IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v34y2021ics187454822100041x.html
   My bibliography  Save this article

A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem

Author

Listed:
  • Al-Daweri, Muataz Salam
  • Abdullah, Salwani
  • Ariffin, Khairul Akram Zainol

Abstract

Network security is a mechanism of protecting the usability and integrity of any given network and its transmitted data. Network security's effectiveness is crucial to the network environment to ensure it is free from any threat, especially in the critical infrastructure (CI). The supervisory control and data acquisition systems in the CI are getting more connected to the internet, putting them in serious security concerns. Any malicious attack against these systems could cause considerable human, economic, and material damages. Thus, it leads to the emergence of the intrusion detection system (IDS). Theoretically, a modern IDS must handle a large amount of data with high accuracy. Ensemble-based, hybrid-based methods and their distinguished applications are a promising way to solve these issues. The efficiency of the IDS is mainly dependent on the selected data features and the used classification method. The artificial neural network (ANN) has been applied in various fields, but it requires adjustment on few parameters to work effectively. This study proposes a homogeneous ensemble based on single-class dynamic ANN (HOE-DANN). Each dynamic ANN (DANN) is optimized by a filter-wrapper method using a modified discrete cuttlefish algorithm based on rough set theory, and a migration-strategy based cuttlefish algorithm. Both algorithms simultaneously optimize the features, ANN structure, weights, and biases for creating the DANN. However, the threshold value of the ensemble model was set using the hill-climbing algorithm. The experiments were applied to well-known benchmark datasets, namely the KDD99, UNSW-NB15, and gas pipeline data logs (GPDL). The results show that the HOE-DANN outperforms the single model based on the DANN. Additionally, a comparison with several state-of-the-art methods has shown that the proposed method offers superior performance in terms of the detection rate (DR), false alarm rate (FAR), and classification accuracy (ACC). The HOE-DANN model was able to achieve DR of 97.47%, FAR of 2.25%, and ACC of 97.52% using the KDD99 dataset, DR of 99.93%, FAR of 13.13%, and ACC of 94.08% using the UNSW-NB15 dataset, and DR of 98.08%, FAR of 2.69%, and ACC of 94.50% using the GPDL dataset.

Suggested Citation

  • Al-Daweri, Muataz Salam & Abdullah, Salwani & Ariffin, Khairul Akram Zainol, 2021. "A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem," International Journal of Critical Infrastructure Protection, Elsevier, vol. 34(C).
  • Handle: RePEc:eee:ijocip:v:34:y:2021:i:c:s187454822100041x
    DOI: 10.1016/j.ijcip.2021.100449
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S187454822100041X
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2021.100449?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Genge, Béla & Haller, Piroska & Kiss, István, 2016. "A framework for designing resilient distributed intrusion detection systems for critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 15(C), pages 3-11.
    2. Choubineh, Abouzar & Wood, David A. & Choubineh, Zahak, 2020. "Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 29(C).
    3. Morris, Thomas & Srivastava, Anurag & Reaves, Bradley & Gao, Wei & Pavurapu, Kalyan & Reddi, Ram, 2011. "A control system testbed to validate critical infrastructure protection concepts," International Journal of Critical Infrastructure Protection, Elsevier, vol. 4(2), pages 88-103.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Oyeniyi Akeem Alimi & Khmaies Ouahada & Adnan M. Abu-Mahfouz & Suvendi Rimer & Kuburat Oyeranti Adefemi Alimi, 2021. "A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification," Sustainability, MDPI, vol. 13(17), pages 1-19, August.
    2. Mohammed Abdul Majeed & Rossilawati Sulaiman & Zarina Shukur & Mohammad Kamrul Hasan, 2021. "A Review on Text Steganography Techniques," Mathematics, MDPI, vol. 9(21), pages 1-28, November.
    3. Shuai Liu & Hui Qin & Guanjun Liu & Yang Xu & Xin Zhu & Xinliang Qi, 2023. "Runoff Forecasting of Machine Learning Model Based on Selective Ensemble," Water Resources Management: An International Journal, Published for the European Water Resources Association (EWRA), Springer;European Water Resources Association (EWRA), vol. 37(11), pages 4459-4473, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Singh, Abhishek Narain & Gupta, M.P. & Ojha, Amitabh, 2014. "Identifying critical infrastructure sectors and their dependencies: An Indian scenario," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 71-85.
    2. Urrea, Claudio & Morales, Claudio & Kern, John, 2016. "Implementation of error detection and correction in the Modbus-RTU serial protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 15(C), pages 27-37.
    3. Vosughi, Amirkhosro & Tamimi, Ali & King, Alexandra Beatrice & Majumder, Subir & Srivastava, Anurag K., 2022. "Cyber–physical vulnerability and resiliency analysis for DER integration: A review, challenges and research needs," Renewable and Sustainable Energy Reviews, Elsevier, vol. 168(C).
    4. Palleti, Venkata Reddy & Joseph, Jude Victor & Silva, Arlindo, 2018. "A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 23(C), pages 21-32.
    5. Umer, Muhammad Azmi & Junejo, Khurum Nazir & Jilani, Muhammad Taha & Mathur, Aditya P., 2022. "Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    6. Choubineh, Abouzar & Wood, David A. & Choubineh, Zahak, 2020. "Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 29(C).
    7. Ndonda, Gorby Kabasele & Sadre, Ramin, 2020. "Network trace generation for flow-based IDS evaluation in control and automation systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 31(C).
    8. Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
    9. Wang, Wu & Harrou, Fouzi & Bouyeddou, Benamar & Senouci, Sidi-Mohammed & Sun, Ying, 2022. "Cyber-attacks detection in industrial systems using artificial intelligence-driven methods," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    10. Oyeniyi Akeem Alimi & Khmaies Ouahada & Adnan M. Abu-Mahfouz & Suvendi Rimer & Kuburat Oyeranti Adefemi Alimi, 2021. "A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification," Sustainability, MDPI, vol. 13(17), pages 1-19, August.
    11. Bjorn Vaagensmith & Vivek Kumar Singh & Robert Ivans & Daniel L. Marino & Chathurika S. Wickramasinghe & Jacob Lehmer & Tyler Phillips & Craig Rieger & Milos Manic, 2021. "Review of Design Elements within Power Infrastructure Cyber–Physical Test Beds as Threat Analysis Environments," Energies, MDPI, vol. 14(5), pages 1-24, March.
    12. Berghout, Tarek & Benbouzid, Mohamed & Muyeen, S.M., 2022. "Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:34:y:2021:i:c:s187454822100041x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.