-
آرشیو :
نسخه بهار 1397
-
موضوع :
هوش مصنوعی
-
نویسنده/گان :
ستایش صادقی، عباس رضایی، امین گلاب پور
-
کلید واژه :
انتخاب ویژگی، الگوریتم بهینه سازی گرگ خاکستری، جنگل تصادفی، یادگیری ماشین
-
Title :
Proposed an intrusion detection system method using feature selection based on gray wolf optimization algorithm and random forest classification
-
Abstract :
Nowadays it is very hard to imagine a world without the internet. However, one of the challenges that is always present on the Internet is the security of these networks. One of the major security threats in the Internet is the network penetration. Penetration has negative consequences like stealing important information. Therefore, it is necessary to identify these intrusions in Internet networks based on such mechanisms. One of the tools used for intrusion detection is data mining and machine learning tools. Therefore, many researchers have studied in this field and we similarly studied and implemented here. Then a new method based on gray wolf algorithm was optimized. In the proposed method, using gray wolf optimization algorithm and random forest classification done the feature selection and its results are compared with similar methods. Then, by examining the results of this comparison, it is shown that after feature selection and identifying the most important features, the time of constructing the model is improved and the proposed algorithm of this paper with due to simplification, it performs better
-
مراجع :
[1] Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung " Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications Volume 36, Issue 1, January 2013.
[2] Suhair H Amer, Jr John A Hamilton " Input Data Processing Techniques in Intrusion Detection Systems" 2015 Global Journal of Computer Science and Technology , 2015.
[3] Liguo Chen, Yuedong Zhang, Qi Zhaob, Guanggang Gengb, ZhiWei Yan, “Detection of DNS DDoS Attacks with Random Forest Algorithm on Spark”, The 2nd International Workshop on Big Data and Networks Technologies, 2018.
[4] K. Ishibashi, T. Toyono, K. Toyama, M. Ishino, H. Ohshima, I. Mizukoshi, Detecting mass mailing worm infected hosts by mining dns traffic data, in: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, ACM, pp.159–164, 2005.
[5] H. Choi, H. Lee, H. Lee, H. Kim, Botnet detection by monitoring group activities in dns traffic, in: Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on, IEEE, pp. 715–720, 2007.
[6] J. Zhang, R. Perdisci, W. Lee, X. Luo, U. Sarfraz, Building a scalable system for stealthy p2p-botnet detection, IEEE transactions on information forensics and security 9 (1), 27–38, 2014.
[7] W. Ruan, Y. Liu, R. Zhao, Pattern discovery in dns query traffic, Procedia Computer Science 17, 80 – 87, 2013. doi:http://dx.doi.org/10.1016/j.procs.2013.05.012.
[8] J. Zhang, Y. Zhang, P. Liu, J. He, A spark-based ddos attack detection model in cloud services, in: International Conference onInformation Security Practice and Experience, Springer, pp. 48–64, 2016.
[9] R. Begleiter, Y. Elovici, Y. Hollander, O. Mendelson, L. Rokach, R. Saltzman, A fast and scalable method for threat detection in large-scale dns logs, 2013 IEEE International Conference on, IEEE, pp. 738–741, 2013.
[10] Guyon, I.; “An Introduction to Variable and Feature Selection”; Journal of Machine Learning Research, 2003, Vol.3, pp.1157-1182.
[11] S. Mirjalili, M. Mirjalili.,” Grey Wolf Optimizer”, Eelsevier, Advances in Engineering Software, vol. 69, pp. 46-61, (2014).
[12] Manjula C. Belavagi, and Balachandra Muniyal,” Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection”, Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016), 89, 117 – 123, 2016.
- صفحات : 30-40
-
دانلود فایل
( 727 KB )