Anomaly detection using modified linearity based grey swarm optimization algorithm and efficient hyper parameter optimization techniques

Автор: Advit Sharma, Dr. Sugandh Khanna

Журнал: Social Informatics Journal @socialinformaticsjournal

Статья в выпуске: 1 vol.3, 2024 года.

Бесплатный доступ

Attacks and anomalies are quiet common in today’s technological world. However it is important to identify these anomalies as soon as possible since these anomalies can cause various problem. Therefore anomaly detection plays a vital role in detecting these outliers. Anomaly detection detects suspicious activity which fundamentally falls outside of the respected pattern of behaviour. Anomaly detection aims at identifying the unpredicted and unexpected events in data streams which are commonly referred to as anomalous events. Therefore proposed modified linearity based grey swarm algorithm and hyperparameter optimization techniques for improving the performance of the proposed model. Hyperparameter optimization techniques implemented in the proposed model are genetic algorithm (GA), Grid Search and Random Search. Feature selection is implemented in the proposed model is modified linearity based grey swarm algorithm since it has the ability to reduce the convergence. In addition to modified linearity based grey swarm algorithm, modified objective function is employed in the proposed model as it has the capability to find solutions to problems which are difficult to solve. Finally the performance of the proposed model is evaluated and assessed using various performance metrics such as accuracy, recall, precision and F1 score. At last, proposed model is compared with the existing models and found that proposed model outperformed other existing models.

Еще

Anomaly detection, Modified Linearity Based Grey Swarm Algorithm, feature selection, hyperparameter optimization techniques, genetic algorithm, grid search, random search

Короткий адрес: https://sciup.org/170204396

IDR: 170204396   |   DOI: 10.58898/sij.v3i1.65-84

Список литературы Anomaly detection using modified linearity based grey swarm optimization algorithm and efficient hyper parameter optimization techniques

  • R. Alanazi and A. Aljuhani, "Anomaly detection for industrial internet of things cyberattacks," Computer Systems Science and Engineering, vol. 44, pp. 2361-2378, 2023.
  • T. A. Ahanger, A. Aljumah, and M. Atiquzzaman, "State-of-the-art survey of artificial intelligent techniques for IoT security," Computer Networks, p. 108771, 2022.
  • V. Rimmer, A. Nadeem, S. Verwer, D. Preuveneers, and W. Joosen, "Open-World Network Intrusion Detection," in Security and Artificial Intelligence: A Crossdisciplinary Approach, ed: Springer, 2022, pp. 254-283.
  • H. Albasheer, M. Md Siraj, A. Mubarakali, O. Elsier Tayfour, S. Salih, M. Hamdan, et al., "Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey," Sensors, vol. 22, p. 1494, 2022.
  • P. Spadaccino and F. Cuomo, "Intrusion detection systems for iot: opportunities and challenges offered by edge computing," arXiv preprint arXiv:2012.01174, 2020.
  • A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, and A. Alazab, "A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks," Electronics, vol. 8, p. 1210, 2019.
  • V. Hamolia, V. Melnyk, P. Zhezhnych, and A. Shilinh, "Intrusion detection in computer networks using latent space representation and machine learning," International Journal of Computing, vol. 19, pp. 442-448, 2020.
  • S. Khonde and V. Ulagamuthalvi, "Ensemble-based semi-supervised learning approach for a distributed intrusion detection system," Journal of Cyber Security Technology, vol. 3, pp. 163-188, 2019.
  • W. Song, W. Shen, L. Gao, and X. Li, "An early fault detection method of rotating machines based on unsupervised sequence segmentation convolutional neural network," IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-12, 2021.
  • A. Abhaya and B. K. Patra, "An efficient method for autoencoder based outlier detection," Expert Systems with Applications, vol. 213, p. 118904, 2023.
  • S. Bhatia, "Streaming Anomaly Detection," arXiv preprint arXiv:2301.13199, 2023.
  • S. Sivanantham, V. Mohanraj, Y. Suresh, and J. Senthilkumar, "Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network," Computer Systems Science and Engineering, vol. 44, pp. 1617-1631, 2023.
  • M. Douiba, S. Benkirane, A. Guezzaz, and M. Azrour, "An improved anomaly detection model for IoT security using decision tree and gradient boosting," The Journal of Supercomputing, vol. 79, pp. 3392-3411, 2023.
  • S. K. Das, S. Samal, P. Ranjan, and S. P. Das, "An Efficient Data Mining Technique for an Intrusion Detection System in Network," in Constraint Decision-Making Systems in Engineering, ed: IGI Global, 2023, pp. 1-17.
  • S. Mishra, R. Sagban, A. Yakoob, and N. Gandhi, "Swarm intelligence in anomaly detection systems: an overview," International Journal of Computers and Applications, vol. 43, pp. 109-118, 2021.
  • S. Gadal, R. Mokhtar, M. Abdelhaq, R. Alsaqour, E. S. Ali, and R. Saeed, "Machine Learning-Based Anomaly Detection Using K-Mean Array and Sequential Minimal Optimization," Electronics, vol. 11, p. 2158, 2022.
  • P. Lin, K. Ye, and C.-Z. Xu, "Dynamic Network Anomaly Detection System by Using Deep Learning Techniques," 2019.
  • S. H. Park, H. J. Park, and Y.-J. Choi, "RNN-based prediction for network intrusion detection," in 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2020, pp. 572-574.
  • M. Monshizadeh, V. Khatri, B. G. Atli, R. Kantola, and Z. Yan, "Performance evaluation of a combined anomaly detection platform," IEEE Access, vol. 7, pp. 100964-100978, 2019.
  • M. Imran, S. Khan, H. Hlavacs, F. A. Khan, and S. Anwar, "Intrusion detection in networks using cuckoo search optimization," Soft Computing, vol. 26, pp. 10651-10663, 2022.
  • A. H. S. Al-Safi, Z. I. R. Hani, and M. M. A. Zahra, "Using a hybrid algorithm and feature selection for network anomaly intrusion detection," J. Mech. Eng. Res. Dev, vol. 44, pp. 253-262, 2021.
  • A. George, "Anomaly Detection based on Machine Learning: Dimensionality Reduction using PCA and Classification using SVM," International Journal of Computer Applications, vol. 975, p. 8887.
  • A. Abusitta, G. H. de Carvalho, O. A. Wahab, T. Halabi, B. C. Fung, and S. Al Mamoori, "Deep learning-enabled anomaly detection for IoT systems," Internet of Things, vol. 21, p. 100656, 2023.
  • M. Ragab and M. F. S. Sabir, "Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment," Sustainable Energy Technologies and Assessments, vol. 52, p. 102311, 2022.
  • Y. Zhang, P. Li, and X. Wang, "Intrusion detection for IoT based on improved genetic algorithm and deep belief network," IEEE Access, vol. 7, pp. 31711-31722, 2019.
Еще
Статья научная