{"title":"利用二叉 FOX 优化和 V 型传递函数的网络 IDS 特征选择模型","authors":"Babita Majhi, Prastavana","doi":"10.1007/s12083-024-01720-z","DOIUrl":null,"url":null,"abstract":"<p>There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"8 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS\",\"authors\":\"Babita Majhi, Prastavana\",\"doi\":\"10.1007/s12083-024-01720-z\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.</p>\",\"PeriodicalId\":49313,\"journal\":{\"name\":\"Peer-To-Peer Networking and Applications\",\"volume\":\"8 1\",\"pages\":\"\"},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Peer-To-Peer Networking and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12083-024-01720-z\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01720-z","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
互联网在日常生活中的日常使用方式大幅增加。在连接物联网、通过在线教育提供帮助、通过在线游戏提供娱乐、做出商业决策等方面都有显著的表现。因此,所有这些活动都会产生大量数据,也需要对其进行管理。有必要确保这些网络免受恶意攻击,以防止任何有害行为。网络安全仍然是一个具有吸引力的研究课题。本文在实验中考虑了基于网流的数据集 NF-UNSWNB15-v2,并试图解决在构建 IDS 时遇到的问题。通过利用 FOX 优化和 V 型传递函数进行二值化,并选择最佳特征,解决了处理大量特征等问题。使用 Light-GBM 对其进行进一步分类,并评估二元分类和多类分类的结果。与其他现有方法相比,所提出的模型能为二元分类和多类分类选择最少的特征。在对各种参数进行进一步评估后,发现所提出的方法性能令人满意,并提高了对 DoS、Exploits、Fuzzers 等各种攻击的检测率。
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS
There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.
期刊介绍:
The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security.
The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain.
Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.