• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    2021-12-14 09:58:02OmarAlmomani
    Computers Materials&Continua 2021年7期

    Omar Almomani

    Department of Computer Network and Information Systems,The World Islamic Sciences and Education University,Amman,11947,Jordan

    Abstract:Network Intrusion Detection System(IDS)aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls.The features selection approach plays an important role in constructing effective network IDS.Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy.Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack.The proposed model has two objectives;The first one is to reduce the number of selected features for Network IDS.This objective was met through the hybridization of bioinspired metaheuristic algorithms with each other in a hybrid model.The algorithms used in this paper are particle swarm optimization(PSO), multiverse optimizer (MVO), grey wolf optimizer (GWO), moth-flame optimization (MFO), whale optimization algorithm(WOA), firefly algorithm(FFA),and bat algorithm(BAT).The second objective is to detect the generic attack using machine learning classifiers.This objective was met through employing the support vector machine(SVM),C4.5(J48)decision tree,and random forest(RF)classifiers.UNSW-NB15 dataset used for assessing the effectiveness of the proposed hybrid model.UNSW-NB15 dataset has nine attacks type.The generic attack is the highest among them.Therefore,the proposed model aims to identify generic attacks.My data showed that J48 is the best classifier compared to SVM and RF for the time needed to build the model.In terms of features reduction for the classification,my data show that the MFO-WOA and FFA-GWO models reduce the features to 15 features with close accuracy,sensitivity and F-measure of all features,whereas MVO-BAT model reduces features to 24 features with the same accuracy, sensitivity and F-measure of all features for all classifiers.

    Keywords: IDS; metaheuristic algorithms; PSO; MVO; GWO; MFO; WOA;FFA; BAT; SVM; J48; RF; UNSW-NB15 dataset

    1 Introduction

    Computer network operations have been developing rapidly due to an increase in the number of computers and mobile devices.In light of that, the number of network attacks has been overgrowing as well.According to “the European Union Agency for Network and Information Security(ENISA),”the attacks complexity and the malicious sophistication has been increasing.Therefore,network security has been receiving greater attention [1,2].The techniques used for ensuring network security are prevention, detection, and mitigation techniques.Prevention is a proactive technique that serves as the first-line procedure for protecting the network.It aims to avoid the attacks.If the prevention fails to protect the network, the detection technique is employed.It is utilized to monitor the network and detect potential attacks.Finally, mitigation techniques used to keep devices on while it is under attack.Detection techniques are categorized into two kinds based on the place of detection or type of detection.Place of detection can be host-based detection or network-based detection.In contrast, the type of detection can be a signature or anomaly-based detection [3].Host-based detection monitors the internal operations of the computer system to detect any illegal access to its resources.The network-based detection monitors the network traffic logs in real-time for identifying the potential intrusions launched against the network.Signaturebased detection technique searches for specific trends, or signatures.The use of this technique preferred for detecting known attacks, however, this technique is not able to detect new attacks.

    On the other hand, anomaly-based detection aims to identify the normal behaviour of the network and producing a warning every time a deviation occurs through using a predefined threshold.Anomalies detection defined as a two-class classifier that classifies each sample as a normal or abnormal sample.The current IDS suffers from several efficiency-related problems, such as the low rates of detection accuracy and high rates of false detection [4].To improve the IDS performance, feature selection is a significant step in any IDS.Feature selection for IDS can be done using several approaches.One of these approaches is bio-inspired metaheuristic algorithms.

    Feature selection contributes to reducing the dimensional data by removing the duplicate and unnecessary features from the dataset.In addition to that, it deletes the least essential feature from the dataset to improve the classification accuracy.Feature selection approaches play a significant role in building an optimized IDS with fewer features.Feature selection model can be either filterbased, wrapper-based and embedded-based.In this paper wrapper-based used.

    Bio-inspired metaheuristic algorithms are algorithms based on certain physical and biological standards.They are classified into two types, population and single solution based algorithms [5].Population-based detectors are deemed more suitable than single solution-based algorithms.Population-based bio-inspired metaheuristic algorithms used in this study are PSO [6–10],MVO [11], GWO [7,12], MFO [13], WOA [14], FFA [7,15] and BAT [16,17].

    Through the present paper, a hybrid model based on PSO, MVO, GWO, MFO, WOA, FFA,and BAT algorithms for network IDS proposed to reduce feature selection.That main objective of this study is to enhance the network IDS performance by reducing the number of the selected features to get high detection accuracy for large scale datasets with consuming less time.The effectiveness of the proposed model tested by using well-known machine learning SVM, J48 and RF classifiers.

    The new contributions of the paper include:

    (a) The present study offers a proposed hybrid model for network IDS through the hybridization of every couple of PSO, MVO, GWO, MFO, WOA, FFA, and BAT algorithms to reduce the number of the selected feature to improve NIDS performance.

    (b) The present study evaluates the reduced dataset of the proposed hybrid model based on SVM, J48, and RF machine learning classifiers.

    The paper organized as follows:Section 2 provides a review of the relevant literature that is related to anomaly detection by using bio-Inspired Metaheuristic algorithms.Section 3 presents a discussion about the proposed model.Section 4 provides information about the performance evaluation metrics.Section 5 presents several experimental results about the proposed model.Section 6 offers a conclusion

    2 Related Works

    During recent years, the feature selection model for network IDS has been receiving much attention from researchers.The researchers proposed many models to improve network IDS performance using different approaches such as filter, wrapper, data processing, optimization,machine learning techniques, and Bio-inspired Metaheuristic algorithms.Bio-inspired Metaheuristic algorithms are used to improve the network IDS performance due to its ability to find the most effective solutions within the minimum time.Each bio-Inspired metaheuristic algorithm has its drawbacks and advantages.Through hybridization, each algorithm can take advantage of the strengths and address the weaknesses of other algorithms.Many recent studies suggest that hybridization improves the bio-Inspired metaheuristic algorithm performance.This section explains some of these recent studies.

    Kim et al.[18] developed a hybrid IDS which includes an anomaly detection model based on multiple 1-class SVM.It consists of a misuse detection model based on the C4.5 decision tree algorithm.NSL-KDD dataset used for validating the proposed hierarchical model in terms of detection accuracy and false alarm rate of unknown and known attacks.In comparison to other models, the proposed model can effectively reduce the false positive rate and the duration needed for the testing and training processes.In addition to that, the proposed model significantly reduces the time required for training processes by 50% and the time required for the testing process by 40%.

    Ghanem et al.[19] proposed a hybrid IDS to classify anomalies in large-scale datasets through employing the Genetic Algorithm (GA) detectors and multi-start metaheuristic system.The proposed model uses a negative selection-based detector generation method.It was evaluated by employing the NSL-KDD dataset.Based on the results of the evaluation, the model is useful in generating an appropriate number of detectors.The accuracy rate of this model is 96.1%, and the false positive rate is 3.3.

    Eesa et al.[20] developed a hybrid model that includes the cuttlefish optimization algorithm (CFA) and the decision tree classifier.It aims to detect network intrusions.In this model, the CFA employed for selecting significant features, while the decision tree algorithm used for identifying the types of abnormal events.The performance of this model tested on the KDDCup99 Dataset.The results showed that, when the number of features is less than 20, the detection rate and accuracy is significantly high.

    Asahi-Shahri et al.[21] developed a hybrid model that includes GA and SVM.This model reduced the features from 45 to 10 features.The GA algorithm categorized those features into three types based on priority.This model shows an outstanding true positive value and a low false-positive value using the KDD 99 dataset.The results of the proposed hybrid model showed a true positive value of 0.973 and the false-positive value is 0.017.

    Guo et al.[22] developed a two-level hybrid model to detect the intrusions by utilizing the strengths of the misuse-based and anomaly-based detection approach.This model consists of two anomaly detection components (ADCs) and one misuse detection component (MDC).ADC one detects abnormal connections by employing the ADBCC method.After that, the declared abnormal and normal links sent to the ADC two and the MDC respectively in parallel to be assessed by K-NN.This hybrid approach tested experimentally using KDDCup99 and the Kyoto University Benchmark Dataset (KUBD).Based on the results of the trial using the dataset of KDD99, the proposed model can effectively detect unknown attacks and known ones.It can effectively detect network anomalies by showing a high detection accuracy value and a low falsepositive rate value.Based on the results of the experiment using the dataset of KUBD, the proposed model was highly effective in collecting attack traffics without having a specific label compared to KDDcup99 and KDD99.

    Al-Yaseena et al.[23] developed a multi-level hybrid IDS that employs extreme learning machine (ELM) and SVM which they were used to improve the performance efficiency of the model in detecting known and unknown attacks.The proposed model tested using the KDDCup99 dataset.Based on the results of the trial, the accuracy of the proposed model is 95.75%.The false alarm rate of the model is 1.87%.

    Hajisalem et al.[24] developed a hybrid classification model based on an artificial bee colony (ABC) and artificial fish swarm (AFS) algorithm.The performance level of the model assessed by employing two datasets (NSL-KDD and UNSW-NB15).Based on the results of the trial, the detection accuracy of the model is 99%.The false-positive rate is 0.01%.

    Li et al.[25] developed a model that includes the Gini index.This model consists of the gradient boosting decision tree (GBDT) and PSO.The optimal feature subset was chosen by Gini index.The gradient lifting decision tree algorithm was used to detect a network attack.The parameters of GBDT were optimized using the PSO algorithm.The model assessed in terms of detection rate, accuracy, F1-score, precision, and false alarm rate.Such an assessment conducted by employing the NSL-KDD Dataset.Based on the results, it was found that the model is accurate and able to detect intrusion effectively.The detection rate of the model was 78.48%, the precision rate was 96.44%, the F1-score was 86.54% and the false acceptance rate was 3.83%.

    Hosseini et al.[26] developed a hybrid model for detecting intrusion.This model consists of two phases.The first phase is the feature selection phase.The second phase is the attack detection phase.Through the first phase, a wrapper method called (MGA-SVM) employed.This model includes features of SVM and GA with multi-parent crossover and multi-parent mutation (MGA).In the second phase, an artificial neural network (ANN) employed for detecting attacks.A hybrid gravitational search (HGS) conducted, and a PSO is used to improve the performance of the proposed model.The proposed model is named MGA-SVMHGS-PSO-ANN.The performance of MGA-SVMHGS-PSO-ANN compared to the performance of GS-ANN, DT,GD-ANN, GAANN, PSO-ANN, and GSPSO-ANN.Using the NSL-KDD Dataset, data showed that the proposed MGA-SVMHGS-PSO-ANN model has a high detection accuracy rate of 99.3%.The features of NSL-KDD reduced from 42 to 4 features and the training time of this model is 3 seconds maximum.

    Khraisat et al.[27] developed a hybrid IDS (HIDS) model, which includes a C5.0 decision tree classifier and a one-class support vector machine (OC-SVM).HIDS used the strengths of the Signature-based IDS and the anomaly-based IDS.The signature-based IDS created based on the C5.0 decision tree classifier, while the anomaly-based IDS established based on the OC-SVM.It aims to identify the well-known intrusions and zero-day attacks by showing a high level of detection accuracy and a low false-alarm rate.The proposed HIDS assessed by employing the NSL-KDD datasets and the Australian defence force academy (ADFA) datasets.It found that the performance of HIDS has improved compared to Signature-based IDS and anomaly-based IDS in terms of the detection rate, false alarm rate, true negative rate, false-negative rate, false-positive rate, recall rate, precision, sensitivity, and F-Measure.

    Mohmmadzadeh et al.[28] proposed a new hybrid model combining WOA and flower pollination algorithm (FPA).This model is called HWOAFPA.It employs natural processes of WOA and FPA for solving the problem of feature selection optimization.On the other hand, it operates the opposition-based learning (OBL) method to ensure that the convergence rate and accuracy of the proposed model are high.In fact, in the proposed model, WOA creates solutions in their search space by using the prey siege and encircling process, bubble invasion.It searches for prey methods and seeks to enhance the solutions of the feature selection problem; along with this model.FPA improves the solution of the issue of the feature selection by carrying out two global and local search processes in an opposite space with the solutions of the WOA.WOA and FPA using all the possible solutions to solve the feature selection problem.They assessed the level of the proposed model performance using an experiment consisting of two stages.Through the 1st stage, the investigation carried out on ten feature selection datasets that obtained from the UCI data repository, and in the second stage, WOA and FPA assessed the performance level of the model in terms of detecting spam email messages.Based on the results obtained from the first stage, the model performance on ten UCI datasets is more effective than other basic metaheuristic algorithms in terms of the average size of selection and classification accuracy, whereas in the second stage, the proposed model shows higher accuracy than other similar algorithms in terms of having spam emails detected.

    3 Proposed Hybrid Model

    This model aims to increase the performance efficiency of the network IDS by hybridizing the following PSO, MVO, GWO, MFO, WOA, FFA, and BAT meta-heuristic algorithms.Fig.1 presents a proposed hybrid model architecture.The performance efficiency is enhanced by reducing the number of effective features in classifying the dataset to detect generic attacked.The following subsection illustrates each stage of the proposed model in detail.

    Figure 1:The proposed hybrid model architecture

    3.1 UNSW-NB15 Dataset

    The UNSW-NB15 dataset [29] created by utilizing an IXIA PerfectStorm tool.A tcpdump tool used to capture 100 GB of raw network traffic (pcap files).Each pcap file contains 1000 MB to make the analysis of the packets easier.Argus and Bro-IDS techniques were used, and 12 procedures carried out to generate 49 features with the class label.This dataset divided into a training set and a testing set.The training set includes 175,341 records, while the testing set contains 82,332 records and these records can be either attack or normal.The relevant attacks launched against the UNSW-NB15 dataset are 9 types which include; analysis, backdoor, DoS,Exploits, Fuzzers, Generic, Reconnaissance, Shellcode and Worms.The generic attack represented by 18,8712 records in the testing set and 40,000 records in the training set which is the highest attacks among other attacks.Tab.1 presents a list of features that are in UNSW-NB15 dataset.

    Table 1:UNSW-NB15 dataset features list

    3.2 Pre-Processing Stage

    The UNSW-NB15 dataset has to go through the following pre-processing steps to use the EvoloPy-FS optimization framework [30–33]:

    (a) The label removal:Each feature in the original UNSW-NB15 dataset has a label.It’s necessary to remove this label to adapt the dataset with the EvoloPy-FS context.

    (b) The removal of features:The original UNSW-NB15 Dataset has 45 features, 2 of these include class labels i.e attack cat and label.The attack cat is not considered as a feature,thus, deleting it is necessary.

    (c) Label encoding:Within the Dataset, the labels i.e state, protocol, and service type have string values and it is crucial to have these values encoded in numerical values.

    (d) Binarisation of data:The numerical data in the dataset poses challenges over the classifier in the training process.Thus, it is very important to standardize the values in each feature.Therefore, the minimum value should be 0 in each feature and the maximum value should be 1 in each feature.This will make the group more homogeneous and maintain the contrast between the values of every feature.

    3.3 Bio-Inspired Metaheuristic Algorithms

    Selecting the features was done based on the following Bio-inspired metaheuristic algorithms:

    3.3.1 PSO

    PSO created by Eberhart et al.[6].Through PSO, the information gets optimized through having social contact within the community; the learning is considered personal and social.PSO based on the ability to interpret each solution in the swarm as a particle.Regarding each particle as a position in the search space that represented as follows:

    D refers to the search space dimensionality.Particles move to search for the optimal solutions within the search space, considering each particle has a velocity which is identified as follows

    Regarding each particle, it has its position and velocity, such a position and velocity updated throughout the movement of the position.The best initial position of the particle reported as the best personal pbest.The best position of the population is called gbest.PSO looks for optimal solutions based on gbest-pbest.It looks for them through having the velocity and position of each particle updated by the equations below:

    tdenotes thetth iteration within the process of evolutionary.d∈Dindicates thedth dimension in the search space.wrefers to the weight of the inertia that controls the impact of the previous velocities on the current velocities.c1, along withc2are considered acceleration constants.r1,along withr2, are considered random values that are in the range of [0, 1].pidrefers to pbest.pgd refers to gbest in thedth dimension.

    3.3.2 MVO

    MVO is a new metaheuristic algorithm that was developed by Mirjalili et al.[11].It mimics the principles of a multi-versa theory.It was developed based on the idea of multiple existences universes that include white, black and wormholes and their interactions.Regarding the algorithm,it is a stochastic algorithm that based on the population.It approximates the optimum global for problem optimization with a solution collection.

    MVO has two parameters for having the solution updated.Those parameters are wormhole existence probability (WEP) and travelling distance rate (TDR).They determine how much and how often the solutions change during the process of optimization.WEP is calculated based on the equation below:

    Where the minimum is b, the maximum is a current iteration is t, and the maximum number of allowed iterations is T.TDR i is calculated based on the equation below:

    where the exploitation accuracy is p.Finally, the position of the solutions modified after calculating WEP and TDR.

    3.3.3 GWO

    GWO developed based on a social hierarchy and the hunting approach of grey wolves.It proposed by Mirjalili et al.[12].It consists of four levels.

    Level-1:Alpha (α):It is responsible for the process of making the decisions (e.g., decisions related to hunting, wake-up time, sleep place).

    Level-2:Beta(β):It is probably the strongest wolf candidate for replacing alpha.βoperates as an advisor toα.

    Level-3:Delta(δ):They refer to the wolves that respectα-βwolves at this stage.They monitor x wolves.They serve as scouts, sentinels, sentinels, elders, in-pack caretakers and hunters.

    Level-4:Omega(ω):Regarding the wolves at the fourth level, they deemed the weakest wolves.They carry out the role of the scapegoat.They must obey the order issued by certain people.

    GWO mathematics model has three parts.Those parts are encircling, hunting and attaching behaviour.the encircling behaviour, it represented in the equation below:

    whereas:

    The hunting behaviour defined in the equation below

    The attaching behaviour represented in the equation below

    3.3.4 MFO

    MFO proposed by Mirjalili [13].Regarding Moth, an insect related to the butterflies’family.It starts carrying out its primary activities at night.The primary concept for MFO comes from investigating the moth cycle when looking for light in nature, that’s called transverse orientation.The moth location is regulated based on a fixed angle of motion concerning the incoming light.Moths travel in a spiral shape and seek to hold angle that similar to the angle of the light produced by man.They update their location for a specific flame according to the following equation:

    Whereas:

    DiEuclidian distance of the i moth for the j flame.It calculated as follows:

    Miis i Moth,Fjis j flame,trefers to any random value that is within the range of [?1, 1].Where the number of the flames inside MFO calculate as follows:

    lstands for the number of iterations,Nstands for the maximum number of flames,Tstands for the maximum number of iterations

    3.3.5 FFA

    FFA created by Yang et al.[34].It based on tropical firefly’s communication behaviour.This behaviour described by using three idealized rules.These rules are:

    (a) Regarding all the fireflies as unisex.

    (b) The brightness of the fireflies is proportionate to their attractiveness.

    (c) The firefly’s brightness is determined and influenced by the environment of the objective functions.

    The movement of a firefly i that is attracted to firefly j represented in the equation below:

    Where:

    (rand ?0.5) is a random number that is within the range of [?0.5 ?0.5],β0set to 1,αis range from [0,1].

    stands for the approximation of the light intensity that got lost due to distance.The distance that is between firefly i and firefly j is calculated through the equation below

    Whereas:

    xi refers to the position of firefly I, xj refers to the position of firefly j.

    3.3.6 WOA

    A WOA created by Mirjalili [14].It imitates the natural behaviour of the humpback whales.The simulation of this algorithm involves three operators simulating the prey search (exploration phase), the encircling prey, and the humpback whales behaviour of bubble-net foraging(exploitation phase).The encircling prey, it represented in the equation below:

    Where:

    The phase of exploitation:This phase is also called the attacking bubble-net.It works with two approaches:Shrinking encircling and spiral updating position.Both shrinking circlings in a spiral updating position are applying in whale movement in the direction of its prey.

    3.3.7 BAT

    BAT proposed by Yang [16].It represents the behaviour of the bats, which is described by employing three idealized rules as follows:

    (a) All the bats use echolocation to predict the distance.They know in some magical manner the difference between food/prey and background barriers.

    (b) A batbiflies randomly at velocityviwith a specific frequencyfminat positionxi, varying wavelengthλand loudnessA0to hunt for prey.The frequency or wavelength of they emit is changed automatically.The pulse emission rate is adjusted r ∈[0,1] based on their target proximity.

    (c) Loudness varies in several aspects.It differs from a large positiveA0to a minimum constant valueAminas it’s suggested by Yang [12].

    Virtual bat movement updates its velocity and position through using the following equations:

    where:

    ? is a random number that is within the range of [0, 1],Xistands for the initial position,Vistands for the velocity,Fistands for theinitialfrequency

    3.4 Feature Selection Model

    The proposed model selects important features as follow:

    (a) Binariz data [?1, 1]

    (b) Define a set of binary individuals.

    (c) Individual and population represented by [1-D, 2-D] array.

    (d) Reduce dataset generated where 1s indicates to feature selected, and 0s mean feature not selected feature.

    (e) Knn classifier used to evaluate the suitable solution and produce fitness value of reducing dataset.

    (f) Finally, repeat these steps to reach the maximum number of iterations.

    3.5 Hybrid Bio-Inspired Metaheuristic Model

    Tab.2 presents the hybridization of bio-inspired metaheuristic algorithms hybridization.

    Table 2:Hybridization of bio-inspired metaheuristic algorithms

    3.6 Machine Learning Classifiers

    Classifier employed for classifying the incoming data as abnormal data or a normal.The present study sheds light on J48, SVM and RF classifiers.These classifiers were select because they are the most famous classifiers used in the literature for network IDS [21,35–39].

    3.6.1 SVM

    SVM is a binary classifier.In SVM, the data gets divided into two class through the use of statistical methods, fixed rules and quadratic equations.The binary classification of the data is carried out through employing a separating hyperplane to maximize the space of the margin based on the functions of the kernel, and the extracted data are stored in the vector, leading to the best solution for the problem.Due to its use for the structural risk minimization method, the SVM has a strong generalization capability.Several previous [21,35,36] studies showed that SVM is a highly effective classifier.

    3.6.2 J48

    The algorithm of J48 is considered a tree classifier that was proposed by Quinlan [40].It employed the improved technique of tree pruning for reducing the number of classificationrelated errors.It follows the following steps for creating a decision tree:

    (a) Selecting the attribute as root that has the enormous gain value.

    (b) Building a branch for any value.

    (c) Repeating the procedure for each branch until the branches have the same class for all the cases.

    Several researchers explored the influence of employing the J48 algorithm for enhancing the accuracy level of IDS [36,37].

    3.6.3 RF

    RF classifier proposed by L.Breiman [41].It is a tree-based ensemble learning classifier [42].It constructed by combining the predictions of various trees, each of which trained in individual.The decision takes by RF classifier is based on most of the trees selected.The RF classifier has several benefits, for instance, it has the chance of over-fitting and it is associated with less duration of time for the training process.It shows a high level of accuracy and it runs efficiently in large databases.Through predicting of the missing data, it makes highly accurate predictions.Several previous studies [38,39], showed that the RF classifier has a significant positive impact on the accuracy of IDS.

    4 Performance Evaluation Metrics

    For assessing the performance efficiency of the proposed model, the following metrics were used:true-positive (TP), true-negative (TN), false-positive (FP) and false-negative (FN)rates [43,44].The confusion matrix presented in Tab.3.Based on these metrics, other metrics are calculated, such as sensitivity, precision, accuracy, F-measure and building time.

    Table 3:Confusion matrix

    Metrics calculated as below:

    5 Discussion and Results

    5.1 First Experiment:Features Selection

    The experiment was done using anaconda python open-source.Tab.4 presents the simulation parameters setting.

    Table 4:Simulation parameters

    Tab.5 presents the results of selected features based on the hybridization of Bio-Inspired metaheuristic algorithms.

    Tab.5 presents the results of selected features based on the hybridization of Bio-Inspired metaheuristic algorithms.Based on Tab.5, it was found that PSO-MVO model reduces the number of features into 12 features.In contrast, MVO-WOA, GWO-MVO and GWO-MFO model reduces the number of features into 14 features, while MFO-PSO and MFO-MVO model reduces the number of features into 12 features.Meanwhile, WOA-GWO minimizes the number of features into 9 features, FFA-MVO model reduces the number of features into 8 features and BAT-GWO reduces features to 18 features.

    Table 5:Selected features-based hybridization model

    Table 5:Continued

    5.2 Second Experiment:Classification

    The hybrid model in Tab.5 evaluated based on three ML classifiers.These classifiers are J48,SVM and RF classifier.The results of the J48, SVM and RF classifier shown in Tab.6.

    Table 6:Results of J48, SVM and RF

    Based on obtained results from Tab.6, it was found that PSO-BAT model with 19 features outperformed other PSO combination in terms of accuracy, sensitivity and F-measure, concerning J48, SVM and RF classifiers.In terms of building time, PSO-BAT required less time to compare all features and J48 needed the lowest time than SVM and RF.Whilst MVO-BAT model with 24 features outperformed other MVO combination and gave the same accuracy, sensitivity and F-measure of all features for all mentioned classifiers.MVO-BAT model needed less building time to compare all features and J48 needed the lowest time compared to the other classifiers.Regarding GWO combination model, the GWO-PSO and GWO-WOA models with 17 features performed better than other GWO combination and required less building time of all features, GWO-PSO and GWO-WOA models produced close accuracy, sensitivity and F-measure to all features.J48 again required less time than SVM and RF.In the case of the MFO combination, the MFO-WOA model reduces feature to 15, it outperformed other MFO combination with respect to accuracy,sensitivity and F-measure.The time required to build MFO-WOA model with J48 classifier is less than SVM and RF.The WOA-BAT model reduces feature to 19, it produces better performance compare to other WOA combination in terms of accuracy, sensitivity and F-measure.J48 needed less time to build WOA-BAT model than SVM and RF.Regarding FFA combination, the FFAGWO with 15 features has the best performance among other FFA combination concerning the accuracy, sensitivity and F-measure for J48, SVM and RF classifiers.The FFA-GWO model builds takes less time compare to SVM and RF.Finally, BAT-PSO model reduces features to 22 and shows the best results among other BAT combination.Again J48 shows a higher efficiency relative to SVM and RF in term of needed time to build the model.

    My data suggest that the proposed hybrid models improve network IDS by reducing features and time required to build a detection model.In addition to that my results show the dominance of J48 on SVM and RF in term of the required time.Concerning the features reduction and the classification, results show that the MFO-WOA and FFA-GWO models reduce features to 15 features with close accuracy, sensitivity and F-measure of all features, whereas MVO-BAT model reduces features to 24 features with the same accuracy, sensitivity and F-measure of all features for all classifiers.

    6 Conclusion

    Using metaheuristic algorithms can help to find optimal features sets.Hybridization of metaheuristic algorithms can reduce the number of features and improve the accuracy of the classification process with less time.Therefore, In this study, a hybrid model based on metaheuristic algorithms is developed to reduce selected features for network IDS.PSO, MVO, GWO, MFO,WOA, FFA and BAT algorithms used by this study.The proposed hybrid model was evaluated using UNSW-NB15 dataset and J48, SVM, RF classifier.The experiment conducted throughout two phases.The first phase aims to choose features through using Metaheuristic algorithm and the second phase is represented in evaluating proposed hybrid models based on R48, SVM and RF classifiers.The results obtained of the first phase showed that proposed hybrid models reduce the number of features.The results of the second phase show the dominance of J48 on SVM and RF in terms of required time to build the model.MFO-WOA and FFA-GWO models reduce features to 15 features with good classification rate.Finally, the MVO-BAT model reduces features to 24 features with the same results of all features.The proposed hybrid model is capable to detect generic attack more effectively.

    Funding Statement:This work was funded by The World Islamic Sciences and Education University.

    Conficts of Interest:The author declares that they have no conflicts of interest.

    午夜激情久久久久久久| 人人妻,人人澡人人爽秒播| 欧美黑人精品巨大| 国产伦理片在线播放av一区| 国产黄频视频在线观看| 国产片内射在线| 我要看黄色一级片免费的| 黄色 视频免费看| 日韩欧美一区二区三区在线观看 | 国产精品一区二区免费欧美 | tocl精华| 人人妻人人添人人爽欧美一区卜| 亚洲熟女毛片儿| 天天影视国产精品| 中文字幕人妻丝袜制服| 成人国产av品久久久| 午夜日韩欧美国产| 纯流量卡能插随身wifi吗| 国产欧美日韩一区二区三 | 啦啦啦在线免费观看视频4| 亚洲欧美激情在线| 亚洲精品一二三| 99国产精品一区二区蜜桃av | 男女边摸边吃奶| 老司机午夜福利在线观看视频 | 亚洲欧美精品综合一区二区三区| 国产xxxxx性猛交| 国产男女超爽视频在线观看| 热99re8久久精品国产| 精品一区在线观看国产| 亚洲熟女毛片儿| 久久亚洲精品不卡| 91av网站免费观看| 极品人妻少妇av视频| 日日摸夜夜添夜夜添小说| 在线观看www视频免费| 80岁老熟妇乱子伦牲交| 视频在线观看一区二区三区| 9色porny在线观看| 婷婷色av中文字幕| 精品人妻熟女毛片av久久网站| 久久久久久久久久久久大奶| 亚洲欧洲精品一区二区精品久久久| 欧美国产精品va在线观看不卡| 精品亚洲成a人片在线观看| 啦啦啦 在线观看视频| 91国产中文字幕| 欧美另类一区| 一区二区三区激情视频| 人妻一区二区av| 免费高清在线观看视频在线观看| 男女高潮啪啪啪动态图| 欧美国产精品va在线观看不卡| 黑人巨大精品欧美一区二区蜜桃| 久久中文字幕一级| av网站在线播放免费| 啦啦啦中文免费视频观看日本| 妹子高潮喷水视频| 五月开心婷婷网| av福利片在线| 亚洲欧美一区二区三区久久| 欧美精品高潮呻吟av久久| 国产精品久久久人人做人人爽| 亚洲黑人精品在线| 国产高清国产精品国产三级| 婷婷色av中文字幕| 五月开心婷婷网| 777米奇影视久久| 国产成人免费无遮挡视频| 免费在线观看影片大全网站| 色94色欧美一区二区| 视频区图区小说| 少妇猛男粗大的猛烈进出视频| 麻豆乱淫一区二区| 国产欧美亚洲国产| 性少妇av在线| 色婷婷久久久亚洲欧美| 成年人午夜在线观看视频| 我要看黄色一级片免费的| 国产免费一区二区三区四区乱码| 亚洲精品国产区一区二| 日韩欧美一区二区三区在线观看 | 蜜桃在线观看..| 又大又爽又粗| 男女高潮啪啪啪动态图| 12—13女人毛片做爰片一| 一二三四社区在线视频社区8| a在线观看视频网站| 久久久久精品国产欧美久久久 | 纵有疾风起免费观看全集完整版| 91大片在线观看| 激情视频va一区二区三区| 99精品欧美一区二区三区四区| 波多野结衣一区麻豆| 黄色怎么调成土黄色| 国产高清视频在线播放一区 | 岛国在线观看网站| 国产精品久久久人人做人人爽| 欧美亚洲 丝袜 人妻 在线| 淫妇啪啪啪对白视频 | 亚洲人成电影观看| 美女福利国产在线| 巨乳人妻的诱惑在线观看| 欧美精品人与动牲交sv欧美| 精品一区二区三区av网在线观看 | 天天躁狠狠躁夜夜躁狠狠躁| 午夜福利在线观看吧| 制服人妻中文乱码| www.自偷自拍.com| 大型av网站在线播放| www.熟女人妻精品国产| 狠狠精品人妻久久久久久综合| 亚洲av电影在线进入| 一本—道久久a久久精品蜜桃钙片| 在线十欧美十亚洲十日本专区| 午夜免费观看性视频| 一区二区三区精品91| av国产精品久久久久影院| 中文字幕制服av| 国产精品.久久久| 亚洲国产av新网站| 欧美日韩精品网址| 美女高潮到喷水免费观看| 精品一区二区三区四区五区乱码| 手机成人av网站| kizo精华| 菩萨蛮人人尽说江南好唐韦庄| 人妻人人澡人人爽人人| 黄片小视频在线播放| 最黄视频免费看| 在线观看舔阴道视频| 天天躁狠狠躁夜夜躁狠狠躁| 欧美精品一区二区大全| 一级毛片女人18水好多| 国产xxxxx性猛交| a在线观看视频网站| 亚洲色图综合在线观看| 美女中出高潮动态图| 国产成人影院久久av| 日日夜夜操网爽| 十八禁高潮呻吟视频| 男女免费视频国产| 国精品久久久久久国模美| 丝袜喷水一区| 亚洲av国产av综合av卡| 国产亚洲精品一区二区www | 老司机在亚洲福利影院| avwww免费| 国产三级黄色录像| 99久久精品国产亚洲精品| 女性被躁到高潮视频| 亚洲第一青青草原| 久久久久久亚洲精品国产蜜桃av| 欧美日韩黄片免| 黑丝袜美女国产一区| www.精华液| 日韩中文字幕欧美一区二区| 亚洲九九香蕉| 精品国产乱子伦一区二区三区 | 国产人伦9x9x在线观看| 亚洲全国av大片| 国产伦人伦偷精品视频| 黑人欧美特级aaaaaa片| 国产日韩欧美在线精品| 操出白浆在线播放| 亚洲专区国产一区二区| 人人妻人人澡人人爽人人夜夜| 色综合欧美亚洲国产小说| 韩国高清视频一区二区三区| 免费女性裸体啪啪无遮挡网站| 伦理电影免费视频| 男人舔女人的私密视频| 汤姆久久久久久久影院中文字幕| 国产精品久久久久成人av| 在线永久观看黄色视频| 女人精品久久久久毛片| 在线观看www视频免费| 人人妻人人澡人人爽人人夜夜| 国产区一区二久久| 国产成人欧美| 人成视频在线观看免费观看| 日日夜夜操网爽| 国产精品久久久av美女十八| 亚洲精品久久久久久婷婷小说| xxxhd国产人妻xxx| 人妻 亚洲 视频| 69精品国产乱码久久久| 美女国产高潮福利片在线看| 国产一区二区三区在线臀色熟女 | 老汉色av国产亚洲站长工具| av片东京热男人的天堂| 777久久人妻少妇嫩草av网站| 国产一区二区三区综合在线观看| 亚洲精品国产一区二区精华液| 精品国产超薄肉色丝袜足j| 国产男女超爽视频在线观看| 9色porny在线观看| h视频一区二区三区| 麻豆国产av国片精品| 无限看片的www在线观看| 国产主播在线观看一区二区| 国产麻豆69| 精品福利观看| av有码第一页| av网站在线播放免费| 女人被躁到高潮嗷嗷叫费观| 成年人黄色毛片网站| 大片免费播放器 马上看| 在线永久观看黄色视频| 大码成人一级视频| 狠狠精品人妻久久久久久综合| 永久免费av网站大全| 精品一区二区三区av网在线观看 | 精品视频人人做人人爽| 欧美精品一区二区免费开放| 国产成人欧美在线观看 | 黄片小视频在线播放| 精品福利永久在线观看| 极品人妻少妇av视频| 中文字幕高清在线视频| 999久久久精品免费观看国产| 久热这里只有精品99| av网站免费在线观看视频| 各种免费的搞黄视频| 一级毛片精品| 啦啦啦啦在线视频资源| 久久精品熟女亚洲av麻豆精品| 亚洲欧美精品自产自拍| 欧美黄色淫秽网站| 欧美乱码精品一区二区三区| 男女午夜视频在线观看| 久久中文字幕一级| 亚洲国产欧美在线一区| 黑人巨大精品欧美一区二区蜜桃| 亚洲色图 男人天堂 中文字幕| 久久精品亚洲熟妇少妇任你| 久久久国产精品麻豆| 正在播放国产对白刺激| 巨乳人妻的诱惑在线观看| 99精品久久久久人妻精品| 国产精品久久久久久精品电影小说| 国产一区二区激情短视频 | 啦啦啦 在线观看视频| 国产成人欧美在线观看 | 建设人人有责人人尽责人人享有的| 俄罗斯特黄特色一大片| 亚洲精品av麻豆狂野| 精品国产一区二区三区四区第35| 18禁黄网站禁片午夜丰满| 一二三四在线观看免费中文在| 老司机影院毛片| 91大片在线观看| 国产在线观看jvid| 极品人妻少妇av视频| 在线观看www视频免费| 高清黄色对白视频在线免费看| 中文字幕av电影在线播放| 欧美午夜高清在线| 亚洲avbb在线观看| 国产一区有黄有色的免费视频| 欧美人与性动交α欧美精品济南到| 欧美激情久久久久久爽电影 | 国产极品粉嫩免费观看在线| 精品少妇一区二区三区视频日本电影| 欧美精品一区二区大全| 在线 av 中文字幕| 国产免费福利视频在线观看| 亚洲中文日韩欧美视频| 在线天堂中文资源库| 亚洲欧洲日产国产| 丁香六月天网| 国产成人一区二区三区免费视频网站| 美女视频免费永久观看网站| 一区二区三区精品91| a级毛片黄视频| 99精国产麻豆久久婷婷| 国产成人免费无遮挡视频| a级片在线免费高清观看视频| 一本色道久久久久久精品综合| 老熟妇仑乱视频hdxx| 久久天躁狠狠躁夜夜2o2o| 天天躁日日躁夜夜躁夜夜| 国产在线视频一区二区| 亚洲欧美日韩高清在线视频 | 国产亚洲精品久久久久5区| 99热网站在线观看| cao死你这个sao货| 美女扒开内裤让男人捅视频| 国产亚洲av高清不卡| 国产三级黄色录像| 久久久久久亚洲精品国产蜜桃av| 日韩 亚洲 欧美在线| 亚洲精品国产精品久久久不卡| 可以免费在线观看a视频的电影网站| 777久久人妻少妇嫩草av网站| 国产在线免费精品| 操美女的视频在线观看| 国产老妇伦熟女老妇高清| 久久精品aⅴ一区二区三区四区| 欧美精品人与动牲交sv欧美| 丁香六月欧美| 黄色视频不卡| 亚洲精品av麻豆狂野| 人妻一区二区av| 男女高潮啪啪啪动态图| 另类亚洲欧美激情| 国产片内射在线| avwww免费| 狂野欧美激情性xxxx| 亚洲伊人色综图| 99精品久久久久人妻精品| 在线观看www视频免费| 中国美女看黄片| 在线 av 中文字幕| 69av精品久久久久久 | 动漫黄色视频在线观看| 老鸭窝网址在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 久久精品国产亚洲av高清一级| 91九色精品人成在线观看| 性高湖久久久久久久久免费观看| 啦啦啦中文免费视频观看日本| 免费在线观看完整版高清| 欧美少妇被猛烈插入视频| 欧美av亚洲av综合av国产av| 精品久久蜜臀av无| 日韩视频在线欧美| 国产亚洲欧美精品永久| 精品视频人人做人人爽| 夫妻午夜视频| 日韩欧美一区二区三区在线观看 | 视频在线观看一区二区三区| 黑人巨大精品欧美一区二区mp4| 在线看a的网站| 欧美 亚洲 国产 日韩一| 亚洲性夜色夜夜综合| 精品高清国产在线一区| 日韩视频一区二区在线观看| 久久精品国产综合久久久| 成人亚洲精品一区在线观看| 精品卡一卡二卡四卡免费| 亚洲成av片中文字幕在线观看| 亚洲色图 男人天堂 中文字幕| 国产亚洲精品久久久久5区| 美女扒开内裤让男人捅视频| 亚洲精品第二区| 啦啦啦 在线观看视频| 最新在线观看一区二区三区| 水蜜桃什么品种好| 国产免费现黄频在线看| 国产精品 欧美亚洲| 亚洲国产欧美网| 搡老岳熟女国产| 午夜精品久久久久久毛片777| 王馨瑶露胸无遮挡在线观看| 国产精品香港三级国产av潘金莲| 中国美女看黄片| 一级毛片女人18水好多| 欧美精品高潮呻吟av久久| 免费看十八禁软件| 国产免费视频播放在线视频| 十八禁高潮呻吟视频| 黄频高清免费视频| 91大片在线观看| 人人妻,人人澡人人爽秒播| 人成视频在线观看免费观看| 啦啦啦中文免费视频观看日本| 国产亚洲精品第一综合不卡| 十八禁人妻一区二区| 丁香六月欧美| 男人添女人高潮全过程视频| 亚洲一卡2卡3卡4卡5卡精品中文| 午夜91福利影院| 免费在线观看完整版高清| 操美女的视频在线观看| 亚洲欧美精品综合一区二区三区| 亚洲人成77777在线视频| 欧美另类亚洲清纯唯美| 另类精品久久| 狠狠狠狠99中文字幕| 中文字幕av电影在线播放| 他把我摸到了高潮在线观看 | 十八禁人妻一区二区| 搡老熟女国产l中国老女人| a级片在线免费高清观看视频| 最新在线观看一区二区三区| 999久久久精品免费观看国产| 日本a在线网址| 人人妻人人添人人爽欧美一区卜| 亚洲第一av免费看| 男人操女人黄网站| 五月天丁香电影| 国产精品一区二区在线观看99| 制服人妻中文乱码| 天天躁狠狠躁夜夜躁狠狠躁| 久9热在线精品视频| 一二三四在线观看免费中文在| 丝袜美腿诱惑在线| 久久人人爽av亚洲精品天堂| 国产野战对白在线观看| 欧美亚洲 丝袜 人妻 在线| 女人爽到高潮嗷嗷叫在线视频| 中文字幕人妻丝袜一区二区| 亚洲精品乱久久久久久| 欧美日韩黄片免| 日本a在线网址| 中文字幕最新亚洲高清| 老司机靠b影院| 精品国产一区二区三区久久久樱花| 成人国语在线视频| 蜜桃国产av成人99| 国产福利在线免费观看视频| 亚洲国产欧美网| 日本精品一区二区三区蜜桃| 丰满人妻熟妇乱又伦精品不卡| 欧美av亚洲av综合av国产av| 久久九九热精品免费| 国产亚洲精品一区二区www | 黄色a级毛片大全视频| 新久久久久国产一级毛片| 最新的欧美精品一区二区| 一区二区三区乱码不卡18| 国产又色又爽无遮挡免| 欧美日韩亚洲国产一区二区在线观看 | 国产精品免费视频内射| 成年人免费黄色播放视频| 18禁裸乳无遮挡动漫免费视频| 精品福利观看| 亚洲欧美色中文字幕在线| 香蕉丝袜av| 性少妇av在线| 亚洲中文日韩欧美视频| 亚洲视频免费观看视频| 国产区一区二久久| 午夜两性在线视频| 国产精品一区二区在线观看99| 国产亚洲欧美精品永久| 亚洲精品在线美女| 天天添夜夜摸| 久久午夜综合久久蜜桃| 国产在线一区二区三区精| 亚洲欧美精品自产自拍| 久久影院123| 亚洲少妇的诱惑av| 免费看十八禁软件| 精品卡一卡二卡四卡免费| 国产不卡av网站在线观看| 首页视频小说图片口味搜索| 美女脱内裤让男人舔精品视频| 一本—道久久a久久精品蜜桃钙片| 成人av一区二区三区在线看 | 日韩免费高清中文字幕av| 捣出白浆h1v1| 国产高清videossex| 男女无遮挡免费网站观看| 首页视频小说图片口味搜索| 欧美亚洲日本最大视频资源| 欧美精品一区二区大全| 精品国产国语对白av| 久久久久精品人妻al黑| 午夜久久久在线观看| 999久久久国产精品视频| 天天操日日干夜夜撸| 9191精品国产免费久久| 欧美黄色片欧美黄色片| 91大片在线观看| 国产欧美日韩一区二区三 | 中文字幕高清在线视频| 久久av网站| 午夜激情久久久久久久| 久久久久久久国产电影| 亚洲人成电影观看| 又紧又爽又黄一区二区| 中文字幕另类日韩欧美亚洲嫩草| 淫妇啪啪啪对白视频 | 精品国产乱码久久久久久男人| 在线观看免费高清a一片| 亚洲成人国产一区在线观看| 伦理电影免费视频| 国产淫语在线视频| 婷婷丁香在线五月| 国产在线观看jvid| 久久久久视频综合| 国产亚洲av片在线观看秒播厂| 午夜激情久久久久久久| 国产成人系列免费观看| 十分钟在线观看高清视频www| 亚洲精品一区蜜桃| 精品国产一区二区久久| 亚洲精品国产av蜜桃| 最黄视频免费看| 亚洲国产成人一精品久久久| 91国产中文字幕| 婷婷成人精品国产| 青草久久国产| 亚洲熟女毛片儿| 最新的欧美精品一区二区| 少妇 在线观看| 国产福利在线免费观看视频| 国产99久久九九免费精品| 考比视频在线观看| 91麻豆av在线| 久热这里只有精品99| 一区二区三区四区激情视频| 国产福利在线免费观看视频| 亚洲国产欧美日韩在线播放| 精品欧美一区二区三区在线| 男女床上黄色一级片免费看| 亚洲欧美清纯卡通| 久久精品亚洲av国产电影网| 久久久国产欧美日韩av| 搡老乐熟女国产| 女性生殖器流出的白浆| 9热在线视频观看99| 亚洲一卡2卡3卡4卡5卡精品中文| 啦啦啦免费观看视频1| 黄片播放在线免费| 国产伦人伦偷精品视频| 亚洲精品中文字幕在线视频| 少妇的丰满在线观看| 一本一本久久a久久精品综合妖精| 午夜91福利影院| 又大又爽又粗| 男女午夜视频在线观看| 久久国产精品人妻蜜桃| 黄色视频,在线免费观看| 国产精品免费视频内射| 国产精品秋霞免费鲁丝片| 两个人免费观看高清视频| 国产av国产精品国产| 亚洲av日韩在线播放| 国产成人欧美| 欧美另类亚洲清纯唯美| 亚洲精品国产精品久久久不卡| 一边摸一边抽搐一进一出视频| 美女主播在线视频| 亚洲精品久久成人aⅴ小说| 黄色毛片三级朝国网站| 最近最新免费中文字幕在线| 好男人电影高清在线观看| svipshipincom国产片| 午夜福利免费观看在线| 亚洲欧美日韩另类电影网站| 两人在一起打扑克的视频| 黄片小视频在线播放| 亚洲专区字幕在线| 成人黄色视频免费在线看| 国产真人三级小视频在线观看| 啦啦啦中文免费视频观看日本| 99国产精品一区二区蜜桃av | 777久久人妻少妇嫩草av网站| 一进一出抽搐动态| 久久久欧美国产精品| 欧美乱码精品一区二区三区| 中文欧美无线码| 国产xxxxx性猛交| 中文字幕av电影在线播放| 电影成人av| 国产在线一区二区三区精| 久久影院123| 国产伦人伦偷精品视频| 少妇粗大呻吟视频| svipshipincom国产片| www.av在线官网国产| 一边摸一边抽搐一进一出视频| 一进一出抽搐动态| 蜜桃在线观看..| 高清欧美精品videossex| 一区在线观看完整版| 日韩视频在线欧美| 中文字幕高清在线视频| 欧美亚洲 丝袜 人妻 在线| 少妇精品久久久久久久| 日日夜夜操网爽| 男女边摸边吃奶| 精品亚洲成国产av| 免费在线观看日本一区| 永久免费av网站大全| 飞空精品影院首页| 自拍欧美九色日韩亚洲蝌蚪91| 欧美日本中文国产一区发布| 男人爽女人下面视频在线观看| 精品国产乱码久久久久久小说| 80岁老熟妇乱子伦牲交| 人妻人人澡人人爽人人| 69精品国产乱码久久久| 国产免费av片在线观看野外av| 人妻人人澡人人爽人人| 久9热在线精品视频| 80岁老熟妇乱子伦牲交| 国产成+人综合+亚洲专区| 午夜精品久久久久久毛片777| 精品人妻在线不人妻| 美国免费a级毛片| 久久香蕉激情| 国产又色又爽无遮挡免| 亚洲va日本ⅴa欧美va伊人久久 | 性色av一级| 欧美另类亚洲清纯唯美| 黑丝袜美女国产一区| 999精品在线视频| svipshipincom国产片| 91av网站免费观看| 三上悠亚av全集在线观看| 欧美大码av| 永久免费av网站大全| 十八禁高潮呻吟视频| 亚洲精品久久午夜乱码| 一级片免费观看大全| 波多野结衣av一区二区av| 精品国内亚洲2022精品成人 | 欧美黄色片欧美黄色片| 亚洲午夜精品一区,二区,三区| 免费不卡黄色视频| 在线天堂中文资源库|