A Metaheuristic Optimization Approach-Based Anomaly Detection With Lasso Regularization

A Metaheuristic Optimization Approach-Based Anomaly Detection With Lasso Regularization

Vivek Kumar Verma, Payal Garg, Pradeep Kumar Tiwari, Tarun K. Jain
Copyright: © 2022 |Pages: 11
DOI: 10.4018/IJSI.297917
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The paper here suggests a new intrusion detection method that is applied using an improved Lasso Regularization Metaheuristic Optimization. A comparison with other metaheuristic algorithms used to test the current method alongside the associated works is part of the proposed analysis herein. Because of the high processing capacity, network traffic in the intrusion detection system (IDS) has erratic behavior. The size of the device increases; the vast number of features must then be explored. However, the undesirable features and (or) any noisy data have a significant effect on the performance of the IDSs. Lasso regression implements L1 regularization, applying a penalty proportional to the absolute value the coefficient magnitude. Sparse formulas with few coefficients can result in this form of regularization; certain coefficients can become negative and be removed from the model. The algorithm for particle swarm optimization (PSO) is added to the selective features that increased the IDS' detection rate and accuracy.
Article Preview
Top

Introduction

The rapid propagation of processer networks has transformed risk of network safety. An easy-to-access state weakens the computer network against numerous threats after hackers. The intimidations to networks are numerous as well as destructive. Investigators have established intrusion detection systems (IDS) that can detect attacks in a no. of available environments (Sahar et al., n.d.). There are no boundaries of methods aimed at detecting abuse and finding fault. Many of the proposed technologies are complementary because some approaches to different environments perform better than others. The intimidations to networks are numerous as well as destructive. Researchers have developed Intrusion Detection Systems (IDS) that are accomplished incensing occurrences in a variety of environments. There are no boundaries of methods aimed at detecting abuse and finding fault. Many of the proposed technologies are complementary because some approaches to different environments achievement proved than others. IDS does this via gathering data after network as well as analyzing the packets that are transmitted within the system. Nonetheless, IDSs do not have a function in reply to a common attack. IDSs usually require that the administrator be notified if there is an intrusion. IDSs consume several approaches aimed at detecting occurrences. The succeeding procedure is instances of IDS operations to detect infiltration (Kowsari et al. 2019; Bhosle, 2010):

  • 1.

    Monitoring as well as analyzing NW accomplishments

  • 2.

    Discovery susceptible fragments into NW

  • 3.

    integrity testing of delicate& significant information

Top

Literature Review

Network traffic information is an Intrusion Detecting System (IDS) that is continuously bigger with ineffective data, which reduces efficiency. To solve this problem, we need a feature that uses large amounts of data. Extraction techniques linear differential analysis is most commonly used in this field, which is always singular, and it is used in class and scatter in the classroom. In this letter, optimal medium PCA can be utilized as a preset before the LDA. Many experiments on KDDcup99 as well as NSL-KDD indicate the superiority of suggested technology (Berry & Linoff,, 1997).

Authors solve both of these problems as well as apply our model to detect online discrepancies consuming FPGA. In order to solve 1st problem, we propose a brief training model aimed at Contrast Divergence Algorithm (CD) in Deep Trust Network (DBN). Due dynamically adjusting the training vector according to the feedback and rebuilding error by free energy, allowing for better generalization of the goal. In order to resolve later problem, we propose a Hybrid-Stochastic Dynamic-Fixed-Point (HSDFP) method that provides a training environment with a high reduction in FPGA calculation, area,besides power. Our basis enables the DBN structure to detect as well as detect online attacks. Therefore, the network may collect resourcefulno.s. Avoid training samples as well as fittings. We show that our proposed method is increasingly integrated with the most advanced deep learning methods; and FPGA Application is a quick computational speed of 0.008 meters, with 37G Ops / CPU, GPU, as well as 16 bit Fixed Point Arithmetic with WR 95% and 95.4%, Also 97.9% Benchmark Dataset FPGA Quality Degradation: MNIST, NSL-KDD, as well as Kyoto Datasets (Lu, Setiono, & Liu, 1996).

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024)
Volume 11: 1 Issue (2023)
Volume 10: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2021)
Volume 8: 4 Issues (2020)
Volume 7: 4 Issues (2019)
Volume 6: 4 Issues (2018)
Volume 5: 4 Issues (2017)
Volume 4: 4 Issues (2016)
Volume 3: 4 Issues (2015)
Volume 2: 4 Issues (2014)
Volume 1: 4 Issues (2013)
View Complete Journal Contents Listing