Visible to the public Feature Selection by Improved Sand Cat Swarm Optimizer for Intrusion Detection

TitleFeature Selection by Improved Sand Cat Swarm Optimizer for Intrusion Detection
Publication TypeConference Paper
Year of Publication2022
AuthorsJovanovic, Dijana, Marjanovic, Marina, Antonijevic, Milos, Zivkovic, Miodrag, Budimirovic, Nebojsa, Bacanin, Nebojsa
Conference Name2022 International Conference on Artificial Intelligence in Everything (AIE)
KeywordsClassification algorithms, composability, compositionality, feature extraction, feature selection, Internet of Things, Intrusion detection, machine learning, pubcrawl, Real-time Systems, Sand cat swarm optimizer algorithm, security, Sensitivity, swarm intelligence, Transfer functions
AbstractThe rapid growth of number of devices that are connected to internet of things (IoT) networks, increases the severity of security problems that need to be solved in order to provide safe environment for network data exchange. The discovery of new vulnerabilities is everyday challenge for security experts and many novel methods for detection and prevention of intrusions are being developed for dealing with this issue. To overcome these shortcomings, artificial intelligence (AI) can be used in development of advanced intrusion detection systems (IDS). This allows such system to adapt to emerging threats, react in real-time and adjust its behavior based on previous experiences. On the other hand, the traffic classification task becomes more difficult because of the large amount of data generated by network systems and high processing demands. For this reason, feature selection (FS) process is applied to reduce data complexity by removing less relevant data for the active classification task and therefore improving algorithm's accuracy. In this work, hybrid version of recently proposed sand cat swarm optimizer algorithm is proposed for feature selection with the goal of increasing performance of extreme learning machine classifier. The performance improvements are demonstrated by validating the proposed method on two well-known datasets - UNSW-NB15 and CICIDS-2017, and comparing the results with those reported for other cutting-edge algorithms that are dealing with the same problems and work in a similar configuration.
DOI10.1109/AIE57029.2022.00134
Citation Keyjovanovic_feature_2022