Ayyaz-Ul-Haq Qureshi
RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection
Qureshi, Ayyaz-Ul-Haq; Larijani, Hadi; Mtetwa, Nhamoinesu; Javed, Abbas; Ahmad, Jawad
Abstract
The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the importance of network security. As attacks are on the rise, cybersecurity should be considered as a prime concern while developing new networks. In the past, numerous solutions have been proposed for intrusion detection; however, many of them are computationally expensive and require high memory resources. In this paper, we propose a new intrusion detection system using a random neural network and an artificial bee colony algorithm (RNN-ABC). The model is trained and tested with the benchmark NSL-KDD data set. Accuracy and other metrics, such as the sensitivity and specificity of the proposed RNN-ABC, are compared with the traditional gradient descent algorithm-based RNN. While the overall accuracy remains at 95.02%, the performance is also estimated in terms of mean of the mean squared error (MMSE), standard deviation of MSE (SDMSE), best mean squared error (BMSE), and worst mean squared error (WMSE) parameters, which further confirms the superiority of the proposed scheme over the traditional methods
Journal Article Type | Article |
---|---|
Acceptance Date | Aug 11, 2019 |
Online Publication Date | Aug 14, 2019 |
Publication Date | Aug 14, 2019 |
Deposit Date | Oct 15, 2019 |
Publicly Available Date | Oct 15, 2019 |
Journal | Computers |
Publisher | MDPI |
Peer Reviewed | Peer Reviewed |
Volume | 8 |
Issue | 3 |
Article Number | 59 |
DOI | https://doi.org/10.3390/computers8030059 |
Public URL | http://researchrepository.napier.ac.uk/Output/2228033 |
Files
RNN-ABC: A New Swarm Optimization Based Technique For Anomaly Detection
(486 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
Copyright Statement
This is an open access article distributed under the Creative Commons Attribution License (CC BY).
You might also like
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
(2019)
Journal Article
A secure image encryption scheme based on chaotic maps and affine transformation
(2015)
Journal Article
Chaos-based diffusion for highly autocorrelated data in encryption algorithms
(2015)
Journal Article
A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps
(2016)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search