Hybrid PSO-Bagging Approach for Efficient and Accurate Network Anomaly Detection

https://doi.org/10.61710/kjcs.v3i1.93

المؤلفون

  • Hayder Adnan Mohammed Ministry of Education Iraq, General Direction of Vocational Education, Al-Basra, Iraq
  • Ahmed Sadeq Jaafar

الملخص

The surge in internet usage has triggered a substantial increase in network attacks, raising serious cyber security concerns. Fog computing, which enhances cloud computing by providing low-latency services to mobile users, is particularly susceptible to these threats due to its proximity to end users and limited computational resources. Traditional Intrusion Detection Systems (IDS) designed for conventional networks may not directly apply to fog computing environments, where the ability to process and analyze large volumes of data efficiently is crucial. This paper presents a novel approach for network anomaly detection within fog environments, utilizing a Particle Swarm Optimization (PSO) -based Wrapper feature selection method combined with the Bagging technique. By applying this methodology to the NSL-KDD dataset, our approach effectively reduces computational complexity and improves the accuracy of intrusion detection models. The proposed system demonstrates superior performance compared to existing methods, achieving an impressive 98.3% accuracy and a low false positive rate of 1.5%. These results underscore the potential of the PSO-Bagging framework to enhance the security of fog computing systems, offering a robust solution to the growing problem of network attacks in distributed computing environments.

التنزيلات

بيانات التنزيل غير متوفرة بعد.

المراجع

S. Krishnamoorthy, S. Amit, and G. Shashank, "Role of emerging technologies in future IoT-driven Healthcare 4.0 technologies: A survey, current challenges and future directions," J. Ambient Intell. Humaniz. Comput., vol. 14, no. 1, pp. 361-407, 2023.

K. Ashok and S. Gopikrishnan, "Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments From a Pragmatic Perspective," IEEE Access, vol. 11, pp. 2621-2651, 2023.

M. Douiba, et al., "An improved anomaly detection model for IoT security using decision tree and gradient boosting," J. Supercomput., vol. 79, no. 3, pp. 3392-3411, 2023.

M. Casillo, et al., "An IoT-based system for expert user supporting to monitor, manage and protect cultural heritage buildings," in Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, Cham: Springer International Publishing, 2022, pp. 143-154.

S. Kumar and B. R. Chandavarkar, "Analysis of Mirai Malware and Its Components," in Machine Learning, Image Processing, Network Security and Data Sciences: Select Proceedings of 3rd International Conference on MIND 2021, Singapore: Springer Nature Singapore, 2023.

M. Mohy-eddine, et al., "An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection," Multimedia Tools Appl., vol. 1-19, 2023.

D.-M. Ngo, et al., "HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security," Future Internet, vol. 15, no. 1, p. 9, 2023.

M. Mahamat, G. Jaber, and A. Bouabdallah, "Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges," Wireless Netw., vol. 29, no. 2, pp. 787-808, 2023.

D. K. Reddy, et al., "Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities," Trans. Emerg. Telecommun. Technol., vol. 32, no. 7, p. e4121, 2021.

T. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, "BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset," IEEE Access, vol. 8, pp. 29575-29585, 2020.

W. Xu, J. Jang-Jaccard, A. Singh, Y. Wei, and F. Sabrina, "Improving performance of autoencoder-based network anomaly detection on NSL-KDD dataset," IEEE Access, vol. 9, pp. 140136-140146, 2021.

W. L. Al-Yaseen, Z. A. Othman, and M. Z. A. Nazri, "Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system," Expert Syst. Appl., vol. 67, pp. 296-303, 2017.

F. Türk, "Analysis of intrusion detection systems in UNSW-NB15 and NSL-KDD datasets with machine learning algorithms," Bitlis Eren Üniversitesi Fen Bilimleri Dergisi, vol. 12, no. 2, pp. 465-477, 2023.

B. Mohammed and E. K. Gbashi, "Intrusion detection system for NSL-KDD dataset based on deep learning and recursive feature elimination," Eng. Technol. J., vol. 39, no. 7, pp. 1069-1079, 2021.

S. Hashem and H. Adil, "Denial of service intrusion detection system (IDS) based on Naïve Bayes classifier using NSL KDD and KDD cup 99 datasets," J. Al-Rafidain Univ. Coll. Sci., no. 2, pp. 206-231, 2017.

K. Bong and J. Kim, "Analysis of intrusion detection performance by smoothing factor of Gaussian NB model using modified NSL-KDD dataset," in 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), 2022, pp. 1471-1476.

A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, "CNN-LSTM: hybrid deep neural network for network intrusion detection system," IEEE Access, vol. 10, pp. 99837-99849, 2022.

S. Sarvari, N. F. M. Sani, Z. M. Hanapi, and M. T. Abdullah, "An efficient anomaly intrusion detection method with feature selection and evolutionary neural network," IEEE Access, vol. 8, pp. 70651-70663, 2020.

R. Eberhart and J. Kennedy, "A new optimizer using particle swarm theory," in Proceedings of the Sixth International Symposium on Micro Machine and Human Science, 1995, pp. 39-43.

A. P. Engelbrecht, Computational Intelligence: An Introduction, 2nd ed. Hoboken, NJ, USA: Wiley, 2007.

L. Breiman, "Bagging predictors," Machine Learning, vol. 24, no. 2, pp. 123-140, 1996.

Z. Liang, D. Schwartz, G. Ditzler, and O. O. Koyluoglu, "The impact of encoding–decoding schemes and weight normalization in spiking neural networks," Neural Networks, vol. 108, pp. 365-378, 2018.

N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, "SMOTE: synthetic minority over-sampling technique," Journal of Artificial Intelligence Research, vol. 16, pp. 321-357, 2002

H. Al-Kabbi, M.-R. Feizi-Derakhshi, and S. Pashazadeh, "Multi-type feature extraction and early fusion framework for SMS spam detection," IEEE Access, 2023.

Y. Zhang, X. Li, and Y. Sun, "An improved bagging ensemble method for intrusion detection," IEEE Access, vol. 10, pp. 10229-10241, 2022.

S. Rani and V. Sharma, "A comprehensive review of anomaly detection methods in fog computing," Future Generation Computer Systems, vol. 116, pp. 65-83, 2021.

R. Bala and R. Nagpal, "A review on KDD Cup 99 and NSL KDD dataset," International Journal of Advanced Research in Computer Science, vol. 10, no. 2, 2019.

H. Al-Kabbi, M.-R. Feizi-Derakhshi, and S. Pashazadeh, "A hierarchical two-level feature fusion approach for SMS spam filtering," Intelligent Automation & Soft Computing, vol. 39, no. 4, 2024.

F. A. Bida, "Medical image improvement using a proposed algorithm," AlKadhim Journal for Computer Science, vol. 2, no. 1, pp. 1-1, Mar. 14, 2024.

M. R. F. Derakhshi, E. Zafarani-Moattar, H. A. Al-Kabi, and A. H. J. Almarashy, "PCLF: Parallel CNN-LSTM fusion model for SMS spam filtering," BIO Web of Conferences, vol. 97, p. 00136, 2024.

D. K. Reddy et al., "Deep learning for intrusion detection in cloud computing: A survey," Journal of Cloud Computing: Advances, Systems and Applications, vol. 9, no. 1, pp. 1-15, 2020.

KHALAF, ALI D. "A Robust Privacy Preserving Authentication Scheme for IOT Environment by 5G Technology." Alkadhim Journal for Computer Science 2, no. 1 (2024).

منشور

2025-03-25

كيفية الاقتباس

Adnan Mohammed, haider, & Sadeq Jaafar, A. . (2025). Hybrid PSO-Bagging Approach for Efficient and Accurate Network Anomaly Detection. مجلة الكاظم لعلوم الحاسوب, 3(1), 1–13. https://doi.org/10.61710/kjcs.v3i1.93