Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems

21Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

Abstract

The Internet of Things (IoT) is a modern approach that enables connection with a wide variety of devices remotely. Due to the resource constraints and open nature of IoT nodes, the routing protocol for low power and lossy (RPL) networks may be vulnerable to several routing attacks. That’s why a network intrusion detection system (NIDS) is needed to guard against routing assaults on RPL-based IoT networks. The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks. Therefore, we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique (LSH-SMOTE). The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization algorithms. To prove the effectiveness of the proposed approach, a set of experiments were conducted to evaluate the performance of NIDS for three cases, namely, detection without dataset balancing, detection with SMOTE balancing, and detection with the proposed optimized LSHSOMTE balancing. Experimental results showed that the proposed approach outperforms the other approaches and could boost the detection accuracy. In addition, a statistical analysis is performed to study the significance and stability of the proposed approach. The conducted experiments include seven different types of attack cases in the RPL-NIDS17 dataset. Based on the proposed approach, the achieved accuracy is (98.1%), sensitivity is (97.8%), and specificity is (98.8%).

Cite

CITATION STYLE

APA

Alkanhel, R., Khafaga, D. S., El-Kenawy, E. S. M., Abdelhamid, A. A., Ibrahim, A., Amin, R., … El-Den, B. M. (2023). Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems. Computers, Materials and Continua, 74(2), 2695–2709. https://doi.org/10.32604/cmc.2023.033153

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free