proposes a new model to develop a support vector machine (SVM)-based lightweight IDS (LIDS) using combination concepts of genetic algorithm (GA) and mathematical equations of grey wolf optimizer (GWO) which is called GABGWO. The GABGWO through applying two new crossover and mutation operators tries to find the most relevant traffic features and eliminate worthless ones, in order to increase the performance of the LIDS. The performance of LIDS is evaluated using AWID real-world wireless dataset under two scenarios with and without using GABGWO. The results showed a promising behavior of the proposed GABGWO algorithm in choosing optimal traffics, decreasing the computational costs and providing high accuracies for LIDS. The hybrid algorithm is also compared to pure GA and GWO and other recent methods and it is found that its performance is better than them.

Keywords:

Wrapper Feature Selection , Metaheuristic Algorithms , Grey Wolf Optimizer (GWO) , genetic algorithm (GA) , Wireless Networks , Internet of Things (IoT) , Anomaly Detection , Support Vector Machine (SVM)

Authors

Azam Davahli

Department of Computer Engineering, Qom Branch, Islamic Azad University, Qom, Iran.

mahboubeh shamsi

Faculty of electrical and computer engineering, Qom university of technology Qom, Iran.

Golnoush Abaei

Faculty of Electrical, Computer, and Biomedical Engineering, Shahabdanesh University.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. H. Jafier. Utilizing feature selection techniques in intrusion detection system ...
  • O. Flauzac, C. J. Gonzalez Santamaría, and F. Nolot. New security architecture for IoT ...
  • S. H. Jafier. Security issues and challenges for the IoT-based smart ...
  • M. Sheikhan and H. Bostani. A hybrid intrusion detection architecture for internet ...
  • A. Qureshi, H. L., J. Ahmad, and N. Mtetwa. A Heuristic Intrusion Detection System ...
  • Y. Xue, W. Jia, X. Zhao, and W. Pang. An evolutionary computation based feature ...
  • M. Alidoosti and A. Nowroozi. Cross layer-based intrusion detection based on network ...
  • A. A. Gendreau and M. Moorman. Survey of intrusion detection systems towards ...
  • M. Usha and P. Kavitha. Anomaly based intrusion detection for 802.11 networks ...
  • H. M. Aldosari. A proposed security layer for the Internet of ...
  • F. Restuccia, S. D’Oro, and T. Melodia. Securing the internet of things in ...
  • B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga. A ...
  • F. Restuccia, S. D’Oro, and T. Melodia. A survey on Internet of Things ...
  • D. M. Mendez, I. Papapanagiotou, and B. Yang. Internet of things: Survey on ...
  • L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu. IoT security techniques based ...
  • H. Bostani and M. Sheikhan. Hybrid of anomaly-based and specification-based IDS for ...
  • A. A. Diro and N. Chilamkurti. Distributed attack detection scheme using deep ...
  • S. Aljawarneh, M. Aldwairi, and M. B. Yassein. Anomaly-based intrusion detection system through ...
  • D. Andročec and N. Vrček. Machine Learning for the Internet of Things ...
  • P. Tao, Z. Sun, and Z. Sun. An improved intrusion detection algorithm based ...
  • K Anusha and E. Sathiyamoorthy. Comparative study for feature selection algorithms in ...
  • G. Chandrashekar and F. Sahin. A survey on feature selection methods. Computers ...
  • T. Hamed, R. Dara, and S. C. Kremer. Network intrusion detection system based ...
  • R. Sheikhpour, M. Sarram Agha, S. Gharaghani, and M. A. Z. Chahooki. A survey on ...
  • K. El-Khatib. Impact of feature reduction on the efficiency of wireless ...
  • B. Xue, M. Zhang, W. N. Browne, and X. Yao. A survey on evolutionary ...
  • E. Hancer, B. Xue, M. Zhang, D. Karaboga, and B. Akay. Pareto front feature selection ...
  • V. R. Balasaraswathi, M. Sugumaran, and Y. Hamid. Feature selection techniques for intrusion ...
  • H. Faris, I. Aljarah, M. A. Al-Betar, and S. Mirjalili. Grey wolf optimizer: a ...
  • M. Črepinšek, S. Liu, and M. Mernik. Exploration and exploitation in evolutionary algorithms: ...
  • N. Singh and S.Singh. Hybrid algorithm of particle swarm optimization and ...
  • W. Siedlecki and J. Sklansky. A note on genetic algorithms for large-scale ...
  • C. Tsai, W. Eberle, and C. Chu. Genetic algorithms in feature and instance ...
  • M. M. Mafarja and S. Mirjalili. Hybrid Whale Optimization Algorithm with simulated ...
  • M. A. Tawhid and K. B. Dsouza. Hybrid Binary Bat Enhanced Particle ...
  • M. Mafarja and S. Mirjalili. Whale optimization approaches for wrapper feature selection. ...
  • E. Emary, H. M. Zawbaa, and A. E. Hassanien. Binary grey wolf optimization ...
  • E. Emary, H. M. Zawbaa, and A. E. Hassanien. Binary ant lion approaches ...
  • E. Emary, W. Yamany, A. E. Hassanien, and V. Snasel. Multi-objective gray-wolf optimization for ...
  • E. Emary, H. M. Zawbaa, C. Grosan, and A. E. Hassenian. Feature subset selection ...
  • Y. Zhang, X. Song, and D. Gong. A return-cost-based binary firefly algorithm for ...
  • Z. Yong, G. Dun-wei, and Z. Wan-qiu. Feature selection of unreliable data using ...
  • H. M. Zawbaa, E. Emary, and C. Grosan. Feature selection via chaotic antlion ...
  • R. Sheikhpour, M. A. Sarram, and R. Sheikhpour. Particle swarm optimization for bandwidth ...
  • M. G. Raman, N. Somu, K. Kirthivasan, R. Liscano, and V. S. Sriram. An efficient ...
  • B. Senthilnayaki, K. Venkatalakshmi, and A. Kannan. Intrusion detection using optimal genetic feature ...
  • I. Ahmad, M. Hussain, A. Alghamdi, and A. Alelaiwi. Enhancing SVM performance in intrusion ...
  • A. Dastanpour and R. A. R. Mahmood. Feature selection based on genetic algorithm ...
  • A. Ferriyan, A. H. Thamrin, K. Takeda, and J. Murai. Feature selection using genetic ...
  • C. Khammassi and S. Krichen. A GA-LR wrapper approach for feature selection ...
  • K. S. Desale and R. Ade. Genetic algorithm based feature selection approach ...
  • B. Senthilnayaki, K. Venkatalakshmi, and A. Kannan. An intelligent intrusion detection system using ...
  • S. S. S. Sindhu, S. Geetha, and A. Kannan. Decision tree based light weight ...
  • Q. M. Alzubi, M. Anbar, Z. N. Alqattan, M. A. Al-Betar, and R. Abdullah. Intrusion ...
  • V. Sathish, P. Khader, and S. Abdul. Improved Detecting Host Based Intrusions Based ...
  • D. Srivastava, R. Singh, and V. Singh. An Intelligent Gray Wolf Optimizer: A ...
  • E. Devi and R. Suganthe. Enhanced transductive support vector machine classification with ...
  • J. Seth Kumar and S. Chandra. Intrusion detection based on key feature ...
  • A. Davahli, M. Shamsi, and G. Abaei. Hybridizing genetic algorithm and grey wolf ...
  • E. Devi and R. Suganthe. Feature selection in intrusion detection grey wolf ...
  • M. Mazini, B. Shirazi, and I. Mahdavi. Anomaly network-based intrusion detection system using ...
  • A. Qureshi, H. Larijani, N. Mtetwa, A. Javed, and J. Ahmad. RNN-ABC: A New Swarm ...
  • J. Li, Z. Zhao, R. Li, and H. Zhang. AI-based Two-Stage Intrusion Detection for ...
  • H. Bostani and M. Sheikhan. Hybrid of binary gravitational search algorithm and ...
  • S. Kang and K. J. Kim. A feature selection approach to find ...
  • S. M. H. Bamakan, H. Wang, T. Yingjie, and Y.Shi. An effective intrusion detection ...
  • A. S. Eesa, Z. Orman, and A. M. A. Brifcani. A novel feature-selection approach ...
  • J. Holland. Adaptation in natural and artificial systems: an introductory analysis ...
  • J. H. Holland. Adaptation in natural and artificial systems: an introductory ...
  • J. H. Holland. Genetic Algorithms, Scientific American. Scientific american, 267(1):66--73, 1992. ...
  • S. Mirjalili, S. M. Mirjalili, and A. Lewis. Grey Wolf Optimizer. Advances in ...
  • A. Kishor and P. K. Singh. Empirical study of grey wolf optimizer. ...
  • M. A. Al-Betar, M. A. Awadallah, H. Faris, I. Aljarah, and A. I. Hammouri. Natural ...
  • E. A. Shams and A. Rizaner. A novel support vector machine based ...
  • M. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, and M. Guizani. A survey of machine ...
  • P. Aggarwal and S. K. Sharma. Analysis of KDD dataset attributes-class wise ...
  • L. Dhanabal and S. Shantharajah. A study on NSL-KDD dataset for intrusion ...
  • M. Alidoosti and A. Nowroozi. A detailed analysis of the KDD CUP ...
  • C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis. Intrusion detection in 802.11 networks: ...
  • M. E. Aminanto, H. C. Tanuwidjaja, P. D. Yoo, and K. Kim. Wi-Fi intrusion ...
  • S. H. Jafier. Detecting impersonation attack in WiFi networks using deep ...
  • I. Witten, E. Frank, and M. Hall. Data Mining: Practical machine learning tools ...
  • M. Alidoosti and A. Nowroozi. Weka: Practical machine learning tools and techniques ...
  • A. Eiben and S. Smit. Parameter tuning for configuring and analyzing evolutionary ...
  • Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, M. Gao, H. Hou, and C. Wang. ...
  • نمایش کامل مراجع