The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security

Over last decade, there is a rapid advancement in networking and computing technologies that produced large volume of sensitive data. Clearly, protecting those data from intrusions and attack is of paramount importance. Researchers have proposed many cyber security solutions and tools to protect the data. One such technique for safeguarding data is the Intrusion Detection System (IDS). This research introduces a hybrid optimization-based Feature Selection (FS) and deep learning-driven categorization namely Honey Badger Optimization-Artificial Neural Network (HBO-ANN) to identify intrusions. The Honey Badger Optimization (HBO) is an optimization technique that is utilized to choose the dataset’s most important features. The Artificial Neural Network (ANN) receives reduced features dataset and classifies it as benign or attack. Additionally, a well-known CIC-IDS 2017 dataset is employed to construct and validate the suggested system. Performance metrics for assessing the effectiveness of the suggested system are the false alarm rate, Mean Squared Error (MSE), precision, accuracy and recall. The testing and training MSEs are 0.009 and 0.00317, respectively. The model’s accuracy is 97.66%. The model has a precision of 98.03% and a recall of 97.18%. There is a 1.97% false alarm rate. The outcomes have been compared with bench mark models such as Grey Wolf Optimizer-Support Vector Machine (GWO-SVM), Particle Swarm Optimization-Support Vector Machine (PSO-SVM), Fuzzy Clustering-Artificial Neural Network (FC-ANN), Bidirectional Long-Short-Term-Memory (BiDLSTM) and Feed-Forward Deep Neural Network (FFDNN). As demonstrated by the experimental results, the suggested model outperforms the benchmark algorithms.

[1] Aburomman A. and Reaz M., “A Novel SVM- KNN-PSO Ensemble Method for Intrusion Detection System,” Applied Soft Computing, vol. 38, pp. 360-372, 2016. https://doi.org/10.1016/j.asoc.2015.10.011

[2] Al S. and Dener M., “STL-HDL: A New Hybrid Network Intrusion Detection System for Imbalanced Dataset on Big Data Environment,” Computers and Security, vol. 110, pp. 102435, 2021. https://doi.org/10.1016/j.cose.2021.102435

[3] Ali M., Al Mohammed B., Ismail A., and Zolkipli M., “A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization,” IEEE Access, vol. 6, pp. 20255- 20261, 2018. https://ieeexplore.ieee.org/document/8326489

[4] Almutairi L., Daniel R., Khasimbee S., Lydia E., Acharya S., and Kim H., “Quantum Dwarf Mongoose Optimization with Ensemble Deep Learning Based Intrusion Detection in Cyber- Physical Systems,” IEEE Access, vol. 11, pp. 66828-66837, 2023. DOI:10.1109/ACCESS.2023.3287896

[5] Alohali M., Al-Wesabi F., Hilal A., Goel S., Gupta D., and Khanna A., “Artificial Intelligence Enabled Intrusion Detection Systems for Cognitive Cyber-Physical Systems in Industry 4.0 Environment,” Cognitive Neurodynamics, vol. 16, no. 5, pp. 1045-1057, 2022. https://pubmed.ncbi.nlm.nih.gov/36237400/

[6] Alpaydin E., Machine Learning (Revised and Updated Edition), MIT Press, 2021. https://www.amazon.com.au/Machine-Learning- revised-updated-Alpaydin/dp/0262542528

[7] Alqahtani A., “FSO-LSTM IDS: Hybrid Optimized and Ensembled Deep-Learning Network-based Intrusion Detection System for Smart Networks,” The Journal of Supercomputing, vol. 78, pp. 9438-9455, 2022. https://link.springer.com/article/10.1007/s11227- 021-04285-3

[8] Alweshah M., Hammouri A., Alkhalaileh S., and Alzubi O., “Intrusion Detection for the Internet of Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization ... 75 Things (IoT) Based on the Emperor Penguin Colony Optimization Algorithm,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 5, pp. 6349-6366, 2023. https://link.springer.com/article/10.1007/s12652- 022-04407-6

[9] Alzubi O., Alzubi J., Alazab M., Alrabea A., Awajan A., and Qiqieh I., “Optimized Machine Learning-based Intrusion Detection System for Fog and Edge Computing Environment,” Electronics, vol. 11, no. 19, pp. 1-16, 2022. https://www.mdpi.com/2079-9292/11/19/3007

[10] Chinnasamy R. and Subramanian M., Artificial Intelligence for Intrusion Detection Systems, Chapman and Hall/CRC, 2023. https://www.taylorfrancis.com/chapters/edit/10.1 201/9781003346340-3/detection-malicious- activities-smart-signature-based-ids-ramya- chinnasamy-malliga-subramanian

[11] Chinnasamy R., Malliga S., and Sengupta N., “Deep Learning-Driven Intrusion Detection Systems for Smart Cities-A Systematic Study,” in Proceedings of the 6th Smart Cities Symposium, Hybrid Conference, Bahrain, pp. 79-84, 2022. DOI:10.1049/icp.2023.0341

[12] Chinnasamy R., Subramanian M., and Sengupta N., “Designing of Intrusion Detection System Using an Ensemble of Artificial Neural Network and Honey Badger Optimization Algorithm,” in Proceedings of the International Conference on IT Innovation and Knowledge Discovery, Manama, pp. 1-6, 2023. https://ieeexplore.ieee.org/document/10100161

[13] Fatani A., Dahou A., Al-Qaness M., Lu S., and Abd Elaziz M., “Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System,” Sensors, vol. 22, no. 1, pp. 1-20, 2022. https://www.mdpi.com/1424-8220/22/1/140

[14] Ferrag M., Maglaras L., Ahmim A., Derdour M., and Janicke H., “Rdtids: Rules and Decision Tree- Based Intrusion Detection System for Internet-of- Things Networks,” Future Internet, vol. 12, no. 3, pp. 1-14, 2020. https://www.mdpi.com/1999- 5903/12/3/44

[15] Guezzaz A., Azrour M., Benkirane S., Mohy- Eddine M., Attou H., and Douiba M., “A Lightweight Hybrid Intrusion Detection Framework Using Machine Learning for Edge- based IIoT Security,” The International Arab Journal of Information Technology, vol. 19, no. 5, pp. 822-830, 2022. https://www.iajit.org/portal/images/Year2022/No .5/21353.pdf

[16] Hajimirzaei B. and Navimipour N., “Intrusion Detection for Cloud Computing Using Neural Networks and Artificial Bee Colony Optimization Algorithm,” ICT Express, vol. 5, pp. 56-59, 2019. https://doi.org/10.1016/j.icte.2018.01.014

[17] Hashim F., Houssein E., Hussain K., Mabrouk M., and Al-Atabany W., “Honey Badger Algorithm: New Metaheuristic Algorithm for Solving Optimization Problems,” Mathematics and Computers in Simulation, vol. 192, pp. 84-110, 2022. https://doi.org/10.1016/j.matcom.2021.08.013

[18] Imran M., Khan S., Hlavacs H., Khan F., and Anwar S., “Intrusion Detection in Networks Using Cuckoo Search Optimization,” Soft Computing, vol. 26, no. 20, pp. 10651-10663, 2022. https://link.springer.com/article/10.1007/s00500- 022-06798-2

[19] Imrana Y., Xiang Y., Ali L., and Abdul-Rauf Z., “A Bidirectional LSTM Deep Learning Approach for Intrusion Detection,” Expert Systems with Applications, vol. 185, pp. 115524, 2021. https://doi.org/10.1016/j.eswa.2021.115524

[20] Kasongo S. and Sun Y., “A Deep Learning Method with Wrapper Based Feature Extraction for Wireless Intrusion Detection System,” Computers and Security, vol. 92, pp. 101752, 2020. https://doi.org/10.1016/j.cose.2020.101752

[21] Khan I., Moustafa N., Pi D., Haider W., Li B., and Jolfaei A., “An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities from Autonomous Vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 25469-25478, 2021. https://ieeexplore.ieee.org/document/9519840

[22] Khraisat A., Gondal I., Vamplew P., and Kamruzzaman J., “Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges,” Cybersecurity, vol. 2, no. 20, pp. 1-22, 2019. https://doi.org/10.1186/s42400-019-0038-7

[23] Kunang Y., Nurmaini S., Stiawan D., and Suprapto B., “Attack Classification of an Intrusion Detection System Using Deep Learning and Hyperparameter Optimization,” Journal of Information Security and Applications, vol. 58, pp. 102804, 2021. https://doi.org/10.1016/j.jisa.2021.102804

[24] Li Y., Ghoreishi S., and Issakhov A., “Improving the Accuracy of Network Intrusion Detection System in Medical IoT Systems through Butterfly Optimization Algorithm,” Wireless Personal Communications, vol. 126, no. 3, pp. 1999-2017, 2022. https://link.springer.com/article/10.1007/s11277- 021-08756-x

[25] Mansour R., Abdel-Khalek S., Hilali-Jaghdam I., Nebhen J., Cho W., and Joshi G., “An Intelligent Outlier Detection with Machine Learning Empowered Big Data Analytics for Mobile Edge Computing,” Cluster Computing, vol. 26, pp. 71- 83, 2023. 76 The International Arab Journal of Information Technology, Vol. 22, No. 1, January 2025 https://link.springer.com/article/10.1007/s10586- 021-03472-4

[26] Moizuddin M. and Jose M., “A Bio-Inspired Hybrid Deep Learning Model for Network Intrusion Detection,” Knowledge-Based Systems, vol. 238, pp. 107894, 2022. https://doi.org/10.1016/j.knosys.2021.107894

[27] Nasir M., Javed A., Tariq M., Asim M., and Baker T., “Feature Engineering and Deep Learning- based Intrusion Detection Framework for Securing Edge IoT,” The Journal of Supercomputing, vol. 78, pp. 8852-8866, 2022. https://link.springer.com/article/10.1007/s11227- 021-04250-0

[28] Otair M., Ibrahim O., Abualigah L., Altalhi M., and Sumari P., “An Enhanced Grey Wolf Optimizer Based Particle Swarm Optimizer for Intrusion Detection System in Wireless Sensor Networks,” Wireless Networks, vol. 28, no. 2, pp. 721-744, 2022. https://link.springer.com/article/10.1007/s11276- 021-02866-x

[29] Panigrahi R. and Borah S., “A Detailed Analysis of CICIDS2017 Dataset for Designing Intrusion Detection Systems,” International Journal of Engineering and Technology, vol. 7, no. 3, pp. 479-482, 2018. file:///C:/Users/user/Downloads/IJET-22797.pdf

[30] Pingale S. and Sutar S., “Remora Whale Optimization-Based Hybrid Deep Learning for Network Intrusion Detection Using CNN Features,” Expert Systems with Applications, vol. 210, pp. 118476, 2022. https://doi.org/10.1016/j.eswa.2022.118476

[31] Ponmalar A. and Dhanakoti V., “An Intrusion Detection Approach Using Ensemble Support Vector Machine Based Chaos Game Optimization Algorithm in Big Data Platform,” Applied Soft Computing, vol. 116, pp. 108295, 2022. https://doi.org/10.1016/j.asoc.2021.108295

[32] Safaldin M., Otair M., and Abualigah L., “Improved Binary Gray Wolf Optimizer and SVM for Intrusion Detection System in Wireless Sensor Networks,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 2, pp. 1559- 1576, 2021. https://link.springer.com/article/10.1007/s12652- 020-02228-z

[33] Scarfone K. and Mell P., Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication, 2007. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistsp ecialpublication800-94.pdf

[34] Sood K., Nosouhi M., Nguyen D., Jiang F., Chowdhury M., and Doss R., “Intrusion Detection Scheme with Dimensionality Reduction in Next Generation Networks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 965-979, 2023. https://ieeexplore.ieee.org/document/10004971

[35] Tabash M., Abd Allah M., and Tewfik B., “Intrusion Detection Model Using Naive Bayes and Deep Learning Technique,” The International Arab Journal of Information Technology, vol. 17, no. 2, pp. 215-224, 2020. https://www.iajit.org/portal/PDF/Vol%2017,%20 No.%202/17046.pdf

[36] Thakur S., Chakraborty A., De R., Kumar N., and Sarkar R., “Intrusion Detection in Cyber-Physical Systems Using a Generic and Domain Specific Deep Autoencoder Model,” Computers and Electrical Engineering, vol. 91, pp. 107044, 2021. https://doi.org/10.1016/j.compeleceng.2021.1070 44

[37] Vijayanand R. and Devaraj D., “A Novel Feature Selection Method Using Whale Optimization Algorithm and Genetic Operators for Intrusion Detection System in Wireless Mesh Network,” IEEE Access, vol. 8, pp. 56847-56854, 2020. https://ieeexplore.ieee.org/document/9022974

[38] Yan X., He Z., Huang Y., Xu X., Wang J., Zhou X., Wang C., Lu Z., “A Lightweight Pedestrian Intrusion Detection and Warning Method for Intelligent Traffic Security,” KSII Transactions on Internet and Information Systems, vol. 16, no. 12, pp. 3904-3922, 2022. https://itiis.org/digital- library/38212