Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3501409.3501651acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

Intrusion Detection Method Based on Genetic Algorithm of Optimizing LightGBM

Published: 31 December 2021 Publication History

Abstract

In response to the high-precision requirements of intrusion detection systems, an intrusion detection method based on genetic algorithm of optimizing LightGBM is proposed. The recursive feature elimination algorithm is used to select the optimal feature subset, and a weighted loss function is designed to solve the problem of imbalanced network traffic data. Aiming at the problem that the performance of LightGBM is greatly affected by parameters and the cumbersome parameter adjustment, the powerful global search capability of genetic algorithm is used to optimize LightGBM and automatically determine the optimal parameter combination. Using the CIC-IDS2017 data set experiment, the experimental results show that the accuracy of this method is as high as 99.88%, which has higher detection accuracy than other methods.

References

[1]
J.-f. Cui, H. Xia, R. Zhang, B.-x. Hu, and X.-g. Cheng, "Optimization scheme for intrusion detection scheme GBDT in edge computing center," Computer Communications, vol. 168, pp. 136--145, 2021/02/15/, 2021.
[2]
L. Li, Y. Yu, S. Bai, J. Cheng, and X. Chen, "Towards Effective Network Intrusion Detection: A Hybrid Model Integrating Gini Index and GBDT with PSO," Journal of Sensors, vol. 2018, pp. 1578314, 2018/03/26, 2018.
[3]
S. Bhattacharya, S. R. K. S, P. K. R. Maddikunta, R. Kaluri, S. Singh, T. R. Gadekallu, M. Alazab, and U. Tariq, "A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU," Electronics, vol. 9, no. 2, pp. 219, 2020.
[4]
D. Jin, Y. Lu, J. Qin, Z. Cheng, and Z. Mao, "SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism," Computers & Security, vol. 97, pp. 101984, 2020/10/01/, 2020.
[5]
J. Liu, Y. Gao, and F. Hu, "A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM," Computers & Security, vol. 106, pp. 102289, 2021/07/01/, 2021.
[6]
F. Kuang, W. Xu, and S. Zhang, "A novel hybrid KPCA and SVM with GA model for intrusion detection," Applied Soft Computing, vol. 18, pp. 178--184, 2014/05/01/, 2014.
[7]
Y. Zhang, P. Li, and X. Wang, "Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network," IEEE Access, vol. 7, pp. 31711--31722, 2019.
[8]
J. Liu, W. Zhang, Z. Tang, Y. Xie, T. Ma, J. Zhang, G. Zhang, and J. P. Niyoyita, "Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection," Expert Systems with Applications, vol. 139, pp. 112845, 2020/01/01/, 2020.
[9]
T. Lu, Y. Huang, W. Zhao, and J. Zhang, "The Metering Automation System based Intrusion Detection Using Random Forest Classifier with SMOTE+ENN." pp. 370--374.
[10]
J. Sharma, C. Giri, O.-C. Granmo, and M. Goodwin, "Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation," EURASIP Journal on Information Security, vol. 2019, no. 1, pp. 15, 2019/10/22, 2019.
[11]
M. Awad, and A. A, "Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System," KSII Transactions on Internet and Information Systems, vol. 12, 10/30, 2018.
[12]
G. L. Ke, Q. Meng, T. Finley, T. F. Wang, W. Chen, W. D. Ma, Q. W. Ye, and T. Y. Liu, "LightGBM: A Highly Efficient Gradient Boosting Decision Tree," ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), vol. 30, 2017.
[13]
I. Sharafaldin, A. Habibi Lashkari, and A. Ghorbani, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, 2018.
[14]
S. Huang, and K. Lei, "IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks," Ad Hoc Networks, vol. 105, pp. 102177, 2020/08/01/, 2020.
[15]
M. N, and J. B, "A deep learning based HTTP slow DoS classification approach using flow data," ICT Express, vol. 7, no. 2, pp. 210--214, 2021/06/01/, 2021.
[16]
Z. Wang, Y. Zeng, Y. Liu, and D. Li, "Deep Belief Network Integrating Improved Kernel-Based Extreme Learning Machine for Network Intrusion Detection," IEEE Access, vol. 9, pp. 16062--16091, 2021.
[17]
R. Abdulhammed, H. Musafer, A. Alessa, M. Faezipour, and A. Abuzneid, "Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection," Electronics, vol. 8, no. 3, pp. 322, 2019.

Index Terms

  1. Intrusion Detection Method Based on Genetic Algorithm of Optimizing LightGBM

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      EITCE '21: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering
      October 2021
      1723 pages
      ISBN:9781450384322
      DOI:10.1145/3501409
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 December 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Data imbalance
      2. Feature selection
      3. Genetic algorithm
      4. Intrusion detection
      5. LightGBM
      6. Parameter optimization

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      EITCE 2021

      Acceptance Rates

      EITCE '21 Paper Acceptance Rate 294 of 531 submissions, 55%;
      Overall Acceptance Rate 508 of 972 submissions, 52%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 138
        Total Downloads
      • Downloads (Last 12 months)77
      • Downloads (Last 6 weeks)13
      Reflects downloads up to 19 Sep 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media