• Tiada Hasil Ditemukan

INTRUSION DETECTION

N/A
N/A
Protected

Academic year: 2022

Share "INTRUSION DETECTION "

Copied!
53
0
0

Tekspenuh

(1)

METAHEURISTIC-BASED NEURAL NETWORK TRAINING AND FEATURE SELECTOR FOR

INTRUSION DETECTION

WAHEED ALI HUSSEIN MOHAMMED GHANEM

UNIVERSITI SAINS MALAYSIA

2019

(2)

METAHEURISTIC-BASED NEURAL NETWORK TRAINING AND FEATURE SELECTOR FOR

INTRUSION DETECTION

by

WAHEED ALI HUSSEIN MOHAMMED GHANEM

Thesis submitted in fulfillment of the requirements for the degree of

Doctor of Philosophy

April 2019

(3)

DECLARATION

Name: Waheed Ali Hussein Mohammed Ghanem.

Matric No: P-COD0002/14.

Faculty: School of Computer Sciences.

Thesis Title: METAHEURISTIC-BASED NEURAL NETWORK TRAINING AND FEATURE SELECTOR FOR INTRUSION DETECTION.

I hereby declare that this thesis in I have submitted to School of Computer Sciences on 1/4/2019 is my own work. I have stated all references used for the completion of my thesis.

I agree to prepare electronic copies of the said thesis to the external examiner or internal examiner for the determination of amount of words used or to check on plagiarism should a request be made.

I make this declaration with the believe that what is stated in this declaration is true and the thesis as forwarded is free from plagiarism as provided under Rule 6 of the Universities and University Colleges (Amendment) Act 2008, University Science Malaysia Rules (Student Discipline) 1999.

I conscientiously believe and agree that the University can take disciplinary actions against me under Rule 48 of the Act should my thesis be found to be the work or ideas of other persons.

Student’s Signature: Date: 1/4/2019

Acknowledgement of receipt by: Date:

(4)

ACKNOWLEDGEMENT

First of all, I would like to thank the Almighty Allah for giving me the strength, patience and ability to complete this thesis.

I would like to express my deep sense of thanks to my supervisor Associate Professor Dr. AMAN B. JANTAN, for his thoughtful comments, guidance, attention and encouragement. Furthermore, I would like to thank him for the invaluable advice and assistance and for the idea of the thesis in the first place.

I would like extend my sincere appreciations to my friend Ahmed for the continuous aid in every aspect, academic and otherwise. Also, I thank my friend Zahir, as he generously gave me very good advices. I would like to extend my grateful appreciation to all those who have contributed directly or indirectly to the completion of this study.

I would also like to thank my Parents for their love and support throughout my entire life, also I would like to thank my brothers for their encouragement. Special thanks go to my beloved wife for all support, patience, understanding and being helpful throughout my study. Moreover, deep thanks to my children Ali, Sundus, Sama, Ahmed and Laith for their inspiration during my research work. The successful completion of my work is the fruit of their sacrifices, devotion, and determination.

Finally, special thanks to the Institute of Postgraduate Studies (IPS) for granting me the USM Fellowship. This financial support is just one of the many merits that USM have provided for its students.

(5)

TABLE OF CONTENTS

ACKNOWLEDGEMENT ii

TABLE OF CONTENTS iii

LIST OF TABLES ... ix

LIST OF FIGURES xiv

LIST OF SYMBOLS AND ABBREVIATIONS . xix

ABSTRAK ... xxiv

ABSTRACT ... xxvi

CHAPTER 1 - INTRODUCTION 1.1 Overview 1

1.2 Research Problem 2

1.3 Research Motivation 5

1.4 Research Question 6

1.5 Research Goals and Objectives 7

1.6 Research Scope 10

1.7 Research Contribution 11

1.8 Research Methodology 13

1.9 Thesis Outline 15

CHAPTER 2 - LITERATURE REVIEW 2.1 Introduction 17 2.2 Intrusion Detection System 17 2.2.1 Anomaly-Based Detection Method 19 2.2.2 Signature-Based Detection Method 20 2.2.3 Hybrid Detection Method 20 2.2.4 Intrusion Detection Technology Types 21

(6)

2.2.4(a) Host-Based Intrusion Detection System (HIDS) 21 2.2.4(b) Network-Based Intrusion Detection System (NIDS) 22

2.3 Artificial Neural Network (ANN) 23

2.3.1 Mathematical Representation 26

2.3.2 FFANN Training Concept 28

2.3.3 Backpropagation Training 30

2.3.4 Error Calculations 31

2.3.5 The Application of Neural Networks in IDS 32

2.3.6 Justification on Choosing ANN 34

2.4 Feature Selection 36

2.4.1 The Essential Steps in Feature Selection 37

2.4.2 Filter vs. Wrapper Methods 38

2.4.3 Feature Selection Techniques for IDS 40

2.5 Multi-Objective Optimization 43

2.5.1 Scalar Approaches 44

2.5.1(a) Aggregation Method 45

2.5.2 Evolutionary Multi-Objective Optimization 46

2.6 Swarm Intelligence (SI) 46

2.6.1 Dragonfly Algorithm (DA) 47

2.6.2 Artificial Bee Colony (ABC) Algorithm 51 2.6.2(a) Initialization Phase and Optimization Problem Parameters 54

2.6.2(b) Employed Bee Phase 55

2.6.2(c) Onlooker Bee Phase 56

2.6.2(d) Scout Bee Phase 56

2.6.3 Bat Algorithm (BAT) 57

(7)

2.6.4 Monarch Butterfly Optimization (MBO) 59

2.6.4(a) Migration Operator 60

2.6.4(b) Butterfly Adjusting Operator 61

2.6.5 Hybrid Swarm Intelligence Solutions 63

2.6.6 Justification on Choosing Metaheuristic Algorithms 65 2.6.7 Justification on Choosing BAT Algorithm 68 2.6.8 Justification on Choosing ABC to Hybridization with MBO and DA 68 2.7 Swarm Intelligence-Based Optimization for Intrusion Detection 69 2.7.1 Training Neural Networks for IDS Using Swarm Intelligence 70 2.7.2 Feature Selection for IDS Using Swarm Intelligence 75

2.8 Critical Analysis 77

2.9 Summary 85

CHAPTER 3 – RESEARCH METHODOLOGY

3.1 Introduction 86

3.2 Flow of Research Methodology 87

3.2.1 Problem Identification 87

3.2.2 Design of New Metaheuristics 89

3.2.3 Training the Neural Network 89

3.2.4 Design of Multi-Objective Feature Selection Based on Wrapper

Approach 90

3.3 Benchmarking Function & Datasets 92

3.3.1 Test Functions for Global Optimization 92

3.3.2 IDS Datasets 93

3.3.2(a) KDD CUP 1999 Dataset 94

3.3.2(b) NSL-KDD Dataset 97

3.3.2(c) ISCX 2012 Dataset 98

(8)

3.3.2(d) UNSW-NB15 Dataset 99

3.3.2(e) Preprocessing Dataset 102

3.4 Benchmark Metaheuristics Algorithms Used in the Evaluation 105

3.5 Experiment Setup 107

3.6 Summary 107

CHAPTER 4 - THE DESIGN AND EVALUATION OF NEW METAHEURISTICS 4.1 Introduction 108

4.2 Enhanced Bat Algorithm (EBAT) 109

4.2.1 Design of EBAT 109

4.2.2 Experimental Evaluation 112

4.2.2(a) Experiment 1: Performance of EBAT Against The Standard Bat Algorithm 113

4.2.2(b) Experiment 2: Performance of EBAT Against Old-Fashioned Optimization Algorithms 116

4.2.2(c) Experiment 3: Performance of EBAT Against New Optimization Algorithms 123

4.2.2(d) Experiment 4: Performance of EBAT Against Other Hybrid and Improved Bat Algorithm 127

4.3 Hybrid ABC/MBO Algorithm (HAM) 134

4.3.1 Design of HAM 135

4.3.2 Experimental Evaluation 139

4.3.2(a) Experiment 1: Performance Analysis of the HAM Against the Standard ABC and MBO Methods 141

4.3.2(b) Experiment 2: Performance Analysis of the HAM Against Nine Other Methods (ABC, MBO, ACO, PSO, GA, DE, ES, PBIL, and STUDGA) 144

4.4 Hybrid ABC/DA Algorithm (HAD) 150

4.4.1 Design of HAD 150

(9)

4.4.2 Experimental Evaluation 154

4.4.2(a) Experiment 1: Performance of HAD Against The Standard ABC and DA Algorithms 155

4.4.2(b) Experiment 2: Performance of HAD Against Other Hybrid Algorithms 157

4.4.2(c) Experiment 3: Performance of HAD Against Old Optimization Algorithms 162

4.4.2(d) Experiment 4: Performance of HAD Against New Optimization Algorithms 165

4.5 The Potential of EBAT, HAM and HAD in Training MLP ANNs 169

4.6 Summary 171

CHAPTER 5 - TRAINING MLP USING THE PROPOSED METAHEURISTICS 5.1 Introduction 172

5.2 Adapting Metaheuristics for Training Multi-Layer Perceptrons 173

5.2.1 Representing MLP Weights and Biases 174

5.2.2 Quality Measure (Fitness Function) 177

5.2.3 Termination Condition 179

5.2.4 General Template for Training MLPs 180

5.3 Evaluation of EBAT, HAM and HAD in training MLP neural networks 182

5.3.1 KDD CUP 1999 Results 184

5.3.2 NSL-KDD Results 188

5.3.3 ISCX 2012 Results 192

5.3.4 UNSW NB15 Results 204

5.4 Comparison between the Three Proposed Models 208

5.5 Summary 208

CHAPTER 6 - NEW IDS APPROACH BASED ON MULTI OBJECTIVE FEATURE SELECTION (MOB-EBATMLP) 6.1 Introduction 210

(10)

6.2 Design of MOBBAT 211

6.2.1 Wrapper Approach Using EBAT-MLP 214

6.2.2 MOBBAT Parameters 215

6.2.3 Binary Encoding 215

6.2.4 Multi-Objective Criteria 216

6.3 Integrating MOBBAT with EBAT-MLP for IDS 219

6.4 Evaluation of MOB-EBATMLP 220

6.4.1 KDD CUP 1999 Results 220

6.4.2 NSL-KDD Results 223

6.4.3 ISCX 2012 Results 224

6.4.4 UNSW-NB15 Results 226

6.4.5 Comparison of the Results with State-of-the-art 227

6.4.6 The Advantage of the MOBBAT Feature Selector 238

6.5 Summary 238

CHAPTER 7 - CONCLUSION AND FUTURE WORK 7.1 Overview 240

7.2 Summary of Research Contributions 241

7.3 Conclusions 242

7.4 Future Work Directions 246

REFERENCES 248 APPENDICES

LIST OF PUBLICATION

(11)

LIST OF TABLES

Page Table 1.1 Mapping Of Research Questions To Objectives And Contributions

In This Thesis

9 Table 2.1 The Most Frequently Used Activation Functions 26

Table 2.2 Error Calculation Formulas 31

Table 2.3 Summary Of Proposals To Use Neural Networks In Intrusion Detection

33

Table 2.4 An Advantages And Disadvantages Of The Classification Techniques

35

Table 2.5 Summary Of Related Research On The Application Of Feature Selection Techniques To Intrusion Detection

41

Table 2.6 Summary Of Example Recent Swarm-Based Hybrid Algorithms

64

Table 2.7 Summary Of Related Works On Swarm-Based NN Applications For IDS

71

Table 2.8 Summary Of Related Works On Swarm-Based Feature Selection Techniques For Intrusion Detection

75

Table 2.9 Critical Analysis Of Related Works On Intrusion Detection Systems

79

Table 3.1 The Benchmark Functions 93

Table 3.2 The 41 Attributes In KDD Cup’99 Dataset 94 Table 3.3 The 23 Attacks In KDD Cup’99 Dataset 95

Table 3.4 Distribution Statistics Of The KDD CUP 99 Training and Testing Datasets

97

Table 3.5 Distribution Statistics Of The NSL-KDD Training and Testing Datasets

98

Table 3.6 Distribution Statistics Of The ISCX 2012 Training and Testing Datasets

99

Table 3.7 The 20 Attributes In ISCX 2012 Dataset 99

Table 3.8 The 45 Features In UNSW-NB15 Dataset 101

(12)

Table 3.9 Distribution Statistics Of The UNSW NB15 Training and Testing Datasets (Attacks Are Detailed)

101

Table 3.10 Distribution Statistics Of The UNSW NB15 Training and Testing Datasets (Attacks Are Aggregated)

102

Table 3.11 Conversion Codes For The Protocol Type Attribute 103 Table 3.12 Conversion Codes For The Flag Attribute 103 Table 3.13 Conversion Codes For The Service Attribute 104 Table 3.14 Metaheuristic Algorithms Used In Later Evaluations In This

Thesis

106

Table 4.1 The Best, Mean and Standard Deviation Obtained By BAT and EBAT On The Benchmark Functions After 100 Runs, Over 20, 50 and 100 Dimensions For Each Function

115

Table 4.2 List Of The Traditional Metaheuristics Against Which EBAT Is Evaluated

117

Table 4.3 Set Of Used Parameters In The Experiments To Compare The Performance Of The Proposed Algorithm With Old- Fashioned Algorithms

117

Table 4.4 The Best, Mean and Standard Deviation Of Test Function Values Found By EBat, ABC, ACO, BBO, CS, DE, ES, GA, GSA, HS, PBIL and PSO Algorithms, Averaged Over 100 Experimental Run. The Best Mean For Each Function Is Marked In Bold Font and Grey. The MIN Value Is The Best Optimization Result Found By Each Algorithm (Closest Value To The Global Optimum Over All Runs), and Is Shaded In Grey. Functions Are Set With 20 Dimensions

121

Table 4.5 List Of The Recent Metaheuristics Against Which EBAT Is Evaluated

123

Table 4.6 The Best, Mean and Standard Deviation Of Test Function Values Found By EBat, ALO, DA, EWA, GWO, KH, MBO, MFO and SCA Algorithms, Averaged Over 100

Experimental Run. The Best Mean For Each Function Is Marked In Bold Font and Grey. The MIN Value Is The Best Optimization Result Found By Each Algorithm (Closest Value To The Global Optimum Over All Runs), And Is Shaded In Grey. Functions Are Set With 20 Dimensions

125

Table 4.7 Set Of Used Parameters In The Experiments To Compare The Performance Of The Proposed Algorithm Against Other Hybrid and Enhanced Algorithms

130

(13)

Table 4.8 The Best, Mean and Standard Deviation Of Test Function Values Found By EBat, ABA, EBA, EvBA, HBA, HS/BA, IBA and MBDE Algorithms, Averaged Over 100

Experimental Run. The Best Mean For Each Function Is Marked In Bold Font And Grey. The Min Value Is The Best Optimization Result Found By Each Algorithm (Closest Value To The Global Optimum Over All Runs), and Is Shaded In Grey. Functions Are Set With 20 Dimensions

131

Table 4.9 Best and Mean Optima Of ABC, MBO And HAM Over 30 Runs and 1000 Generations

144

Table 4.10 Best And Mean Optima Of 10 Algorithms Over 100 Runs, 50 Generations and 20 Dimensions

146

Table 4.11 The Best, Mean and Standard Deviations Obtained By The ABC, DA and HAD On The Test Optimization Functions After 100 Runs

156

Table 4.12 Parameters Of The Four Hybrid Algorithms Used In The Evaluation Of HAD

158

Table 4.13 Best, Mean and Standard Deviation Of Test Function Values Found By HAD, CKH, DEKH, EBA, and PSOGSA

Algorithms, Averaged Over 100 Experimental Runs. The Best Mean For Each Function Is Marked In Bold. The “Best”

Value Is The Best Result Found By Each Algorithm (Closest Value To The Global Optimum Over All Runs). Functions Are Set With 10 Dimensions

160

Table 4.14 Parameters Of The Old Optimization Algorithms Used In The Evaluation Of HAD

162

Table 4.15 Mean Optimization Results For Comparing HAD With Old Algorithms With D = 10 After 100 Runs (The Best Mean Values Are Marked In Bold)

164

Table 4.16 Mean Optimization Results For Comparing HAD With New Algorithms With D = 10 After 100 Runs (The Best Mean Values Are Marked In Bold)

166

Table 4.17 Standard Deviations Corresponding To Mean Values In Table 4.16 For Comparing HAD With New Algorithms With D = 10, After 100 Runs (The Best Standard Deviations Values Are Marked In Bold)

167

Table 5.1 Definitions Of Measurement Types Used To Calculate Performance Indicators

183

(14)

Table 5.2 Performance Measurements Of 25 Algorithms Used To Train An MLP To Detect Anomalies In The KDD CUP 99 Dataset

185

Table 5.3 Layout Of A Confusion Matrix 187

Table 5.4 Performance measurements of 25 algorithms used to train an MLP to detect anomalies in the NSL KDD dataset

191

Table 5.5 Performance Measurements Of 25 Algorithms Used To Train An MLP To Detect Anomalies In The ISCX2012-12 Dataset

193

Table 5.6 Performance Measurements Of 25 Algorithms Used To Train An MLP To Detect Anomalies In The ISCX2012-13 Dataset

194

Table 5.7 Performance Measurements Of 25 Algorithms Used To Train An MLP To Detect Anomalies In The ISCX2012-14 Dataset

195

Table 5.8 Performance Measurements Of 25 Algorithms Used To Train An MLP To Detect Anomalies In The ISCX2012-15 Dataset

196

Table 5.9 Performance Measurements Of 25 Algorithms Used To Train An MLP To Detect Anomalies In The ISCX2012-17 Dataset

197

Table 5.10 Performance Measurements Of 25 Algorithms Used To Train An MLP To Detect Anomalies In The UNSW-NB15 Dataset

205

Table 5.11 Comparison between the EBAT, HAM, and HAD Models 208 Table 6.1 Selected Features When Testing Against The KDD CUP

1999 Dataset

221

Table 6.2 Classification Results When Testing Against The KDD CUP 1999 Dataset

222

Table 6.3 Selected Features When Testing Against The NSL-KDD Dataset

224

Table 6.4 Classification Results When Testing Against The NSL-KDD Dataset

224

Table 6.5 Selected Features When Testing Against The ISCX 2012 Dataset

225

Table 6.6 Classification Results When Testing Against The ISCX 2012 Dataset

225

Table 6.7 Selected Features When Testing Against The UNSW-NB15 Dataset

226

(15)

Table 6.8 Classification Results When Testing Against The UNSW- NB15 Dataset

227

Table 6.9 A Summary Of IDS Works With Selected Features and Classification Performance

229

Table 6.10 Comparison Between The EBAT-MLP And MOB- EBATMLP

238

(16)

LIST OF FIGURES

Page

Figure 1.1 Reported Incidents Based On General Incident Classification Statistics 2017 in Malaysia

5

Figure 1.2 Total Cyber Incidents From Jan To Dec 2017 in Malaysia 6 Figure 1.3 A Summary Mapping Between RQS, ROS, and RCS Of This

Research

10

Figure 1.4 Scope Of Research 11

Figure 1.5 Research Methodology 14

Figure 2.1 The Related Work and Literature Survey 18 Figure 2.2 Generic A-NIDS Functional Architecture 19

Figure 2.3 Host Based Intrusion Detection System 22

Figure 2.4 Network Based Intrusion Detection System 23 Figure 2.5 Biological Neural System Vs Artificial Neural Network 24

Figure 2.6 Feed-Forward Neural Network 25

Figure 2.7 Matrix Calculation For Sample FFNNS 27

Figure 2.8 Supervisor Training Concept 29

Figure 2.9 A Filter Feature Selection Algorithm

39 Figure 2.10 A Wrapper Feature Selection Algorithm 40 Figure 2.11 Classification of Multi-objective Optimization Algorithms,

Highlighting the Adopted Method in this Research

44

Figure 2.12 Primitive Corrective Patterns Between Individuals In A Swarm

48

Figure 2.13 The General Flowchart Of ABC Algorithm 53 Figure 2.14 A Simple Location Update Equation Execution 55

Figure 3.1 Flow Of Research Methodology 88

(17)

Figure 3.2 Metaheuristic Algorithms Provide MLP With Weights/Biases And Based On The Average MSE For All Training Samples

91

Figure 3.3 Screenshot Of The MATLAB Code That Converts The Symbolic Value Of The KDD Cup ’99 Dataset Into A Numeric Value

102

Figure 3.4 The Idea Of Training And Testing Actions In This Study 105 Figure 4.1 Performance Of Bat And EBAT Algorithms For (A) F1 And

(B) F5 Benchmark Functions With 20 Dimension

116

Figure 4.2 Performance Of EBAT Algorithms Against The Old-

Fashioned Optimization Algorithms For (A) F1, (B) F4, (C) F5, And (E) F11 Benchmark Functions With 20 Dimension

120

Figure 4.3 Performance Of EBAT Algorithms Against New Optimization Algorithms For (A) F1 And (B) F10 Benchmark Functions With 50 Dimension

127

Figure 4.4 Performance Of EBAT Algorithm Against Other Hybrid And Enhanced Algorithms For (A) F2 And (B) F10 Benchmark Functions With 20 Dimension

133

Figure 4.5 Flowchart Of The HAM Algorithm 136

Figure 4.6 Comparison Of Three Methods Against 5 Functions (A-E) Over 1000 Generations

142

Figure 4.7 Comparison Of Ten Methods, Including Ham, Against 5 Test Optimization Functions (A - E) With 50 Generations And 20 Dimensions

148

Figure 4.8 The Flowchart Of The HAD Algorithm 154

Figure 4.9 Comparison Of HAD, ABC And DA Against 4 Functions (A–D) Over 50 Generations

157

Figure 4.10 Comparison Of Five Algorithms Including HAD Against 4 Functions (A–D) Over 50 Generations

161

Figure 4.11 Comparison Of HAD With Ten Old Algorithms Against 4 Functions (A–D) Over 50 Generations

165

Figure 4.12 Comparison Of Nine Algorithms Including HAD Against 4 Functions (A–D) Over 50 Generations

168

Figure 5.1 Solution Representation Of The MLP Training Algorithm.

(A) An Example MLP With Annotated Components, (B)

176

(18)

Vector Representation Of MLP Structure, And (C) Vector Representation Of The MLP Weights And Biases

Figure 5.2 MLP Forward Pass Computation To Calculate MSE 178 Figure 5.3 The General Template Of Adapting Metaheuristics For

Training MLPS

181

Figure 5.4 The Performance Of 25 MLP Trainer Algorithms For The KDD Cup 99 Dataset

187

Figure 5.5 The Confusion Matrices For (A) EBAT-MLP, (B) Ham-MLP, (C) HAD-MLP, And (D) SGA-MLP Against The KDD Cup 99 Dataset

188

Figure 5.6 The Performance Of 25 MLP Trainer Algorithms For The NSL-KDD Dataset

189

Figure 5.7 The Confusion Matrices For (A) EBAT-MLP, (B) HAM- MLP, (C) HAD-MLP, And (D) GWO-MLP Against The NSL-KDD Dataset

190

Figure 5.8 The Performance Of 25 MLP Trainer Algorithms For The Iscx2012-12 Dataset

199

Figure 5.9 Performance Of 25 MLP Trainer Algorithms For The Iscx2012-13 Dataset

200

Figure 5.10 Performance Of 25 MLP Trainer Algorithms For The Iscx2012-14 Dataset

200

Figure 5.11 Performance Of 25 MLP Trainer Algorithms For The Iscx2012-15 Dataset

200

Figure 5.12 Performance Of 25 MLP Trainer Algorithms For The Iscx2012-17 Dataset

201

Figure 5.13 The Confusion Matrices For (A) EBAT-MLP, (B) HAM- MLP, (C) HAD-MLP, And (D) BBO-MLP Against The Iscx2012-12 Dataset

201

Figure 5.14 The Confusion Matrices For (A) EBAT-MLP, (B) HAM- MLP, (C) HAD-MLP, And (D) PSO-MLP Against The Iscx2012-13 Dataset

202

Figure 5.15 The Confusion Matrices For (A) EBAT-MLP, (B) HAM- MLP, (C) HAD-MLP, And (D) MSA-MLP Against The Iscx2012-14 Dataset

203

(19)

Figure 5.16 The Confusion Matrices For (A) EBAT-MLP, (B) HAM- MLP, (C) HAD-MLP, And (D) MSA-MLP Against The Iscx2012-15 Dataset

203

Figure 5.17 The Confusion Matrices For (A) EBAT-MLP, (B) HAM- MLP, (C) HAD-MLP, And (D) PSO-MLP Against The Iscx2012-17 Dataset

204

Figure 5.18 The Performance Of 25 MLP Trainer Algorithms For The Unsw-Nb15 Dataset

206

Figure 5.19 The Confusion Matrices For (A) EBAT-MLP, (B) HAM- MLP, (C) HAD-MLP, And (D) GWO-MLP Against The Unsw-Nb15 Dataset

207

Figure 6.1 The General Procedures For Feature Selection With Validation

212

Figure 6.2 The MOBBAT Algorithm Flowchart 214

Figure 6.3 Representation Of A Possible Solution As Binary String 216 Figure 6.4 Integrating MOBBAT With EBAT-MLP To Form

EBATMLP-IDS

220

Figure 6.5 Sample Confusion Matrices Of Running MOB-EBATMLP Against KDD CUP 1999 Dataset

223

Figure 6.6 Confusion Matrix Of Running MOB-EBATMLP Against NSL-KDD Dataset

224

Figure 6.7 Confusion Matrix Of Running MOB-EBATMLP Against ISCX 2012 Dataset

226

Figure 6.8 Confusion Matrix Of Running MOB-EBATMLP Against UNSW-NB15 Dataset

227

Figure 6.9 Comparison Of IDS Accuracies Against The KDD CUP 99 Dataset

228

Figure 6.10 Comparison Of IDS Detection Rates Against The KDD CUP 99 Dataset

232

Figure 6.11 Comparison Of IDS False Alarm Rates Against The KDD CUP 99 Dataset

232

Figure 6.12 Comparison Of IDS Accuracies Against The NSL-KDD Dataset

233

(20)

Figure 6.13 Comparison Of IDS Detection Rates Against The NSL-KDD Dataset

233

Figure 6.14 Comparison Of IDS False Alarm Rates Against The NSL- KDD Dataset

234

Figure 6.15 Comparison of IDS accuracies against the ISCX 2012 dataset 234 Figure 6.16 Comparison Of IDS Detection Rates Against The ISCX 2012

Dataset

235

Figure 6.17 Comparison Of IDS False Alarm Rates Against The ISCX 2012 Dataset

235

Figure 6.18 Comparison Of IDS Accuracies Against The UNSW-NB15 Dataset

236

Figure 6.19 Comparison Of IDS Detection Rates Against The UNSW- NB15 Dataset

236

Figure 6.20 Comparison Of IDS False Alarm Rates Against The UNSW- NB15 Dataset

236

(21)

LIST OF SYMBOLS AND ABBREVIATONS ABC Artificial Bee Colony Algorithm

ACC Accuracy

ACO Ant Colony Optimization Algorithm

AD Anomaly Detection

AFSA Artificial Fish Swarm Algorithm AI Artificial Intelligence

ALO Ant Lion Optimizer

AMGA Multi Objective Genetic Algorithm ANN Artificial Neural Network

BA Bees algorithm

BAR Butterfly Adjusting Rate

BAT Bat Algorithm

BBO Biogeography Based Optimization Algorithm BCO Bee Colony Optimization

BP Back-Propagation

BPNN Back Propagation Neural Network CEP Classification Error Percentage CFA Cuttlefish Algorithm

CI Computational Intelligence CID Intrusion Detection Capability

CS Cuckoo Search Algorithm

CSI Computational Swarm Intelligence

DA Dragonfly Algorithm

DE Differential Evolution Algorithm

DM Detection Method

DOS Denial Of Service

(22)

DR Detection Rate

DT Decision Tree

EA Evolutionary Algorithm

EBAT Enhanced Bat Algorithm EC Evolutionary Computation EHO Elephant Herding Optimization ENN Evolutionary Neural Network ES Evolution Strategy Algorithm EWA Earthworm Optimization Algorithm

FAR False Alarm Rate

FFNN Feed-Forward Neural Network

FN False Negative

FNN Fuzzy Neural Network

FP False Positive

FS Feature Selection

FSM Feature Selection Method

GA Genetic Algorithm

GDA Great Deluge Algorithm

GHSOM Growing Hierarchical Self-Organising Map GQPSO Genetic Quantum Particle Swarm Optimization GSA Gravitational Search Algorithm

GWO Grey Wolf Optimizer Algorithm

HAD Hybrid Artificial Bee Colony/Dragonfly Algorithm HAM Hybrid Artificial Bee Colony/Monarch Butterfly HbPHAD Host-based Packet Header Anomaly Detection

HG Hypergraph

HIDS Host Based Intrusion Detection System

(23)

HS Harmony Search Algorithm

ID Intrusion Detection

IDES Intrusion Detection Expert System IDS Intrusion Detection System

IG Information Gain

IP Internet Protocol

IPS Intrusion Prevention System KH Krill herd Algorithm

KMC K-Means Clustering

K-SVCR K-Support Vector Classification-Regression LGP Linear Genetic Programming

LM Levenberg-Marquardt

LR Logistic Regression

LSE Least Square Error

MARS Multivariate Regression Splines MBO Monarch Butterfly Optimization MCLP Multiple Criteria Linear Programming

MD Misuse Detection

MFO Moth-Flame Optimization

MGSA Modified Gravitational Search Algorithm MLFFNN Multi-Layer Feed Forward Neural Network MLP Multi-Layer Perceptron

MNN Modular Neural Network

MOEA/D Multi-Objective Evolutionary Algorithm with Decomposition

MOO Multi-Objective Optimization

MPPSO Multi-Objective Particle Swarm Optimization

(24)

MQPSO Modified Quantum-Behaved Particle Swarm Optimization MSA Moth Search Algorithm

MSE Mean Square Error

MVO Multi-Verse Optimizer

NB Naïve Bayes

NBC Naïve Bayes Classifier NBTree Naïve Bayes Tree

NIDS Network Based Intrusion Detection System NNC Nearest Neighbor Classifier

NSGA Non-dominated Sorting Genetic Algorithm PBIL Probability-Based Incremental Learning PCA Principle Component Analysis

PCCE Percentage of Correctly Classified Example PSO Particle Swarm Optimization

QPSO Quantum-behaved Particle Swarm Optimization RBF Radial Basis Function

RBFNN Radial Basis Function Neural Network REPTree Reduced Error Pruning Tree Algorithm

RF Random Forest

RFA Recursive Feature Addition RMSE Root-Mean-Square Error RNN Recurrent Neural Network SCA Sine Cosine Algorithm

SGO Stochastic Global Optimization

SI Swarm Intelligence

SN Solution Number

SSE Sum of Square Error

(25)

StudGA StudGA Genetic Algorithm SVDF Support Vector Decision Function SVM Support Vector Machine

TCP Transmission Control Protocol

TMAD Text Mining-based Anomaly Detection

TN True Negative

TP True Positive

TVCPSO Time-Varying Chaos Particle Swarm Optimization UDP User Datagram Protocol

WFNN Wavelet Fuzzy Neural Network WNN Wavelet Neural Network WOA Whale Optimization Algorithm

(26)

LATIHAN RANGKAIAN NEURAL DAN PEMILIH CIRI BERASAKAN METAHEURISTIK UNTUK PENGESANAN PENCEROBOHAN

ABSTRAK

Pengesanan Pencerobohan dalam konteks rangkaian komputer merupakan teknik penting dalam strategi pertahanan keselamatan mendalam yang moden. Sistem Pengesanan Pencerobohan mendapat perhatian yang luar biasa daripada penyelidik dan pakar keselamatan. Konsep penting dalam pengesanan pencerobohan adalah pengesanan anomali yang merupakan pengasingan normal dalam trafik rangkaian daripada peristiwa tidak normal (anomali). Pengasingan ini pada asasnya merupakan tugas klasifikasi, yang menyebabkan penyelidik cuba untuk menggunakan pengklasifikasi terkenal dalam bidang pembelajaran mesin dalam pengesanan pencerobohan. Rangkaian saraf (NN) adalah salah satu teknik yang paling popular untuk melakukan klasifikasi bukan linear, dan digunakan secara meluas dalam kajian lepas untuk melakukan pengesanan pencerobohan. Pertama, dataset latihan biasanya menghasilkan set ciri maklumat yang tidak relevan atau berlebihan, yang menjejaskan prestasi klasifikasi. Kedua, algoritma pembelajaran tradisional seperti backpropagation mengalami masalah yang belum diatasi (known issue), termasuk

penumpuan lambat dan perangkap untuk local minimum. Masalah-masalah tersebut menjejaskan proses pengoptimuman. Memandangkan kaedah swarm intelligence menghasilkan kejayaan besar dalam hal pengoptimuman, matlamat utama tesis ini adalah untuk menyumbangkan peningkatan teknologi pengesanan pencerobohan menerusi penggunaan teknik pengoptimuman berasaskan “swarm” dalam masalah asas pemilihan ciri paket yang optimum, dan latihan rangkaian saraf yang optimum untuk mengklasifikasikan ciri-ciri tersebut sebagai hal biasa dan serangan. Untuk

(27)

merealisasikan matlamat ini, penyelidikan dalam tesis ini mengikuti tiga peringkat asas, diikuti oleh penilaian yang meluas. Pertama, kajian ini bermula dengan mencari algoritma metaheuristik yang sesuai dan boleh digunakan untuk melatih rangkaian saraf bagi tujuan Pengesanan Pencerobohan. Carian ini mengakibatkan pembangunan tiga algoritma metaheuristik baharu: EBAT (Enhanced Bat Algorithm), yang mengubah algoritma BAT klasik untuk prestasi yang lebih baik; Algoritma HAM (Hybrid Artificial Bee Colony and Monarch Butterfly); dan Algoritma HAD (Hybrid Artificial Bee Colony and Dragonfly). Kedua, tiga algoritma yang dicadangkan itu digunakan untuk latihan MLP. Aplikasi algoritma ini dalam tugas latihan rangkaian saraf untuk pengesanan pencerobohan dinilai secara meluas dan prestasinya dibandingkan dengan metaheuristik tradisional dan yang terkini. Ketiga, algoritma BAT versi binari dicadangkan sebagai kaedah pengoptimuman multiobjektif baharu untuk memilih set ciri yang optimum untuk mengklasifikasikan paket rangkaian.

Komponen asas terdahulu menghasilkan sistem pengesanan pencerobohan yang berkesan dan cekap, yang dinilai pada dataset yang standard seperti KDD Cup 1999, NSL KDD, ISCX2012 dan UNSW NB15, serta dibandingkan dengan pendekatan alternatif yang sama daripada kajian lepas. Teknik yang dicadangkan menunjukkan kelebihan yang konsisten merentasi dataset yang berbeza berbanding dengan teknik lain. Secara khususnya, ketepatan keseluruhan purata, kadar penggera palsu dan kadar pengesanan masing-masing adalah 98.05, 0.0285 dan 99.59 berbanding KDD CUP'99, iaitu 99.16, 0.0148 dan 99.38 masing-masing, berbanding NSLKDD, iaitu 99.96, 0.0003 dan 99.95 masing-masing, berbanding ISCX2012 dan 97.63, 0.0326 dan 98.18 masing-masing, berbanding UNSW-NB15.

(28)

METAHEURISTIC-BASED NEURAL NETWORK TRAINING AND FEATURE SELECTOR FOR INTRUSION DETECTION

ABSTRACT

Intrusion Detection (ID) in the context of computer networks is an essential technique in modern defense-in-depth security strategies. As such, Intrusion Detection Systems (IDSs) have received tremendous attention from security researchers and professionals. An important concept in ID is anomaly detection, which amounts to the isolation of normal behavior of network traffic from abnormal (anomaly) events. This isolation is essentially a classification task, which led researchers to attempt the application of well-known classifiers from the area of machine learning to intrusion detection. Neural Networks (NNs) are one of the most popular techniques to perform non-linear classification, and have been extensively used in the literature to perform intrusion detection. However, the training datasets usually compose feature sets of irrelevant or redundant information, which impacts the performance of classification, and traditional learning algorithms such as backpropagation suffer from known issues, including slow convergence and the trap of local minimum. Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. To realize these objectives, the research in this thesis follows three basic stages, succeeded by extensive evaluations. First, this work starts by the search for suitable metaheuristic algorithms that can be used to train

(29)

neural networks for the purpose of ID. This search resulted in the development of three new metaheuristic algorithms: EBAT (Enhanced Bat Algorithm), which modifies the classic BAT algorithm for better performance; HAM (Hybrid Artificial Bee Colony and Monarch Butterfly) algorithm; and HAD (Hybrid Artificial Bee Colony and Dragonfly) algorithm. Second, the three proposed algorithms are adopted for MLPs training. The application of these algorithms to the task of training neural networks for intrusion detection is extensively evaluated and their performances are compared with other traditional as well as recent metaheuristics. Third, the binary version of the BAT algorithm is proposed as a new multi-objective optimization method to select the optimal feature set for classifying network packets. The previous basic components resulted in an effective and efficient intrusion detection system, which is evaluated on the standard KDD Cup 1999, NSL KDD, ISCX2012 and UNSW NB15 datasets, and compared with similar alternative approaches from the literature. The proposed technique showed consistent advantage across the different datasets over the other techniques. In particular, the average overall accuracy, false alarm rate and detection rate were 98.05, 0.0285 and 99.59, respectively against KDD CUP’99, 99.16, 0.0148 and 99.38, respectively against NSLKDD, 99.96, 0.0003 and 99.95, respectively against ISCX2012 and 97.63, 0.0326 and 98.18, respectively against UNSW-NB15.

(30)

CHAPTER ONE INTRODUCTION 1.1 Overview

Protection of computer networks has been the target for a long list of network security technologies. This protection involves the defense against intrusions that may compromise the confidentiality, integrity, or availability of network resources (Merkow and Breithaupt, 2014; Mukhopadhyay et al., 2011; Patil et al., 2012). Despite their proliferation, individual technologies are still short of the full protection against network intrusions, and often several technologies are employed in a defense-in-depth setting. Among the most popular network security technologies are firewalls, Intrusion Prevention Systems (IPSs) and Intrusion Detection Systems (IDSs).

Firewalls are well-known mechanisms that control the access to network resources based on a predefined policy. Firewalls can separate large networks into many different zones and implement a different security policy for each zone.

However, firewall technology cannot handle new attacks, and as such, it acts as the first line of defense against potential malicious actions, before intrusion detection systems (Akhyari and Fahmy, 2014; Ghorbani et al., 2009; Uddin and Hasan, 2016).

An IDS provides the network with a level of preventive security against any suspicious activity, via early warnings to systems administrators. Because intrusion detection systems are capable of detecting various types of malicious actions, they form an attractive second layer of network protection, which covers for the limitations of security policies in traditional firewalls (Amiri et al., 2014; Chowdhary et al., 2014).

(31)

The operation of IDSs can be summarized in the following operations: monitor, analyze, detect and stir alarms. An IDS can be classified into two types: network based IDS (NIDS), which detects cyber threats at the network level by evaluating network traffic; and host based IDS (HIDS), which detects the threats on individual computers or hosts within the network. IDSs use two methods for the detection: (1) misuse detection, which detects attacks using signature databases that contain signatures of known attacks, and (2) anomaly detection, which is based on the assumption that the behavior of the attacker is different than that of the mainstream user (c and Agrawal, 2012; Chadha and Jain, 2015).

Unlike an intrusion prevention system, an IDS is not designed to block attacks (Castro et al., 2013; Kim, G. et al., 2014). An IDS is a passive technique to monitor and warn on suspicious activities but cannot actively intervene and stop a potential attack. An IPS, on the other hand, is placed in-line along the traffic path between the firewall and the rest of the network, and can block the traffic in addition to sending alerts. In this sense, IPSs are extensions to IDSs, but they are too intrusive to the network operation that their deployment may not be preferred under current levels of accuracy and performance. Therefore, IDSs are more widely accepted and deployed.

The sole focus of this thesis is the IDS technology.

1.2 Research Problem

Although IDSs are a mature technology, they still suffer from a fundamental problem, which is performance. Performance here refers to the rate of detecting actual threats while avoiding mistakes in reporting potential ones. The type of mistakes in which the system falsely reports an attack is known as false positives. The performance

(32)

of IDSs can be improved by increasing accurate detection rate and reducing the rate of false positives (Bahl and Sharma, 2015; Elhag et al., 2015).

An IDS that can handle new attacks must adopt an anomaly-detection strategy.

This strategy is based on the premise that hostile behavior is different from normal user behavior, and by distinguishing abnormal activities, one can detect even new threats. This task is essentially a classification problem, which entails the training of a classifier model that employs a number of features to discriminate two or more classes in a given set of observations. Among the successful classifiers, artificial neural networks (ANNs) have been extensively used for the purpose of intrusion detection.

The problem with traditional ANN-based IDSs is twofold. On the one hand, the classifier’s performance relies on a set of parameters. These parameters need to be learned until an optimal set of values is settled. In the case of ANNs, these parameters are a set of weights and biases that label network edges feeding into the nodes. Setting these weights is achieved by a training process that is in essence an optimization problem in which the space of all possible weights is searched looking for the optimal set of values that result in the best classification of network packets. Unfortunately, the search space of all weights is so large that the classic learning techniques, such as backpropagation, can only produce suboptimal values within the feasible time and computational resources. On the other hand, an IDS deals with huge amounts of data that contain irrelevant and redundant features, which leads to slow training and testing processes, higher resource consumption, and poor detection rates (Aghdam and Kabiri, 2016; Eesa et al., 2015a; Ravale et al., 2015; Zuech et al., 2015). Therefore, feature selection is a fundamental step in the design of an IDS. Optimized feature sets reduce the computational cost and time, improve the classification accuracy and decrease the

(33)

Because training classifiers on a set of optimal parameters and selecting an optimal feature set are essentially optimization problems, metaheuristics emerge as a natural candidate solutions. This is especially true since traditional training techniques are based on the gradient descent algorithm, which is limited compared to metaheuristics that can be directly applied to an ANN. Several metaheuristics have already been attempted to train neural networks and address the problem of feature selection for intrusion detection and other applications. These metaheuristics span evolutionary computations (EC) such as the genetic algorithm and swarm intelligence such as particle swarm optimization. However, the nature of these algorithms leaves the room for much improvement since the most important challenge at the heart of any metaheuristic optimization algorithm is the ability to balance between the exploration and exploitation activities in the search space to find a global optimum solution.

Nevertheless, the search for a proper exploration and exploitation trade-off remains a challenging task in any algorithm and can always be improved for a new application such as intrusion detection. This opportunity to find better metaheuristics to optimize IDS classifiers is the main driver of the research in this thesis.

This work builds on the premise that the limitations of existing feature selection and classification methods can be alleviated, and their performance can be improved, by exploiting metaheuristic-based optimization. This kind of optimization proved very effective in solving complex problems that involve numerous and changing variables.

The sought optimization techniques can cover both the task of training the classifiers as well as the task of selecting an optimal set of features to perform classification.

Besides, feature selection is a multi-objective problem that involves several objectives, leading to the need for multi-objective optimization, which is a major issue to be addressed in this research as well.

(34)

1.3 Research Motivation

The importance of intrusion detection systems has only been increasing as a crucial defense mechanism in the face of the ever-growing phenomenon of cyber- crime (Bitter et al., 2012; McGuire and Downling, 2013). Cyber-attacks are the new weapon used in electronic warfare around the world, and their impact extends well beyond personal or enterprise networks into governmental and critical national network. The latest Incident Statistics Report of the Malaysia Computer Emergency Response Team (MyCERT) shows that intrusion and intrusion attempts form the largest portion of reported incidents over the months from Jan-Dec 2017 (Figure 1.1).

Figure 1.2 shows the total cyber incidents in 2017 (http://www.mycert.org.my).

Figure 1.1: Reported incidents based on general incident classification statistics 2017 in Malaysia

(35)

Figure 1.2: Total cyber incidents from Jan to Dec 2017 in Malaysia

The phenomenal growth of cyber threats pushes security researchers and professionals into building more reliable protection mechanisms, including accurate IDS models that are capable of maximizing correctly detected threats and minimizing falsely detected threats at the same time. However, efficiency of the intrusion detection system is based mainly on features that are extracted from network traffic and an efficient and reliable classifier of traffic into normal or abnormal. This research further extends the search for an effective approach in that direction.

1.4 Research Question

Based on the research problem, available literature, and the goal of using metaheuristic-based optimization to improve the performance of intrusion detection models, the following research questions can be postulated:

1. How to improve the training of neural network models such that the learning algorithm can converge fast without trapping in local minima?

2. Can metaheuristic algorithms be used for training neural networks to produce the desired high accuracy over traditional learning algorithms?

(36)

3. If the answer to 2 is yes, what metaheuristic algorithm(s) can be used to train neural networks for the purpose of intrusion detection?

4. Does hybridization of metaheuristic algorithms produce better algorithms with high balance between exploration and exploitation processes? Does it improve the diversity and address the problems of local optima trapping?

5. If reducing the number of features entails multiple conflicting objectives, can multi-objective optimization be used for the extraction of the most relevant and non-duplicate features in order to build the intrusion detection model?

6. If the previous questions had been answered, how to combine a single-objective metaheuristic technique for training neural networks and a multi-objective metaheuristic for feature selection in a unified model of intrusion detection with the promised improved detection accuracy and reduced false alarm rate?

1.5 Research Goals and Objectives

The main goal of this research is to improve the performance of intrusion detection system on computer networks. This research proposes a detection approach that can address the deficit of existing intrusion detection systems. It extracts the important features of the network packets using a multi-objective optimization approach as a first step. The second step is to train a machine learning model using the enhanced metaheuristic algorithm, which can detect known and unknown attacks based on the features obtained from the previous step.

This overall objective can be broken into the following list of detailed objectives:

1. To design and develop a metaheuristic technique that can be used to improve the

(37)

technique is to show better convergence and fitness accuracy for solving single and constrained-objective optimization problems.

2. To adapt the developed algorithm for the supervised training of Multi-Layer Perceptrons (MLPs). The proposed training method would incorporate suitable data representation and suitable fitness measure for classification applications.

3. To design and implement a new intrusion detection approach that utilizes the capabilities of the proposed multi-objective binary bat algorithm (MOBBAT) for wrapper-based feature selection to select an optimal set of features from network packets as a first stage. The second stage passes these features into the best MLP model from objective 2 for the detection of intrusions in the network.

The mapping between research questions (RQ), research objectives (RO), and research contributions (RC) of this research is summarized in Table 1.1 and Figure 1.3.

The first four questions led to the development of three new metaheuristic algorithms in the search for suitable metaheuristic trainer of neural networks (these algorithms are named EBAT, HAM and HAD).

The adaption of these algorithm to the training of neural networks for the purpose of intrusion detection resulted in three corresponding training algorithms: EBATMPL, HAMMPL and HADMPL. These cover the first two objectives. The fifth research question is answered by the third objective, which introduces a binary and multi- objective version of the BAT algorithm for feature selection (MOBBAT). Finally, the last research question is covered by the fourth objective. This objective combines the EBAT-MLP algorithm with the best features selected by MOBBAT to produce a single and new intrusion detection approach, called MOB-EBATMLP.

(38)

Table 1.1: Mapping of research questions to objectives and contributions in this thesis Chapter Research Question Research Objective Contribution

4

-What metaheuristic algorithm(s) can be used to train neural networks for the purpose of intrusion detection?

-Does hybridization of metaheuristic algorithms produce better algorithms with high balance

between exploration and exploitation processes?

-To design and develop a metaheuristic technique that can be used to improve the

performance of training neural networks for the purpose of IDS. The developed technique is to show better convergence and fitness accuracy for solving single and constrained-objective optimization problems.

-Enhance Bat algorithm: Propose a new EBAT algorithm.

-Hybridize ABC &

MBO algorithms:

Propose a new HAM algorithm.

-Hybridize ABC &

DA algorithms:

Propose a new HAD algorithm.

5

-How to improve the training of neural network models such that the learning algorithm can converge fast without trapping in local minima?

-Can metaheuristic algorithms be used for training neural networks to produce the desired high accuracy over traditional algorithms?

-To adapt the developed metaheuristic algorithm for the supervised training of Multi- Layer Perceptrons (MLPs). The proposed training method would incorporate suitable data representation and suitable fitness measure for

classification applications.

A method for adapting the new metaheuristic algorithms to train MLP:

Propose three IDS models:

1. HAMMLP 2. HADMLP 3. EBATMLP

6

-How to combine a single-objective

metaheuristic technique for training neural networks and a multi- objective metaheuristic for feature selection in a unified model of intrusion detection with the

promised improved detection accuracy and reduced false alarm rate?

-To propose a binary, multi- objective version of any suitable metaheuristic algorithm, for feature selection, based on the wrapper approach. The proposed algorithm aims to minimize the number of features, thereby improving the task of their classification.

-To design and implement the final new intrusion detection approach that utilizes the capabilities of MOBBAT algorithm to selects the optimal features from network packets as a first stage. The second stage passes these features to EBATMLP model for the detection of intrusions.

-Develop a new algorithm, namely, Multi-Objective Binary Bat Algorithm (MOBBAT).

- Develop the complete new approach for intrusion detection, which is called (MOB-

EBATMLP).

(39)

Figure 1.3: A Summary mapping between RQs, ROs, and RCs of this research 1.6 Research Scope

This study focuses on the accuracy of detecting anomalous activities in a computer network caused by intruders, whether they are originating from outside the network (Network-based intrusion detection),or from inside the network (host-based intrusion detection), including what is so-called hybrid intrusion detection (Akhyari and Fahmy, 2014; Chowdhary et al., 2014).

RO1

1. HAM Algorithm 2. HAD Algorithm 3. EBAT Algorithm RC1 = Three New Algorithms

RQ1 + RQ2 RO2

1. HAMMLP Model 2. HADMLP Model 3. EBATMLP Model

RC2 = Three MLP training algorithms for IDS

RQ5 + RQ6 RO3 + RO4 + RO5

RC3 = Multi-objective optimization binary algorithm for FS

RC4 = New IDS Approach Algorithm

Chapter 4

Chapter 5

Chapter 6

1. MOBBAT Algorithm 2. MOB-EBATMLP Approach RQ3 + RQ4

(40)

This research relies on the use of algorithms from the field of swarm intelligence and artificial neural networks, which are amongst the most important and popular techniques in the realm of computational intelligence, to fulfill the objectives of the thesis. Figure 1.4 illustrates the scope of this thesis, showing the used concepts and their relationships.

Figure 1.4: Scope of Research 1.7 Research Contribution

The main solution introduced in this research is a new approach for intrusion detection system, based on the famous concept of computational intelligence (CI).

Computational intelligence is an umbrella for many concepts and algorithms, among which the most popular are swarm intelligence (SI) and Artificial Neural Networks (ANN) (Ahmad, 2014; Amudha and Rauf, 2012; Iftikhar and Fraz, 2013; Kolias et al., 2011; Revathi and Malathi, 2013). This research seeks to solve the problem of

Research Scope

Network Security Computational Intelligence

Intrusion Detection System

Artificial Neural Network

Dragonfly Algorithm

Swarm Intelligence

Artificial Bee Colony Algorithm Bat Algorithm

Monarch Butterfly Optimization Algorithm

Multi-Layer Perceptrons Anomaly-based

detection

Multi-objective Bat Algorithm

(41)

increasing detection accuracy, and reducing the false alarm rate of intrusion detection systems, by improving the classification process and the selection of features (Hasani et al., 2014; Othman et al., 2013; Rufai et al., 2014). The achieved contributions of this research can be summarized in the following points:

1. Three new metaheuristic algorithms. The first algorithm, Enhanced Bat Algorithm (EBAT) is derived from the classic BAT algorithm, while the other two algorithms (Hybrid Artificial Bee Colony/Monarch Butterfly, HAM, and Hybrid Artificial Bee Colony/Dragonfly Algorithm, HAD) result from hybridizing the artificial bee colony optimization with the monarch butterfly algorithm and with the dragonfly algorithm, respectively. Theses hybrid algorithms employ the exploitation and exploration capabilities of both composite algorithms to optimize the search for local and global optimal solutions.

2. A method for adapting the new metaheuristic algorithms above for the training of Multi-Layer Perceptrons. The resulting training metaheuristic algorithms attempt to reach optimal weights and bias values for the MLP, which in turn leads to high classification performance.

3. The design and implementation of a two-phase system to improve the detection rate and reduce the false alarm rate of intrusion detection. The first phase uses the developed algorithm of an efficient feature selection based on binary and multi-objective BAT algorithm for wrapper-approach based feature selection, is called (MOBBAT), This algorithm is based on the weighted aggregation approach, uses a new fitness function to (minimize the number of features, minimize the classification error rate and minimize the false positive rate) in

(42)

order to improve the performance of IDS. The training of the classification algorithm. The second phase uses the features received from the first phase to classify the traffic based on the EBAT algorithm for MLP Neural Networks (EBAT-MLP), the new approach is called the (MOB-EBATMLP).

1.8 Research Methodology

The methodology of this research is divided into four main stages that aim to achieve the objectives of the research, as shown in figure 1.5. As shown in the diagram, the followed steps include: (1) reviewing related literature to identify and analyze existing studies, and then define the research problem, (2) the design of the two main components of the proposed approach, which include the feature selection technique and the metaheuristic algorithm for training the neural network, (3) the implementation of the proposed approach, integrating the two previous components in a coherent system, and (4) the evaluation of the new approach and assessment of the result by comparing it with other approaches.

In the first phase, the research problem is identified and the literature related to the research is reviewed. This phase formulates exactly the research problem and performs a comprehensive analysis of existing studies on the problem of research.

In the second phase, the solution for the research problem is designed and developed. The steps in this phase reflect clearly and directly on the objectives of the research, and accomplish the core of the objectives. As shown in figure 1.5, this phase consists of three major elements. The first element is the design of three new meta- heuristic algorithms, EBAT, HAM and HAD, to help overcome the shortcomings of the traditional metaheuristic algorithms. The second element is the training of the neural network by the new algorithms. The aim here is to get rid of the imperfections

(43)

in traditional training algorithms, reducing the computational complexity and the problems of tripping in local minima, as well as the slow convergence rate of current learning algorithms.

The last element of this phase is the selection of the important features from each network packet, achieved by the EBAT-based optimization as the wrapper classifier for the feature selector. This optimization relies on using a binary and multi- objective variation of the bat algorithm. The output of this step is an optimal subset of the features, which will be sent to the EBAT-MLP algorithm. These enhancements would lead in turn to enhance the ability to detect intrusion packets, which is the main objective of this research.

Figure 1.5: Research Methodology

In the third phase, the research design is implemented, and both the optimized selected features and the optimized training of neural networks are integrated into a coherent system to classify network traffic. Finally, the proposed approached is tested and evaluated in the fourth phase, based on its effectiveness in increasing detection accuracy and decreasing the false alarm rate. To evaluate the performance of detection in the new approach, this phase uses four of the most popular benchmark datasets:

Review of Literature 1

Design 2

Implementation 3

Evaluation 4

New Mo-optimization algorithm for FS Adopt to MLP training

Adopt to Mo- Optimization Feature Selection

Adopt to IDS

New Model for IDS New

Metaheuristics

New MLP Training Algorithm Hybridize/

Enhance Existing Metaheuristics

(44)

KDD CUP 1999, NLS-KDD, ISCX2012 and UNSW NB15, which are frequently used by the research community to evaluate intrusion detection systems.

1.9 Thesis Outline

This thesis is divided into seven chapters, a references section and an appendices section. The contents of each chapter are as follows.

Chapter One introduces the problem statement of the thesis, specifies the scope of the research, the objectives expected from it, its contributions, the general methodology of the work, and finally summarizes the organization of the thesis.

Chapter Two offers the literature review. It guides the reader to the algorithms, techniques and the resources of the research domain, especially those related to the components of this work. In particular, it provides the reader with a background on the concepts of intrusion detection, artificial neural networks, artificial bee colony, dragonfly algorithm, bat algorithm, monarch butterfly algorithm, multi-objective optimization and the corresponding related work in the literature as well as the approaches that are proven effective in the field.

Chapter Three presents the flow of the research methodology in this thesis by introducing the components and the relationship between them in order to clarify how the proposed solution is designed. It explains the proposed approach and the involved algorithms at all stages, followed by the characteristics of the employed datasets and benchmarking functions.

Chapter Four introduces three new metaheuristic optimisation algorithms. This chapter also presents the evaluation of the proposed algorithms’ performance using 13 benchmark test functions and statistical analysis.

(45)

Chapter Five introduces the technique for adapting the optimization algorithms developed in Chapter 4 for the training of MLPs. The performances of the proposed methods, called EBATMLP, HAMMLP and HADMLP, respectively, are verified using four benchmarking datasets. Similar to the previous chapter, the proposed training techniques are validated against performance metric supported by statistical analysis.

Chapter Six introduces the intrusion detection approach that uses a multi- objective version of the Bat algorithm for feature selection, based on the wrapper approach. The proposed algorithm is named MOBBAT. This algorithm forms the first stage of the intrusion detection approach to select the appropriate features from network packets. EBATMLP is then used for the classification task. The whole system is implemented using MATLAB. This chapter covers in depth the conducted experiments to evaluate the implemented approach as well as the obtained results, including the discussion of the results.

Chapter Seven concludes the thesis with a short summary of the work, and concise comments on the findings, besides a brief discussion of the direction to go from here.

Each chapter except the first and last begins with an introduction and concludes with a summary.

(46)

CHAPTER TWO LITERATURE REVIEW 2.1 Introduction

This chapter provides the reader with the necessary background on the main concepts and components that have been used throughout this work, and the previous works based on these components. Figure 2.1 shows the fundamental concepts and components that would be covered by this chapter. The chapter starts by giving a brief background on network intrusion detection systems, followed by the basic concepts of artificial neural networks, feature selection, multi-objective optimization technique, and swarm intelligence, all of which constitute an essential part of the proposed framework in this thesis. Next, the application of swarm intelligence methods to optimize both feature selection and the training on neural networks is discussed in terms of previous works, to put the work of this research in perspective.

2.2 Intrusion Detection Systems

An intrusion detection is defined by (Balasubramaniyan et al., 1998; Mukherjee et al., 1994; Snapp et al., 2017) as: ”the problem of identifying individuals [or threat agents] that are using a computer system without authorization i.e. crackers and those who have legitimate access to the system but are exceeding their privileges i.e. insider threat”.

Generally, intrusion detection methodologies are classified into three basic categories: signature-based detection, anomaly-based detection and hybrid detection.

These three methods perform the essential function of monitoring the events that occur in a computer system or network, analyzing the events, detecting suspicious events

(47)

(intrusions) and raising an alarm when discovering the intrusion. The fundamental difference between them lies in the events analysis method, where each one has different approach from the other. In the following section will be discussed these methods with more details.

A new Approach Proposed for Intrusion Detection

System

Computational Intelligence

Multi- objective Optimizatio

n

Aggregation Method

Feature Selection Wrapper

Method

Artificial Neural Network

Swarm Intelligence

Artificial

Bee Colony Dragonfly Algorithm Bat

Algorithm Monarch

Butterfly Optimizatio

n Multilayer

Perceptron

Figure 2.1: The related work and literature survey

Rujukan

DOKUMEN BERKAITAN

FEATURE SELECTION FOR THE FUZZY ARTMAP NEURAL NETWORK USING A HYBRID GENETIC ALGORITHM AND TABU

So much time taken to monitor the intrusion detection in the network by administrator with current setup of monitoring the intrusion alert, but many of systems administrators

On the other hand, the modeling works was covers the development of fault detection and isolation using artificial neural network and fuzzy logic.. Chapter 4 Presents the

After investigating of existing intrusion detection based on mobile agents for wireless mobile ad hoc network; based on our best knowledge from previous researches, we

The chapter elaborates our proposed diverse random oracle based intrusion-detection method to accurately identify large-scale malicious events that predominantly target the

In this review lots of information regarding artificial neural networks, Hopfield network, logic program on Hopfield network, reverse analysis of Hopfield network, Boltzmann machine,

To design a new detection approach on the way to improve the intrusion detection using a well-trained neural network by the bees algorithm and hybrid module

Moreover, the trained neural network detects anomalous behaviors based on the trained normal behavior model in order to train the detector in real-time to detect new