Optimization of Network Intrusion Detection Model Based on Big Data Analysis

Authors

  • Jizhou Shan Hainan College of Economics and Business, Haikou, Hainan, 571127, China
  • Hong Ma Hainan College of Economics and Business, Haikou, Hainan, 571127, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1366

Keywords:

Network security, Network intrusion detection, Learning sample modeling, Feature analysis, Detection model, big data analysis

Abstract

As user usage grows, so do security threats to networks, the Internet, websites, and organizations. Detecting intrusions in such a big data situation is complex. A feature-optimized network intrusion detection model based on extensive data analysis is designed to overcome the limitations of current network intrusion detection models and obtain more ideal results. Firstly, the current modeling status of network intrusion detection is studied, and the influence of features on the results of network intrusion detection is analyzed. Then, the feature optimization mathematical model of network intrusion detection is established. The solution of the feature optimization mathematical model is searched by an adaptive genetic algorithm simulating natural biological evolution. The optimal feature subset of intrusion detection is obtained by back coding the optimal solution. Finally, according to the optimal feature subset, the learning sample of network intrusion detection is modeled, and the optimal network intrusion detection model is designed. Using the standard data set of network intrusion detection for simulation and comparison tests, the average accuracy of this paper’s network intrusion detection model is about 95%, while other current network intrusion detection models are below 95%. Meanwhile, the time of training and the detection of intrusion detection modeling in this model is significantly reduced, and better efficiency of network intrusion detection can be obtained.

Downloads

Download data is not yet available.

Author Biographies

Jizhou Shan, Hainan College of Economics and Business, Haikou, Hainan, 571127, China

Jizhou Shan is an associate professor working on Hainan College of Economics and Business. He graduated from Northeastern University and has dedicated his research to the field of Computer Networks and Simulation, publishing over 30 papers.

Hong Ma, Hainan College of Economics and Business, Haikou, Hainan, 571127, China

Hong Ma is a professor at Hainan College of Economics and Business. She graduated from Northeastern University and specializes in Technology for Computer Applications. Her research interests include communication security and computer technology and applications.

References

A. Abirami and S. Palanikumar, “BBBC-DDRL: A hybrid big-bang big-crunch optimization and deliberated deep reinforced learning mechanisms for cyber-attack detection,” Computers and Electrical Engineering, vol. 109, pp. 108773, 2023.

Adnan Hasan Bdair Aighuraibawi et al., “Hybridizing flower pollination algorithm with particle swarm optimization for enhancing the performance of IPv6 intrusion detection system,” Alexandria Engineering Journal, vol. 104, pp. 504–514, 2024.

Guilherme Nunes Nasseh Barbosa, Martin Andreoni, and Diogo Menezes Ferrazani Mattos, “Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation,” Ad Hoc Networks, vol. 159, pp. 103485, 2024.

Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Tiew On Ting, Qiang Ni, and Wissam Mallouli, “Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks,” Computer Networks, vol. 237, pp. 110051, 2023.

Ibrahim Hayatu Hassan, Mohammed Abdullahi, Mansur Masama Aliyu, Sahabi Ali Yusuf, and Abdulrazaq Abdulrahim, “An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection,” Intelligent Systems with Applications, vol. 16, pp. 200114, 2022.

P. Rajesh Kanna and P. Santhi, “Hybrid Intrusion Detection using MapReduce based Black Widow Optimized Convolutional Long Short-Term Memory Neural Networks,” Expert Systems with Applications, vol. 194, pp. 116545, 2022.

Murad Ali Khan, Naeem Iqbal, Imran, Harun Jamil, and Do-Hyeun Kim, “An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection,” Journal of Network and Computer Applications, vol. 212, pp. 103560, 2023.

S. Lakshmi Narayanan, M. Kasiselvanathan, K. B. Gurumoorthy, and V. Kiruthika, “Particle swarm optimization based artificial neural network (PSO-ANN) model for effective k-barrier count intrusion detection system in WSN,” Measurement: Sensors, vol. 29, pp. 100875, 2023.

Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, and Jawad Ahmad, “DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm,” Journal of Network and Computer Applications, vol. 221, pp. 103784, 2024.

K. G. Maheswari, C. Siva, and G. Nalinipriya, “Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables deep recurrent neural network,” Computer Communications, vol. 202, pp. 145–153, 2023.

Nadir Omer, Ahmed H. Samak, Ahmed I. Taloba, and Rasha M. Abd El-Aziz, “A novel optimized probabilistic neural network approach for intrusion detection and categorization,” Alexandria Engineering Journal, vol. 72, pp. 351–361, 2023.

Mariya Princy Antony Saviour and Dhandapani Samiappan, “IPFS based storage Authentication and access control model with optimization enabled deep learning for intrusion detection,” Advances in Engineering Software, vol. 176, pp. 103369, 2023.

D. Suja Mary, L. Jaya Singh Dhas, A. R. Deepa, Mousmi Ajay Chaurasia, and C. Jaspin Jeba Sheela, “Network intrusion detection: An optimized deep learning approach using big data analytics,” Expert Systems with Applications, vol. 251, pp. 123919, 2024.

Man Wang, “Optimization of Network Security in University Laboratories Based on Anomaly Intrusion Detection in Public Cloud Networks,” Computers and Electrical Engineering, vol. 111, pp. 108968, 2023.

Lan Xia and Xuefei Xia, “Network Security Intrusion Detection Methods Combining Optimization Algorithms and Neural Networks,” Procedia Computer Science, vol. 228, pp. 582–592, 2023.

Samed Al and Murat Dener, “STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment,” Computers & Security, vol. 110, pp. 102435, 2021.

Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, and Hanruo Li, “Research on the application of network security defence in database security services based on deep learning integrated with big data analytics,” International Journal of Intelligent Networks, vol. 5, pp. 101–109, 2024.

Fuhua Huo, “Computer network big data detection based on internet of things technology,” Measurement: Sensors, vol. 33, pp. 101222, 2024.

S. H. Mousavi, M. Khansari, and R. Rahmani, “A fully scalable big data framework for Botnet detection based on network traffic analysis,” Information Sciences, vol. 512, pp. 629–640, 2020.

Dibin Shan, Xuehui Du, Wenjuan Wang, Na Wang, and Aodi Liu, “KPI-HGNN: Key provenance identification based on a heterogeneous graph neural network for big data access control,” Information Sciences, vol. 659, pp. 120059, 2024.

Yan Wang et al., “An evolutionary computation-based machine learning for network attack detection in big data traffic,” Applied Soft Computing, vol. 138, pp. 110184, 2023.

Fang Xu, Qiang Chen, Qi Liu, and Ning Li, “Intelligent Analysis Algorithm for Hidden Danger Identification of Intelligent Network Monitoring System from the Perspective of Big Data,” Procedia Computer Science, vol. 228, pp. 57–63, 2023.

Ijaz Ahmad, Zhong Wan, and Ashfaq Ahmad, “A big data analytics for DDOS attack detection using optimized ensemble framework in Internet of Things,” Internet of Things, vol. 23, pp. 100825, 2023.

Hui Gao, “Design of Network Data Information Security Monitoring System Based on Big Data Technology,” Procedia Computer Science, vol. 228, pp. 348–355, 2023.

Ramkumar M.P., P. V. Bhaskar Reddy, J. T. Thirukrishna, and Ch Vidyadhari, “Intrusion detection in big data using hybrid feature fusion and optimization enabled deep learning based on spark architecture,” Computers & Security, vol. 116, pp. 102668, 2022.

A. Ponmalar and V. Dhanakoti, “An intrusion detection approach using ensemble Support Vector Machine based Chaos Game Optimization algorithm in big data platform,” Applied Soft Computing, vol. 116, pp. 108295, 2022.

A. Satish Kumar and S. Revathy, “A hybrid soft computing with big data analytics based protection and recovery strategy for security enhancement in large scale real world online social networks,” Theoretical Computer Science, vol. 927, pp. 15–30, 2022.

Tianyue Zhang, Wei Chen, Yuxiao Liu, and Lifa Wu, “An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model,” Computers & Security, vol. 128, pp. 103144, 2023.

Liu Zhiqiang, Ghulam Mohiuddin, Zheng Jiangbin, Muhammad Asim, and Wang Sifei, “Intrusion detection in wireless sensor network using enhanced empirical based component analysis,” Future Generation Computer Systems, vol. 135, pp. 181–193, 2022.

Downloads

Published

2024-11-23

How to Cite

1.
Shan J, Ma H. Optimization of Network Intrusion Detection Model Based on Big Data Analysis. JCSANDM [Internet]. 2024 Nov. 23 [cited 2024 Nov. 24];13(6):1357–1378. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/26385

Issue

Section

Articles