Abstract
In recent years, frequent network attacks have seriously threatened the interests and security of humankind. To address this threat, many detection methods have been studied, some of which have achieved good results. However, with the development of network interconnection technology, massive amounts of network data have been produced, and considerable redundant information has been generated. At the same time, the frequently changing types of cyberattacks result in great difficulty collecting samples, resulting in a serious imbalance in the sample size of each attack type in the dataset. These two problems seriously reduce the robustness of existing detection methods, and existing research methods do not provide a good solution. To address these two problems, we define an unbalanced index and an optimal feature index to directly reflect the performance of a detection method in terms of overall accuracy, feature subset optimization, and detection balance. Inspired by DNA computing, we propose intelligent attack detection based on DNA computing (ADDC). First, we design a set of regular encoding and decoding features based on DNA sequences and obtain a better subset of features through biochemical reactions. Second, nondominated ranking based on reference points is used to select individuals to form a new population to optimize the detection balance. Finally, a large number of experiments are carried out on four datasets to reflect real-world cyberattack situations. Experimental results show that compared with the most recent detection methods, our method can improve the overall accuracy of multiclass classification by up to 10%; the imbalance index decreased by 0.5, and 1.5 more attack types were detected on average; and the optimal index of the feature subset increased by 83.8%.
- [1] . 2022. Deep learning approaches for detecting DDoS attacks: A systematic review. Soft Computing. 1–37.Google Scholar
- [2] 2022. Review and consensus recommendations on clinical APT-weighted imaging approaches at 3T: Application to brain tumors. Magnetic Resonance in Medicine 88 (2022), 546--574.Google Scholar
Cross Ref
- [3] . 2015. An emerging US (and world) threat: Cities wide open to cyber attacks. Securing Smart Cities 17 (2017), 137–151.Google Scholar
- [4] . 2015. Cybersecurity in the energy sector: Are we really prepared. Journal of Energy & Natural Resources Law 39, 3 (2015), 265–270.Google Scholar
Cross Ref
- [5] . 2021. Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Computer Networks 188 (2021), 107840.Google Scholar
- [6] . 2021. Classification of Cyber Security Threats on Mobile Devices and Applications. Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Springer, Cham, 107–123.Google Scholar
- [7] . 2021. Improving the accuracy of network intrusion detection with causal machine learning. Security and Communication Networks, Vol. 2021,
Article ID 8986243 , 18 pages.Google Scholar - [8] 2003. A new approach to intrusion detection based on rough set theory. Chinese Journal of Computers.Google Scholar
- [9] . 2020. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Transactions on Network and Service Management 18, 2 (2020).Google Scholar
Cross Ref
- [10] 2021. A survey on network intrusion detection based on deep learning. Frontiers of Data and Computing 3, 3 (2021), 59–74.Google Scholar
- [11] . 2021. I-SiamIDS: An improved Siam-IDS for handling class imbalance in network-based intrusion detection systems. Applied Intelligence 51, 2 (2021), 1133–1151.Google Scholar
Digital Library
- [12] Soon Hui Fern, Amiza Amir, and Saidatul Norlyana Azemi. 2022. Multi-class imbalanced classification problems in network attack detections. In Proceedings of the 6th International Conference on Electrical, Control and Computer Engineering. Springer, Singapore, 1057--1069.Google Scholar
- [13] . 2022. Generating a benchmark cyber multi-step attacks dataset for intrusion detection. Journal of Intelligent & Fuzzy Systems. Preprint, 1–15.Google Scholar
- [14] . 2022. A bio-inspired hybrid deep learning model for network intrusion detection. Knowledge-Based Systems, 238 (2022), 107894.Google Scholar
- [15] . 2020. An efficient feature selection-based Bayesian and Rough set approach for intrusion detection. Applied Soft Computing 87,
Article ID105980 .Google Scholar - [16] . 2020. DNAVS: An algorithm based on DNA-computing and vortex search algorithm for task scheduling problem. Evolutionary Intelligence 14, 4 (2020), 1763–1773.Google Scholar
Cross Ref
- [17] . 2020. DNA computing-origination, motivation and goals. International Journal of Unconventional Computing 15, 3 (2020).Google Scholar
- [18] 2020. Task allocation for multi-agent systems based on distributed many-objective evolutionary algorithm and greedy algorithm. IEEE Access 8 (2020), 19306–19318.Google Scholar
- [19] . 2018. An improved MOEA/D based on reference distance for software project portfolio optimization. Complexity (2018), 1–16.Google Scholar
- [20] . 2028. Toward generating a new intrusion detection dataset and intrusion traffic characterization. International Conference on Information Systems Security and Privacy. 1 (2028), 108–116.Google Scholar
- [21] . 2021. DNS covert channel detection method using the LSTM model. Computers & Security. 104 (2021), 102095.Google Scholar
- [22] 2020. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications 50 (2020), 102419.Google Scholar
- [23] 2020. Model of the intrusion detection system based on the integration of spatial-temporal features. Computers & Security. 89, 101681.Google Scholar
- [24] . 2028. LA-GRU: Building combined intrusion detection model based on imbalanced learning and gated recurrent unit neural network. Security and Communication Networks (2018), 1–13.Google Scholar
- [25] Improved resampling algorithm through a modified oversampling approach based on spectral clustering and SMOTE. In Microsystem Technologies. 1–9.Google Scholar
- [26] . 2020. Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 99 (2020), 1–1.Google Scholar
- [27] . 2018. Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic. IEEE Sensors Letters 3, 1 (2018), 1–4.Google Scholar
Cross Ref
- [28] . 2020. Siam-IDS: Handling class imbalance problem in intrusion detection systems using Siamese neural network. Procedia Computer Science 171 (2020), 780–789.Google Scholar
- [29] . 2005. DNA Computing: New Computing Paradigms. Springer Science & Business Media.Google Scholar
- [30] . 2001. DNA Computing and Soft Computing. Acta Simulata Systematica Sinica.Google Scholar
- [31] 2018. A cloud model-based DNA genetic algorithm for numerical optimization problems. Future Generation Computer Systems 81 (2018), 465–477.Google Scholar
- [32] . 2019. Optimal fitness aware cloud service composition using an adaptive genotypes evolution based genetic algorithm. Future Generation Computer Systems 94 (2019), 185–198.Google Scholar
- [33] . 2015. Comparative review of selection techniques in genetic algorithm. 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 515–519.Google Scholar
Cross Ref
- [34] L. Y. Chuang, C. H. Yang, and K. C. Wu, et al. 2011. A hybrid feature selection method for DNA microarray data. Computers in Biology and Medicine 41, 4 (2011), 228--237.Google Scholar
- [35] . 2014. Multi-objective optimization. In Search Methodologies. Springer, Boston, MA, (2014), 403–449.Google Scholar
Cross Ref
- [36] . 2014. An evolutionary many-objective optimization algorithm using reference-point-based non-dominated sorting approach, Part I: Solving problems with box constraints. IEEE Transactions on Evolutionary Computation 18, 4 (2014), 577–601.Google Scholar
Cross Ref
- [37] . 2002. Fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation 6, 2 (2002), 182–197.Google Scholar
Digital Library
- [38] . 2020. A GPU fully vectorized approach to accelerate performance of NSGA-2 based on stochastic non-domination sorting and grid-crowding. Applied Soft Computing 88 (2020), 106047.Google Scholar
- [39] . 2020. Multi-objective wrapper-based feature selection using binary cuckoo optimisation algorithm: A comparison between NSGAII and NSGAIII. The International Conference on Emerging Applications and Technologies for Industry 4.0. Springer, Cham, 124–136.Google Scholar
- [40] Yingying Zhu et al. 2017. An improved NSGA-III algorithm for feature selection used in intrusion detection. Knowledge-Based Systems 116 (2017), 74--85.Google Scholar
- [41] . 1994. Molecular computation of solutions to combinatorial problems. Science 266, 5187 (1994), 1021–1024.Google Scholar
Cross Ref
- [42] Jianhua Xiao et al. 2009. A hybrid quantum chaotic swarm evolutionary algorithm for DNA encoding. Computers & Mathematics with Applications 57, 11--12 (2009), 1949--1958.Google Scholar
- [43] . 2012. Random search for hyper-parameter optimization. Journal of Machine Learning Research 13, 1 (2012), 281–305.Google Scholar
Digital Library
- [44] . 1998. Normal-boundary intersection: A new method for generating the Pareto surface in nonlinear multicriteria optimization problems. SIAM Journal on Optimization 8, 3 (1998), 631–657.Google Scholar
Digital Library
- [45] . 2019. Comparison of three evolutionary algorithms for the optimization of building design. Applied Mechanics and Materials 887 (2019), 140–147.Google Scholar
- [46] 2019. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. 2019 International Carnahan Conference on Security Technology (ICCST’19). 1–8.Google Scholar
- [47] . 2020. Detection of DoH tunnels using time-series classification of encrypted traffic. 2020. 5th IEEE Cyber Science and Technology Congress, Calgary, Alberta, Canada.Google Scholar
- [48] . 2013. Comparison study for intrusion database (KDD99, NSL-KDD) based on self-organization map (SOM) artificial neural network. Journal of Engineering Science and Technology 8, 1 (2013), 107–119.Google Scholar
- [49] Systematic ensemble model selection approach for educational data mining. 2020. Knowledge-Based Systems 200 (2020), 105992.Google Scholar
Cross Ref
- [50] . 2018. Feature selection: A data perspective. ACM Computing Surveys 50, 6 (2018), 94.Google Scholar
Digital Library
Index Terms
Towards Intelligent Attack Detection Using DNA Computing
Recommendations
Towards DDoS detection mechanisms in Software-Defined Networking
AbstractSoftware-Defined Networking (SDN) is widely considered as one of the next generation network architecture. However, SDN faces with a series of issues which restraint its development and application, where the security is one of the ...
Attack Detection Application with Attack Tree for Mobile System using Log Analysis
AbstractRecently, the use of smart phones has greatly increased because of the development of cheap high-performance hardware. The biggest threat to a smart phone user is the loss of his/her personal information by an attacker. To protect a user’s ...
Parameter manipulation attack prevention and detection by using web application deception proxy
IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and CommunicationThe attack abusing web application vulnerabilities are currently classified into traditional attack threats. However, security breaches by web application attacks are still reported via mass media. Although the vulnerabilities in popular products such ...






Comments