An Efficient Feature Selection for Intrusion Detection System Using B-HKNN and C2 Search Based Learning Model (original) (raw)
Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32(1):e4150 Google Scholar
Sohi SM, Seifert JP, Ganji F (2021) RNNIDS: enhancing network intrusion detection systems through deep learning. Comput Secur 102:102151 Google Scholar
Marteau PF (2021) Random partitioning forest for point-wise and collective anomaly detection-application to network intrusion detection. IEEE Trans Inf Forensics Secur 16:2157–2172 Google Scholar
Ojugo AA, Yoro RE (2021) Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack. Int J Electr Comput Eng 11(2):1498 Google Scholar
Mulyanto M, Faisal M, Prakosa SW, Leu JS (2021) Effectiveness of focal loss for minority classification in network intrusion detection systems. Symmetry 13(1):4 Google Scholar
Ajdani M, Ghaffary H (2021) Design network intrusion detection system using support vector machine. Int J Commun Syst 34(3):e4689 Google Scholar
Nazir A, Khan RA (2021) Network intrusion detection: taxonomy and machine learning applications. In: Maleh Y, Shojafar M, Alazab M, Baddi Y (eds) Machine intelligence and big data analytics for cybersecurity applications. Springer, Cham, pp 3–28 Google Scholar
Yao R, Wang N, Liu Z, Chen P, Sheng X (2021) Intrusion detection system in the advanced metering infrastructure: a cross-layer feature-fusion CNN-LSTM-based approach. Sensors 21(2):626 Google Scholar
Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288 Google Scholar
Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126 Google Scholar
Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325 Google Scholar
Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovoltaics 28(11):1128–1145 Google Scholar
Ravikumar S, Kavitha D (2020) IoT based home monitoring system with secure data storage by Keccak-Chaotic sequence in cloud server. J Ambient Intell Humaniz Comput 12:7475–7487 Google Scholar
Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710 Google Scholar
Kavitha D, Ravikumar S (2021) IOT and context-aware learning-based optimal neural network model for real-time health monitoring. Trans Emerg Telecommun Technol 32(1):e4132 Google Scholar
Hassan BA, Rashid TA (2020) Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data Brief 28:105046 Google Scholar
Haseena KS, Anees S, Madheswari N (2014) Power optimization using EPAR protocol in MANET. Int J Innov Sci Eng Technol 6:430–436 Google Scholar
GowthulAlam MM, Baulkani S (2019) Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowl Inf Syst 60(2):971–1000 Google Scholar
GowthulAlam MM, Baulkani S (2017) Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. Int J Bus Intell Data Min 12(3):299 Google Scholar
GowthulAlam MM, Baulkani S (2019) Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput 23(4):1079–1098 Google Scholar
Nisha S, Madheswari AN (2016) Secured authentication for internet voting in corporate companies to prevent phishing attacks. Int J Emerg Technol Comput Sci Electron (IJETCSE) 22(1):45–49 Google Scholar
Zhou Q, Tan M, Xi H (2021) ACGANs-CNN: a novel intrusion detection method. J Phys 1757(1):012012 Google Scholar
Haghnegahdar L, Wang Y (2020) A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection. Neural Comput Appl 32(13):9427–9441 Google Scholar
Karataş G (2016) Genetic algorithm for intrusion detection system. In: 2016 24th Signal Processing and Communication Application Conference (SIU), IEEE, pp 1341–1344
Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl 148:113249 Google Scholar
Wei W, Chen S, Lin Q, Ji J, Chen J (2020) A multi-objective immune algorithm for intrusion feature selection. Appl Soft Comput 95:106522 Google Scholar
Prasad M, Tripathi S, Dahal K (2020) Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection. Comput Secur 99:102062 Google Scholar
Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247 Google Scholar
Almomani O (2020) A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry 12(6):1046 Google Scholar
Nagaraja A, Uma B, kumarGunupudi R (2020) UTTAMA: an intrusion detection system based on feature clustering and feature transformation. Found Sci 25(4):1049–1075 MathSciNet Google Scholar
Ayo FE, Folorunso SO, Abayomi-Alli AA, Adekunle AO, Awotunde JB (2020) Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection. Inf Secur J 29(6):267–283 Google Scholar
Chkirbene Z, Erbad A, Hamila R, Mohamed A, Guizani M, Hamdi M (2020) TIDCS: a dynamic intrusion detection and classification system based feature selection. IEEE Access 8:95864–95877 Google Scholar
Kalaivani S, Gopinath G (2020) Modified bee colony with bacterial foraging optimization based hybrid feature selection technique for intrusion detection system classifier model. ICTACT J Soft Comput. https://doi.org/10.21917/ijsc.2020.0305 Article Google Scholar
Shahee SA, Ananthakumar U (2020) An effective distance based feature selection approach for imbalanced data. Appl Intell 50(3):717–745 Google Scholar
Du G, Zhang J, Luo Z, Ma F, Ma L, Li S (2020) Joint imbalanced classification and feature selection for hospital readmissions. Knowl-Based Syst 200:106020 Google Scholar
Al-Utaibi KA, El-Alfy ES (2018) Intrusion detection taxonomy and data preprocessing mechanisms. J Intell Fuzzy Syst 34(3):1369–1383 Google Scholar
Kasongo SM, Sun Y (2020) A deep learning method with wrapper based feature selection for wireless intrusion detection system. Comput Secur 92:101752 Google Scholar
Feng ZK, Niu WJ, Liu S (2021) Cooperation search algorithm: a novel metaheuristic evolutionary intelligence algorithm for numerical optimization and engineering optimization problems. Appl Soft Comput 98:106734 Google Scholar
Bouchekara HR (2020) Most valuable player algorithm: a novel optimization algorithm inspired from sport. Oper Res Int Journal 20(1):139–195 Google Scholar
Kumbure MM, Luukka P, Collan M (2020) A new fuzzy k-nearest neighbor classifier based on the Bonferroni mean. Pattern Recogn Lett 140:172–178 Google Scholar
Pan Z, Wang Y, Pan Y (2020) A new locally adaptive k-nearest neighbor algorithm based on discrimination class. Knowl-Based Syst 204:106185 Google Scholar
Vijayanand R, Devaraj D (2020) A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network. IEEE Access 8:56847–56854 Google Scholar
Chawla A, Brian L, Sheila F, Paul J (2018) Host based intrusion detection system with combined CNN/RNN model. Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, Cham, pp 149–158 Google Scholar