iconOpen Access

ARTICLE

crossmark

Probe Attack Detection Using an Improved Intrusion Detection System

by Abdulaziz Almazyad, Laila Halman, Alaa Alsaeed*

Department of Computer Engineering, College of Computer Science, King Saud University, Riyadh, 11421, Saudi Arabia

* Corresponding Author: Alaa Alsaeed. Email: email

Computers, Materials & Continua 2023, 74(3), 4769-4784. https://doi.org/10.32604/cmc.2023.033382

Abstract

The novel Software Defined Networking (SDN) architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive features. Nevertheless, such benefits lead to a more adverse environment entailing network breakdown, systems paralysis, and online banking fraudulence and robbery. As one of the most common and dangerous threats in SDN, probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities, which is then manipulated to undermine the entire system. Precision, high performance, and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time, optimize prediction performance, and provide a holistic understanding of machine learning data. As the extension of astute machine learning algorithms into an Intrusion Detection System (IDS) through SDN has garnered much scholarly attention within the past decade, this study recommended an effective IDS under the Grey-wolf optimizer (GWO) and Light Gradient Boosting Machine (LightGBM) classifier for probe attack identification. The InSDN dataset was employed to train and test the proposed IDS, which is deemed to be a novel benchmarking dataset in SDN. The proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within SDN. The results revealed that the proposed IDS outperforms the state-of-the-art IDSs, as it achieved 99.8% accuracy, 99.7% recall, 99.99% precision, and 99.8% F-measure.

Keywords


1  Introduction

Advancements of Internet-based technologies constitutes a set of many networking devices with integrated circuits and electronic chips for high throughput attainment towards hardware-oriented networking. Regardless, the present infrastructure depicts specific drawbacks involving manageability, versatility, and extensibility. Network controllers and administrators are restricted to a group of pre-identified commands although it might be handy, simpler, and more effective to complement increased internet protocols and applications through network control programming in responsive and flexible ways as networking devices typically support commands and configurations following a specified embedded Operating System (OS). Additionally, scholars are bound to create their own experimental environments or incorporate simulations rather than conducting experiments on real ones for idea manifestation. By way of explanation, cutting edge and research are costly under present hardware-centric networking conditions.

The Software Defined Networking (SDN) concept was recommended with three primary layers to alleviate such shortcomings (see Fig. 1). As ‘‘an emerging network architecture where the network control is decoupled and separated from the forwarding mechanism and is directly programmable’’ [1]. SDN constitutes a logically-centralized controller with a network-wide view that controls many interface-configured (ForCES [2] and OpenFlow [3]) packet-forwarding devices (switches). The SDN could emerge as a novel networking advancement that unwrap current network operation and control and facilitates network advancements and novel network designs following its decoupled nature. The potential SDN advantages in current and future Internet architectures, such as information-based networking [4] has garnered much interest from the society at large.

images

Figure 1: SDN components

Notably, SDN is exposed to probe attacks where unprotected network resources would be targeted for network damage. Following Fig. 2 [5], probe attacks attempt to gather the necessary data (IP Address, service name, operating system application, and host name) and detect network susceptibility. The attacker would employ common scanning instruments from the Internet to gather network data (nmap, satan, and mscan), which could also be utilized to instigate other attacks (Denial-of-Service (DoS), Root to Local attacks (R2L), User to Root (U2R)) beyond their essential purpose [5]. The primary idea underlying the attack originates from the perception that all rule types are only pushed from the controller to the switches, when necessary, in an SDN network. As such, a robust mechanism (automatic Intrusion Detection System (IDS)) should be provided by the network administrator for early attack detection and alleviate the risks resulting from such instances.

images

Figure 2: Probe attack scenario

The IDS is operated by monitoring and inspecting client device or network traffic behavior and serves to ascertain intrusions and suspicious activities [6]. This system issues an alarm to alert the security team and register malicious network activities into a log file for further investigation [7]. The IDS performance could be enhanced with Feature Selection (FS) to minimize computation time and intricacies through optimum feature subset selection, Microsoft proposed LightGBM in 2017 [8], a unique boosting framework that is deemed to be faster and more powerful than Xgboost [8]. The LightGBM model functioned as a classifier in the recommended IDS given its extensively acknowledged performance in resolving specific data mining and Machine Learning (ML) intricacies.

FS serves to determine a subset of features and choose the most pivotal counterpart for a classifier. As network traffic entails a substantial number of features, classifiers could yield higher precision with optimal attribute selection compared to one that is developed with a complete set of characteristics. FS could also mitigate the training dataset size given its reliable processing time and tests. Based on most empirical comparisons and demonstrations, the presence of repetitive and irrelevant features adversely affected learning model accuracy [9]. The security mechanism performance significantly relies on a subset of features chosen to be employed in optimal IDS development. As one of the extensively utilized and robust FS algorithms incorporated into various fields (IDSs), GWO selects the most crucial features that could enhance classification accuracy and intrusion detection rate.

The current study proposed an optimal IDS under GWO and the LightGBM classifier for efficient probe attack detection in SDN. The contributions of the proposed article are as follows: (i) An enhanced GWO by proposing a modified change position technique, (ii) A multi-objective fitness function to enhance performance of feature selection and classification process by selecting the most important features, and (iii) A LightGBM-based model for probe attack detection.

The remaining sections are presented as follows: Section 2 reviews relevant literature to highlight current knowledge gaps; Section 3 elaborates on the recommended IDS stages; Section 4 highlights the proposed IDS efficiency by discussing the empirical outcomes and concludes the study.

2  Related Works

Numerous attack detection methods are currently based on benchmark dataset, attack types, and simulating SDN scenarios. Robust attack detection techniques distinguish pernicious network traffic and patterns from legitimate counterparts [10]. Such techniques are extensively deployed in traditional networks and ML-assisted SDNs. For example, ML-based IDS of DDoS flooding attacks on SDNs was presented in [11]. The common principle is depicted using a case study where experimental data (jitter, throughput, and response time metrics) from a representative SDN environment, which proves adequate for typical mid-sized and enterprise-wide networks, is employed to structure classification models that precisely determine and categorize DDoS flooding attacks. The incorporated SDN model was emulated in Mininet and DDoS flooding attacks (hypertext transfer protocol or HTTP), transmission control protocol (TCP), and user datagram protocol or UDP attacks) that were launched on the SDN model with Low Orbit Ion Cannon (LOIC). On average, Classification and Regression Tree (CART) reflected the most optimal performance regarding prediction accuracy (98%), and robustness although all the examined ML techniques demonstrated high efficacy in Distributed Denial-of-Service (DDoS) flooding attack detection and classification.

A versatile modular architecture was recommended in [12] to facilitate Low-Rate Denial-of-Service (LR-DDoS) attack identification and alleviation in SDN contexts. The IDS in this study architecture was trained through six ML models. Their performance was assessed with the Canadian Institute of Cybersecurity (CIC) DoS dataset. Resultantly, the current study approach attained a 95% detection rate despite LR-DoS attack identification complexities. Regarding deployment, the open network OS controller operating on the Mininet VM employed for the simulated context for close proximity to real-world production networks. The intrusion prevention detection system alleviated all the attacks previously identified by IDS in testing topology, thus depicting the architecture utility to detect and alleviate LR-DDoS attacks.

A new DDoS attack alleviation approach in SDN-related Internet Service Provider (ISP) networks for TCP-SYN and Internet Control Message Protocol (ICMP) flood attacks employed the ML method (k-Nearest Neighbors (KNN) and Extreme Gradient Boosting (XGBoost)) following [13]. The recommended algorithms were implemented, and their accuracy evaluated to overcome the trade-off between accuracy and detection effectiveness through testbed deployment. Based on the experimental outcomes, the algorithms could effectively perform attack mitigation by over 98.0% while benign traffic proved to be unaffected. The DDoS attacks in SDN were identified with ML-oriented models parallel to [14]. Under DDoS attack traffic, particular features were first derived from SDN for the dataset in normal conditions. A novel dataset was subsequently developed with FS approaches on the present dataset for model simplification, interpretation catalyzation, and minimal training time. Both datasets that were developed with and without FS techniques were trained and tested with several ML and deep learning classifiers. Resultantly, the wrapper FS was integrated with a KNN classifier to attain the highest precision rate (98.3%) in DDoS attack identification. In this vein, ML and FS algorithms could demonstrate optimal results involving DDoS attack detection in SDN with the potential decrease of processing load and time.

Meanwhile, a learning-oriented mechanism was suggested in [15] to identify the low-rate DDoS on SDN controller and switch nodes. The proposed technique constitutes two main feature groups, namely (i) stateless group, and (ii) stateful group, elicited from the Openflow package. The IDS utilizes ML to develop classifiers and distinguish normal stream from abnormal one. The experimental environment was developed and implemented to assess the research method, which encompasses the low-rate DDoS attack module under Internet of Things (IoT) devices, the physical and virtual heterogeneous SDN network, and the data flow capture and feature extraction model. The prediction outcomes were validated from various learning algorithms and the dissemination of each raw data feature for the outcomes to be compared against conventional IP packet classification solution for the DDoS attack in IoT networks following the suggested platform. Overall, the experimental outcomes demonstrated the recommended method effectiveness.

A trigger-based IDS to detect of DDoS on data plane was recommended to detect abnormal traffic flow based on [16]. An integrated ML algorithm entailing K-Means and KNN was employed to manipulate the rate and asymmetry attributes of the flows and detect the malicious flow ascertained by the trigger-based IDS. The controller would then undertake the necessary actions to self-defend against the attacks. The recommended cooperative detection method framework involving control plane and data plane significantly enhanced detection accuracy and effectiveness and deterred DDoS attacks on SDN.

3  Proposed IDS

This section discusses the methodological stages followed to achieve the main objective of this article, namely: (i) preprocessing, (ii) GWO-based FS, and (ii) LightGBM-based attack detection.

3.1 Preprocessing

This stage strived towards data preparation for the subsequent phases (FS and detection) of the recommended IDS by converting the InSDN dataset network traffic into a more meaningful form. This stage encompasses the following components:

3.1.1 Cleansing

A significant step towards data quality and reliability reinforcement by omitting and rectifying dataset errors. Cleansing also includes managing missing, inaccurate, and noisy data that undermines model performance.

3.1.2 Transformation

Data conversion from symbolic feature values to numerical counterparts.

3.1.3 Mapping

The InSDN dataset involves specific attack types that should first be classified accordingly. As such, a mapping approach was employed to map every attack into its corresponding attack category (See Fig. 3), then each feature is indexed by integer number starting with 0, and the results is as listed in Table 1 below.

images

Figure 3: Attack mapping

images

3.1.4 Normalization

This process denotes calibrating a range of feature values into a well-proportioned counterpart. Normalizing values range between Ymin and Ymax, which are the minimum and maximum values for feature Y with Eq. (1) and extensively utilized in recent IDS research [17].

Ynew=YcurrentYminYmaxYmin(1)

Specifically, the numerical feature values are depicted by Y. A minimal feature Y value is denoted by Ymin while Ymax demonstrates the maximum value of the same feature. The original feature Y value is indicated by Ycurrent, whereas the normalized feature value is denoted by Xnew. The final dataset is as represented in Fig. 4 below.

images

Figure 4: Snapshot of dataset after preprocessing

3.2 GWO-Based Feature Selection

The GWO denotes a Swarm Intelligence Optimization algorithm inspired by the social hierarchy and hunting behavior of grey wolves. Four grey wolf types were defined to simulate the leadership hierarchy: alpha, beta, delta, and omega. The pseudocode of GWO is illustrated in Fig. 5 below.

images

Figure 5: Pseudocode of GWO [18]

The increased engagement of wolves in GWO would result in highly precise decisions and mitigate decision dependency. The refined GWO necessitates an additional wolf: omega wolf (ω) to reduce the impact rate of any wolf decision as thoroughly elaborated in Eqs. (2)(9). The central updating equation is developed in Eq. (2) below [18,19]:

Wit+1=Crossover(w1.w2.w3.w4)(2)

Specifically, the modified bGWO is based on this concept by adding one more wolf, called omega wolf (ω). The increase in the number of wolves that participated in the decision led to a reduction in the impact rate of any wolf’s decision from 0.33% to 0.25%. Where w1, w2, w3, and w4 are binary vectors that represent the wolf move impact on alpha, beta, delta, and omega grey wolves in sequence. The w1, w2, w3, and w4 were mathematically determined in Eqs. (3)(6), respectively.

wwd={1if(wωd+stepbωd)10otherwise(3)

Specifically, wωd denotes the location vector of the omega wolf in d while stepbωd indicates a binary step in dimension d determined by Eq. (3).

stepbωd={1ifstepcωdrand0otherwise(4)

Specifically, rand implies an arbitrarily selected number from uniform distribution [0.1] while stepcωd denotes the continuous valued step size for dimension d. Eq. (5) below is employed for sigmoidal function computation:

stepcωd=11+e10(A4dDiωd0.5)(5)

Specifically, A4d, and Diωd were mathematically determined by Eqs. (6) and (7) in dimension d, respectively.

A=2b.r1b(6)

Diωd=|C1.WαW|(7)

A simple random probability distribution crossover strategy was implemented per dimension to crossover w1, w2, w3, and w4 outcomes following Eq. (8).

wd={w1difrand<14w2dif14rand<24w3dif24rand<34w4dotherwise(8)

Specifically, W1, W2, and W3 denote the weights for every objective (1nxn = 1), acc implies accuracy, miss indicates the misclassification rate, and Nfeatures represents the selected number of features. On another note, TP implies true positive, TN denotes true negative, FP indicates false positive, and FN represents false negative.

Regardless, the current GWO-oriented IDS employed one objective function that induced a substantial number of utilized features, thus requiring additional network overhead, computation time, and inadequate FS. Alternatively, a multi-objective function was incorporated as a fitness function in the recommended IDS to mitigate current IDS complexities. As the study fitness assessment method, the recommended multi-objective function or weighted sum fitness function strived to minimize the number of selected features and misclassification rates and achieve high classification accuracy rates with Eq. (9). The fitness value for the recommended multi-objective function was computed with the following formula:

F(x)=(vaccuracy+(1v)1No_of_features)(9)

where v is a weighting number [0, 1], accuracy denotes detection accuracy computed by Eq. (10), and No_of_features denotes the number of features selected in such iteration.

3.3 LightGBM-Based Attack Detection

As aforementioned, LightGBM is an enhanced version of the Gradient Boosting Decision Tree algorithm. The LightGBM integrates the capability of multiple decision trees in predicting/classifying classes, in order to provide the final optimal predicting/classifying generalizes. Basically, The LightGBM combines manifold “weak” learners into “strong” learners. However, there are two main causes for designing ML depending on this conception, (i) easiness in acquiring “weak” learners, and (ii) integrating more than one learner usually has superior generalization performance than utilizing one learner. Many modern studies have revealed the preponderance of LightGBM in solving many ML tasks, for instance, prediction of air quality [20] and disease detection and classification [21]. To clearly illustrate the training process of LightGBM, we take a model consisting of M trees [22], as an example described in Algorithm 1 (See Fig. 6).

images

Figure 6: LightGBM algorithm [22]

The main contribution of this article is a modified GWO that provides better performance; thus, adding one more wolf in GWO provided high performance with reduction of decision dependency. Therefore, GWO is not further vulnerable to feature selection problem. In addition, the second contribution of this article is a proposed multi-objective function, which in result leads to an appropriate selection of a subset of features.

4  Results and Discussion

This section discusses the details of benchmark dataset and evaluation metrics used to assess the performance of the proposed IDS, then, results and findings are presented in detail.

4.1 Benchmark Dataset and Evaluation Metrics

A new benchmark dataset, called InSDN [23] using Mininet simulation/SDN approaches [24,25], is utilized to assess the effectiveness of the proposed IDS. InSDN is a public attack-specific SDN dataset. It is considered the first comprehensive dataset for the SDN environment, which is used to assess the performance of IDS. InSDN contains the various attack classes that might happen in the different SDN elements. Fig. 7 illustrates the logical network topology used as a testbed to generate the InSDN dataset.

images

Figure 7: Logical network topology

On the other hand, common evaluation metrics are used to demonstrate its performance. In order to calculate theses performance metrics, a confusion matrix is used [24,25], which is presented Table 2.

images

The equations below are used to evaluate the accuracy, recall, precision, and F-measure [26,27], respectively of the proposed IDS:

Accuracy=TP+TNTP+TN+FP+FN(10)

Recall=TPTP+FN(11)

Precision=TPTP+FP(12)

Fmeasure=2PrecisionRecallPrecision+Recall(13)

TP indicates the number of true positives, FN indicates the number of false negatives, TN indicates the number of true negatives, and FP indicates the number of false positives.

4.2 Experimental Setup

The proposed IDS is implemented in Python programming language. Experiments are conducted on a personal computer PC with the following hardware and software specifications, a presented in Table 3 below:

images

4.3 Results and Findings

As previously mentioned, the number of features utilized in intrusion and attack detection denotes a highly crucial metric as a minimal number of features mitigates detection intricacy and time and optimizes detection accuracy and overall performance. The utilization of GWO with parameter fine tuning, as presented in Appendix Table 8, minimized the number of features from 67 to 8 after 20 runs, as depicted in Table 4. The experiments were performed with different runs to meet the requirements of computer science’s test [28]. As presented in Table 5, the optimal features subset that selected contains the features with index [6 11 14 24 45 48 51 55], which are: TotLen Fwd Pkts, Fwd Pkt Len Std, Bwd Pkt Len Mean, Fwd IAT Std, RST Flag Cnt, URG Flag Cnt, Fwd Seg Size Avg, Subflow Bwd Pkts.

images

images

The InSDN dataset with the subset of features mentioned in Table 5 is then divided into training and testing dataset, where the training dataset contains (133242) rows, and (33311) rows for testing. The LightGBM with hyperparameter, mentioned in Appendix Table 7, was trained on the training set, and then tested using the testing dataset. The experimental results obtained showed high performance, as illustrated in Table 6 below. With the use of the selected features subset, the LightGBM classifier achieved 99.8% accuracy, 99.7% recall, 99.99% precision, and f1-measure 99.8%. On the other hand, without the use of the selected features subset (i.e., with the original dataset with 67 features), the LightGBM classifier achieved 77.3% accuracy, 61.4% recall, 100% precision, and 76.1% f1-measure. These findings reveal the significant impact of using the FS (based on GWO) on enhancing the IDS performance significantly.

images

images

images

Besides, the performance of the proposed IDS was also compared against that of advanced counterparts mentioned in the literature including [1115] to identify its efficiency. Although the IDSs attained comparable outcomes following accuracy, precision, recall, and F-measure, the proposed IDS outperformed the current IDSs in all evaluation metric as outlined in Fig. 8 below. Attaining a minimal number of pertinent network traffic elements without adversely impacting detection performance would significantly improve IDS effectiveness given the essentiality of FS in any IDS. Based on the compared methods utilizing the InSDN dataset, the proposed IDS maintains the highest performance among all state-of-the-art IDS that compared with.

images

Figure 8: Comparison with state-of-the-art IDSs

Conclusively, the proposed IDS depicted a practical means of addressing IDS complexities. The algorithm capacity to enhance the precision value and minimize the number of features for the detection process substantially optimized IDS performance. The multi-objective function (fitness function) incorporated into the fourth grey wolf explicitly affected the next algorithm position selection process. The derived experimental results reflected that the proposed IDS implied a highly positive effect on improving IDS performance compared to other current IDS methods. Although the integration of one more wolf (omega wolf or ω) with GWO offered precise decisions and decreased decision dependency, the following position in the refined GWO shifted based on the four most optimal solutions (α, β, δ, and ω) with the crossover technique. The multi-objective function also resulted in the adequate selection of a set of features that assessed whether the feature subset efficiently complemented the objectives (high detection accuracy and minimum number of features).

5  Conclusion

Intrusion detection remains one of the crucial concerns in network security. Network traffic performance is unpredictable with multiple problematic space features in the non-linear nature of intrusion attempts. The aforementioned aspects render Intrusion Detection Systems a challenge in security studies. As such, it is deemed pivotal to select essential intrusion detection components in information security. An optimal IDS method was proposed in this article following GWO and LightGBM. Several experiments were performed to reflect the proposed IDS efficiency in terms of accuracy, precision, recall and f-measures, and subsequently compared against advanced IDSs. Based on the comparison outcomes, the recommended IDS substantially optimized preliminary-stage attack detections. Given that the proposed IDS outperformed other advanced IDSs concerning accuracy, precision, recall, and F-measure, the recommended IDS proved to be more effective in preventing network attacks within SDN, especially Probe attack, compared to current sophisticated IDSs. The suggested IDS has also provided useful insights and empirical directions for anomaly identification, such as improving the next location decision by adapting the velocity parameter of the Particle Swarm Optimization algorithm.

Acknowledgement: I express my gratitude to King Saud University, The Kingdom of Saudi Arabia, for administrative and technical support.

Funding Statement: The authors would like to thank the Deanship of Scientific Research and the research Services and Support Unit (RSSU) at King Saud University for their support in this paper.

Conflicts of Interest: The author declares that they have no conflicts of interest to report regarding the present study.

References

 1.  H. Farhady, H. Lee and A. Nakao, “Software-defined networking: A survey,” Computer Networks, vol. 81, no. 11, pp. 79–95, 2015. [Google Scholar]

 2.  A. Doria, R. Gopal, H. Khosravi, L. Dong, J. Salim et al., “Forwarding and Control Element Separation (Forces) Protocol Specification,” [Online]. Available: https://ietf.org/wg/forces/charter/. [Google Scholar]

 3.  N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson et al., “OpenFlow: Enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008. [Google Scholar]

 4.  B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher and B. Ohlman, “A survey of information-centric networking,” Communications Magazine, vol. 50, no. 7, pp. 26–36, 2012. [Google Scholar]

 5.  N. Khamphakdee, N. Benjamas and S. Saiyod, “Improving intrusion detection system based on snort rules for network probe attacks detection with association rules technique of data mining,” Journal of ICT Research & Applications, vol. 8, no. 3, pp. 11–21, 2015. [Google Scholar]

 6.  A. Alzahrani and M. Alenazi, “Designing a network intrusion detection system based on machine learning for software defined networks,” Future Internet, vol. 1, no. 5, pp. 111–123, 2021. [Google Scholar]

 7.  J. Shen and J. Wang, “Network intrusion detection by artificial immune system,” in IECON 2011-37th Annual Conf. of the IEEE Industrial Electronics Society, Melbourne, VIC, Australia, IEEE, pp. 4716–4720, 2011. [Google Scholar]

 8.  G. Ke, Q. Meng, T. Finley, T. Wang, W. Chen et al., “LightGBM: A highly efficient gradient boosting decision tree,” in Neural Information Processing Systems; Neural Information Processing Systems Foundation, vol. 30. Long Beach, CA, USA, pp. 112–135, 2017. [Google Scholar]

 9.  J. Hur, S. Ihm and Y. Park, “A variable impacts measurement in random forest for mobile cloud computing,” Wireless Communications and Mobile Computing, vol. 32, no. 11, pp. 321–339, 2017. [Google Scholar]

10. G. Carl, R. Kesidis, R. Brooks and S. Rai, “Denial-of-service attack detection techniques,” IEEE Internet Computing, vol. 10, no. 1, pp. 82–89, 2006. [Google Scholar]

11. A. Sangodoyin, M. Akinsolu, P. Pillai and V. Grout, “Detection and classification of DDoS flooding attacks on software-defined networks: A case study for the application of machine learning,” IEEE Access, vol. 9, no. 11, pp. 122495–122508, 2021. [Google Scholar]

12. J. Perez-Diaz, I. Valdovinos, K. Choo and D. Zhu, “A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning,” IEEE Access, vol. 8, no. 11, pp. 155859–155872, 2020. [Google Scholar]

13. N. Tuan, P. Hung, N. Nghia, N. Tho, T. Phan et al., “A DDoS attack mitigation scheme in ISP networks using machine learning based on SDN,” Electronics, vol. 9, no. 3, pp. 413–422, 2020. [Google Scholar]

14. H. Polat, O. Polat and A. Cetin, “Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models,” Sustainability, vol. 12, no. 3, pp. 1035–1047, 2020. [Google Scholar]

15. H. Cheng, J. Liu, T. Xu, B. Ren, B. Mao et al., “Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks,” International Journal of Sensor Networks, vol. 34, no. 1, pp. 56–69, 2020. [Google Scholar]

16. L. Tan, Y. Pan, L. Wu, J. Zhou, J. Jiang et al., “A new framework for DDoS attack detection and defense in SDN environment,” IEEE Access, vol. 8, no. 1, pp. 161908–161919, 2020. [Google Scholar]

17. B. Setiawan, S. Djanali, T. Ahmad and I. Nopember, “Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine,” International Journal of Intelligent Engineering Systems, vol. 12, no. 4, pp. 378–389, 2019. [Google Scholar]

18. S. Mirjalili, S. Mirjalili and A. Lewis, “Grey wolf optimizer,” Advances in Engineering Software, vol. 69, no. 7, pp. 46–61, 2014. [Google Scholar]

19. H. Faris, I. Aljarah, M. Al-Betar and S. Mirjalili, “Grey wolf optimizer: A review of recent variants and applications,” Neural Computing and Applications, vol. 30, no. 2, pp. 413–435, 2018. [Google Scholar]

20. Y. Zhang, Y. Wang, M. Gao, Q. Ma, J. Zhao et al., “A predictive data feature exploration-based air quality prediction approach,” IEEE Access, vol. 7, no. 5, pp. 30732–30743, 2019. [Google Scholar]

21. D. Wang, Y. Zhang and Y. Zhao, “LightGBM: An effective miRNA classification method in breast cancer patients,” in Proc. of the 2017 Int. Conf. on Computational Biology and Bioinformatics, New York NY, United States, pp. 7–11, 2017. [Google Scholar]

22. D. Jin, Y. Lu, J. Qin, Z. Cheng and Z. Mao, “SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism,” Computers & Security, vol. 97, no. 1, pp. 101–117, 2020. [Google Scholar]

23. M. Elsayed, N. Le-Khac and A. Jurcut, “InSDN: A novel SDN intrusion dataset,” IEEE Access, vol. 8, no. 9, pp. 165263–165284, 2020. [Google Scholar]

24. B. Lantz, B. Heller and N. McKeown, “A network in a laptop: Rapid prototyping for software-defined networks,” in Proc. of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, New York NY, United States, pp. 1–6, 2010. [Google Scholar]

25. P. Tam, S. Math, C. Nam and S. Kim, “Adaptive resource optimized edge federated learning in real-time image sensing classifications,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 14, no. 1, pp. 10929–10940, 2021. [Google Scholar]

26. A. Salih and A. Abdulazeez, “Evaluation of classification algorithms for intrusion detection system: A review,” Journal of Soft Computing and Data Mining, vol. 2, no. 1, pp. 31–40, 2021. [Google Scholar]

27. S. Ludwig, “Applying a neural network ensemble to intrusion detection,” Journal of Artificial Intelligence and Soft Computing Research, vol. 9, no. 1, pp. 11–25, 2019. [Google Scholar]

28. J. Devore, “Probability and Statistics for Engineering and the Sciences,” Cengage Learning. [Online]. Available: https://fac.ksu.edu.sa/sites/default/files/probability_and_statistics_for_engineering_and_the_sciences.pdf. [Google Scholar]

Appendix Hyperparameters


Cite This Article

APA Style
Almazyad, A., Halman, L., Alsaeed, A. (2023). Probe attack detection using an improved intrusion detection system. Computers, Materials & Continua, 74(3), 4769-4784. https://doi.org/10.32604/cmc.2023.033382
Vancouver Style
Almazyad A, Halman L, Alsaeed A. Probe attack detection using an improved intrusion detection system. Comput Mater Contin. 2023;74(3):4769-4784 https://doi.org/10.32604/cmc.2023.033382
IEEE Style
A. Almazyad, L. Halman, and A. Alsaeed, “Probe Attack Detection Using an Improved Intrusion Detection System,” Comput. Mater. Contin., vol. 74, no. 3, pp. 4769-4784, 2023. https://doi.org/10.32604/cmc.2023.033382


cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1786

    View

  • 744

    Download

  • 4

    Like

Share Link