scispace - formally typeset
Open AccessJournal ArticleDOI

A Novel Feature Selection Method Using Whale Optimization Algorithm and Genetic Operators for Intrusion Detection System in Wireless Mesh Network

R. Vijayanand, +1 more
- 03 Mar 2020 - 
- Vol. 8, pp 56847-56854
TLDR
A wrapper-based approach using the modified whale optimization algorithm, in which the genetic algorithm operators were combined with the WOA to improve the search space of whales, and the mutation operator helped to avoid being stuck in the local optimum.
Abstract
Machine learning–based intrusion detection system (IDS) is an important requirement for securing data traffic in wireless mesh networks. The noisy and redundant features of network data tend to degrade the performance of the attack detection classifiers. Therefore , the selection of informative features plays a vital role in the enhancement to the IDS. In this paper, we propose a wrapper-based approach using the modified whale optimization algorithm (WOA). One drawback of WOA is that premature convergence results in a local optimal solution. To overcome this limitation, we proposed a method in which the genetic algorithm operators were combined with the WOA. The crossover operator was used to further improve the search space of whales, and the mutation operator helped to avoid being stuck in the local optimum. The proposed method selects the informative features in the network data, which helps to accurately detect intrusions. Using a support vector machine (SVM), we identified the types of intrusions based on the selected features. The performance of the improved method was analyzed by using the CICIDS2017 and ADFA-LD standard datasets. Our proposed method had better attack detection rate than the standard WOA and other evolutionary algorithms; it also had good accuracy and was suitable for IDS in the wireless mesh networks. The performance of the IDS was increased by selecting the informative features with the improved whale optimization algorithm. The attack detection ratio was higher than that of the standard WOA.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Intrusion detection systems using long short-term memory (LSTM)

TL;DR: In this article, the authors implemented deep learning solutions for detecting attacks based on Long Short-Term Memory (LSTM) and used PCA (principal component analysis) and Mutual Information (MI) techniques for dimensionality reduction and feature selection techniques.
Journal ArticleDOI

A review of recent approaches on wrapper feature selection for intrusion detection

TL;DR: In this paper , a review of recent advances in wrapper feature selection techniques for attack detection and classification, applied in intrusion detection area is presented, considering design, rationale, technical characteristics and common evaluation metrics.
Journal ArticleDOI

Fault Diagnosis of Rolling Bearing Based on GA-VMD and Improved WOA-LSSVM

TL;DR: A novel fault diagnosis method for rolling bearings combining wavelet threshold de-noising, genetic algorithm optimization variational mode decomposition, and the whale optimization algorithm based on the von Neumann topology optimization least squares support vector machine (VNWOA-LSSVM) is proposed.
Journal ArticleDOI

A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing

TL;DR: In this article, a new hybridization approach for the intrusion detection system is proposed to improve the overall security of cloud based computing environment and also helps to handle various type of security hurdles on the cloud for e.g., fake identity detection, Data leakage and Phishing attacks etc.
References
More filters
Book

Genetic algorithms in search, optimization, and machine learning

TL;DR: In this article, the authors present the computer techniques, mathematical tools, and research results that will enable both students and practitioners to apply genetic algorithms to problems in many fields, including computer programming and mathematics.
Journal ArticleDOI

Support-Vector Networks

TL;DR: High generalization ability of support-vector networks utilizing polynomial input transformations is demonstrated and the performance of the support- vector network is compared to various classical learning algorithms that all took part in a benchmark study of Optical Character Recognition.

Genetic algorithms in search, optimization and machine learning

TL;DR: This book brings together the computer techniques, mathematical tools, and research results that will enable both students and practitioners to apply genetic algorithms to problems in many fields.
Journal ArticleDOI

The Whale Optimization Algorithm

TL;DR: Optimization results prove that the WOA algorithm is very competitive compared to the state-of-art meta-heuristic algorithms as well as conventional methods.

Correlation-based Feature Selection for Machine Learning

Mark Hall
TL;DR: This thesis addresses the problem of feature selection for machine learning through a correlation based approach with CFS (Correlation based Feature Selection), an algorithm that couples this evaluation formula with an appropriate correlation measure and a heuristic search strategy.
Related Papers (5)
Trending Questions (1)
How is iwo optimizer help in Animal Detection and Intrusion System?

The provided paper does not mention anything about an "iwo optimizer" or its role in animal detection and intrusion systems.