A Variable Structure Learning Automata Approach for the Feature Reduction Problem of Intrusion Detection Systems
Subject Areas : journal of Artificial Intelligence in Electrical Engineering
Kayvan Asghari
1
*
,
Majid Samadzamini
2
,
Solmaz Abdollahizad
3
1 - Department of Computer Engineering, Sardroud Center, Tabriz Branch, Islamic Azad University, Tabriz, Iran
2 - Department of Computer Engineering, Sardroud Center, Tabriz Branch, Islamic Azad University, Tabriz, Iran
3 - Department of Computer Engineering, Sardroud Center, Tabriz Branch, Islamic Azad University, Tabriz, Iran
Keywords: Intrusion detection, Learning automata, Optimization, Feature selection,
Abstract :
A variable structure learning automata based method is proposed in this paper for solving the feature selection problem in designing the intrusion detection systems. The proposed method can explore the problem's search space using reward and penalty mechanism of learning automata. The target of proposed method is to increase the accuracy rate of the designed intrusion detection system by selecting the most significant features. The UNSW-NB15 intrusion detection dataset is employed for investigating the proposed method. The results of the designed experiments demonstrated the performance dominance of the proposed method for most experiments in contrast with some other well-known methods.
[1] A. S. Eesa, Z. Orman, and A. M. A. Brifcani, “A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems,” Expert Syst Appl, vol. 42, no. 5, pp. 2670–2679, Apr. 2015, doi: 10.1016/j.eswa.2014.11.009.
[2] B. Selvakumar and K. Muneeswaran, “Firefly algorithm based feature selection for network intrusion detection,” Comput Secur, vol. 81, pp. 148–155, Mar. 2019, doi: 10.1016/j.cose.2018.11.005.
[3] T. Khorram and N. A. Baykan, “Feature selection in network intrusion detection using metaheuristic algorithms,” International Journal Of Advance Research, Ideas and Innovations in Technolog, vol. 4, no. 4, pp. 704–710, 2018.
[4] M. H. Aghdam and P. Kabiri, “Feature Selection for Intrusion Detection System Using Ant Colony Optimization,” 2016.
[5] Z. Halim et al., “An effective genetic algorithm-based feature selection method for intrusion detection systems,” Comput Secur, vol. 110, p. 102448, Nov. 2021, doi: 10.1016/j.cose.2021.102448.
[6] H. Alazzam, A. Sharieh, and K. E. Sabri, “A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer,” Expert Syst Appl, vol. 148, p. 113249, Jun. 2020, doi: 10.1016/j.eswa.2020.113249.
[7] T. S. Naseri and F. S. Gharehchopogh, “A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems,” Journal of Network and Systems Management, vol. 30, no. 3, pp. 1–27, Jul. 2022, doi: 10.1007/s10922-022-09653-9.
[8] “Learning Automata: An Introduction - Kumpati S. Narendra, Mandayam A.L. Thathachar - Google Books.” Accessed: Jul. 24, 2024. [Online]. Available: https://books.google.de/books/about/Learning_Automata.html?id=ZwbCAgAAQBAJ&redir_esc=y
[9] S. Sabamoniri, K. Asghari, and M. Javad Hosseini, “Solving Single Machine Total Weighted Tardiness Problem using Variable Structure Learning Automata,” Int J Comput Appl, vol. 56, no. 1, pp. 37–42, Oct. 2012, doi: 10.5120/8858-2816.
[10] G. I. Papadimitriou, M. S. Obaidat, and A. S. Pomportsis, “On the use of learning automata in the control of broadcast networks: A methodology,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 32, no. 6, pp. 781–790, Dec. 2002, doi: 10.1109/TSMCB.2002.1049612.
[11] K. Asghari, M. Masdari, F. Soleimanian Gharehchopogh, and R. Saneifard, “A fixed structure learning automata‐based optimization algorithm for structure learning of Bayesian networks,” Expert Syst, vol. 38, no. 7, Nov. 2021, doi: 10.1111/exsy.12734.
[12] K. Asghari, A. S. Mamaghani, and M. R. Meybodi, “An evolutionary algorithm for query optimization in database,” in Innovative Techniques in Instruction Technology, E-Learning, E-Assessment, and Education, Kluwer Academic Publishers, 2008, pp. 249–254. doi: 10.1007/978-1-4020-8739-4_44.
[13] S. Mukherjee and N. Sharma, “Intrusion Detection using Naive Bayes Classifier with Feature Reduction,” Procedia Technology, vol. 4, pp. 119–128, Jan. 2012, doi: 10.1016/j.protcy.2012.05.017.
[14] N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings, Institute of Electrical and Electronics Engineers Inc., Dec. 2015. doi: 10.1109/MilCIS.2015.7348942.
[15] H. J. Liao, C. H. Richard Lin, Y. C. Lin, and K. Y. Tung, “Intrusion detection system: A comprehensive review,” Jan. 01, 2013, Academic Press. doi: 10.1016/j.jnca.2012.09.004.
[16] A. Shenfield, D. Day, and A. Ayesh, “Intelligent intrusion detection systems using artificial neural networks,” ICT Express, vol. 4, no. 2, pp. 95–99, Jun. 2018, doi: 10.1016/j.icte.2018.04.003.
[17] Q. M. Alzubi, M. Anbar, Z. N. M. Alqattan, M. A. Al-Betar, and R. Abdullah, “Intrusion detection system based on a modified binary grey wolf optimisation,” Neural Comput Appl, vol. 32, no. 10, pp. 6125–6137, May 2020, doi: 10.1007/s00521-019-04103-1.
[18] Y. Fu, D. Liu, J. Chen, and L. He, “Secretary bird optimization algorithm: a new metaheuristic for solving global optimization problems,” Artif Intell Rev, vol. 57, no. 5, pp. 1–102, May 2024, doi: 10.1007/S10462-024-10729-Y/FIGURES/4.
[19] A. J. Malik, W. Shahzad, and F. A. Khan, “Network intrusion detection using hybrid binary PSO and random forests algorithm,” Security and Communication Networks, vol. 8, no. 16, pp. 2646–2660, Nov. 2015, doi: 10.1002/sec.508.