IEEE Access (Jan 2022)

Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks

  • Waheed Ali H. M. Ghanem,
  • Sanaa Abduljabbar Ahmed Ghaleb,
  • Aman Jantan,
  • Abdullah B. Nasser,
  • Sami Abdulla Mohsen Saleh,
  • Amir Ngah,
  • Arifah Che Alhadi,
  • Humaira Arshad,
  • Abdul-Malik H. Y. Saad,
  • Abiodun Esther Omolara,
  • Yousef A. Baker El-Ebiary,
  • Oludare Isaac Abiodun

DOI
https://doi.org/10.1109/ACCESS.2022.3192472
Journal volume & issue
Vol. 10
pp. 76318 – 76339

Abstract

Read online

The staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more dependable protection systems, including effective intrusion detection system (IDS) mechanisms which are equipped for boosting accurately detected threats and limiting erroneously detected threats simultaneously. Nonetheless, the proficiency of the IDS framework depends essentially on extracted features from network traffic and an effective classifier of the traffic into abnormal or normal traffic. The prime impetus of this study is to increase the performance of the IDS on networks by building a two-phase framework to reinforce and subsequently enhance detection rate and diminish the rate of false alarm. The initial stage utilizes the developed algorithm of a proficient wrapper-approach-based feature selection which is created on a multi-objective BAT algorithm (MOBBAT). The subsequent stage utilizes the features obtained from the initial stage to categorize the traffic based on the newly upgraded BAT algorithm (EBAT) for training multilayer perceptron (EBATMLP), to improve the IDS performance. The resulting methodology is known as the (MOB-EBATMLP). The efficiency of our proposition has been assessed by utilizing the mainstream benchmarked datasets: NLS-KDD, ISCX2012, UNSW-NB15, KDD CUP 1999, and CICIDS2017 which are established as standard datasets for evaluating IDS. The outcome of our experimental analysis demonstrates a noteworthy advancement in network IDS above other techniques.

Keywords