×
Home Current Archive Editorial board
Instructions for papers
For Authors Aim & Scope Contact
Original scientific article

MEDIAN ATTRIBUTE HYBRID CLUSTERED MODEL USING PARTICLE SWARM OPTIMIZATION FOR NETWORK INTRUSION DETECTION

By
Rajasekhar Kaseebhotla Orcid logo ,
Rajasekhar Kaseebhotla

Research Scholar, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation , Guntur , India

Raghava Rao Orcid logo ,
Raghava Rao

Professor, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation , Guntur , India

Mallikarjuna Rao Orcid logo
Mallikarjuna Rao

Professor, Gokaraju Rangaraju Institute of Engineering and Technology , Hyderabad , India

Abstract

The rapid growth of cloud-based and large-scale network infrastructures has increased the complexity and frequency of cyber-attacks, demanding efficient and scalable intrusion detection systems (IDS). This paper will also attempt to create a better Network Intrusion Detection System (NIDS) by incorporating a Hybrid Median Attribute Clustering model with Particle Swarm Optimization (MAHC-PSO) to achieve better detection accuracy, less false alarms, and better computation efficiency in high dimensional network space. The suggested MAHC-PSO model utilizes Information Gain in the feature selection on the KDD Cup’99 dataset to minimize dimensions without losing important network features. The median attribute analysis is used to make data representation in a way that is effective and hybrid hierarchical clustering is used to cluster network traffic patterns. Clustering quality is optimized with the help of particle Swarm Optimization that improves the position of the particles depending on the accuracy of detection and the degree of compactness of the cluster. The performance assessment is done with different network sizes between 10, 000 and 60,000 nodes and compared with the current NWFSF-IDMLM and HO-CNN-LSTM-IDS models. The experimental findings indicate that MAHC-PSO model is always better in all the metrics than the benchmark models. The accuracy of feature extraction, hybrid clustering, and cluster set generation were 98.5%, 98.2% and 98.6%, respectively, with 60,000 nodes. PSO fitness value estimation rate was at its highest of 98.8 and median attribute estimation time was lower, at 18 units and pattern analysis time was lower, at 12 units. The overall intrusion detection accuracy was 98.6 which is very high compared to models. The MAHC-PSO model provides a scalable, efficient, and powerful intrusion detection system in large networks in real-time. Its superior accuracy and reduced processing time make it suitable for deployment in cloud-based, enterprise, and future distributed IT environments.

References

1.
Han Y, Wang Y, Cao Y, Geng Z, Zhu Q. A novel wrapped feature selection framework for developing power system intrusion detection based on machine learning methods. IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2023 Aug 2;53(11):7066-76.
2.
Deore B, Bhosale S. Hybrid optimization enabled robust CNN-LSTM technique for network intrusion detection. Ieee Access. 2022 Jun 15;10:65611-22.
3.
Alsaleh A, Binsaeedan W. The influence of salp swarm algorithm-based feature selection on network anomaly intrusion detection. IEEe Access. 2021 Aug 3;9:112466-77.
4.
Zhiheng W, Jianhua L. Flamingo search algorithm: a new swarm intelligence optimization algorithm. IEEE Access. 2021 Jun 18;9:88564-82.
5.
Tang Y, Li C. An online network intrusion detection model based on improved regularized extreme learning machine. IEEE Access. 2021 Jun 29;9:94826-44.
6.
Injadat M, Moubayed A, Nassif AB, Shami A. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Transactions on Network and Service Management. 2020 Aug 7;18(2):1803-16.
7.
Donkol AA, Hafez AG, Hussein AI, Mabrook MM. Optimization of intrusion detection using likely point PSO and enhanced LSTM-RNN hybrid technique in communication networks. IEEE Access. 2023 Jan 26;11:9469-82.
8.
Wu Y, Lee WW, Xu Z, Ni M. Large-scale and robust intrusion detection model combining improved deep belief network with feature-weighted SVM. IEEE Access. 2020 May 15;8:98600-11.
9.
Salinas O, Soto R, Crawford B, Olivares R. An integral cybersecurity approach using a many-objective optimization strategy. IEEE Access. 2023 Aug 22;11:91913-36.
10.
Taher F, Elhoseny M, Hassan MK, El-Hasnony IM. A novel tunicate swarm algorithm with hybrid deep learning enabled attack detection for secure iot environment. IEEE Access. 2022 Dec 5;10:127192-204.
11.
Ibrahim MS, Dong W, Yang Q. Machine learning driven smart electric power systems: Current trends and new perspectives. Applied Energy. 2020 Aug 15;272:115237.
12.
Sumaiya Thaseen I, Saira Banu J, Lavanya K, Rukunuddin Ghalib M, Abhishek K. An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network. Transactions on Emerging Telecommunications Technologies. 2021 Feb;32(2):e4014.
13.
Elmasry W, Akbulut A, Zaim AH. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks. 2020 Feb 26;168:107042.
14.
Wang H, Cao Z, Hong B. A network intrusion detection system based on convolutional neural network. Journal of Intelligent & Fuzzy Systems. 2020 Jun 25;38(6):7623-37.
15.
Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications. 2020 Feb 1;50:102419.
16.
Al-Jame F, Ali W. Finite Element Evaluation of Mechanical Performance of Hybrid Composite Aerospace Structures. Journal of Reconfigurable Hardware Architectures and Embedded Systems. 2024 Dec 21:12-7.
17.
Jiang H, He Z, Ye G, Zhang H. Network intrusion detection based on PSO-XGBoost model. IEEE Access. 2020 Mar 23;8:58392-401.
18.
Bovenzi G, Aceto G, Ciuonzo D, Persico V, Pescapé A. A hierarchical hybrid intrusion detection approach in IoT scenarios. In GLOBECOM 2020-2020 IEEE global communications conference 2020 Dec 7 (pp. 1- 7). IEEE.
19.
Shyla S, Bhatnagar V, Bali V, Bali S. Optimization of intrusion detection systems determined by ameliorated HNADAM-SGD algorithm. Electronics. 2022 Feb 9;11(4):507.
20.
Powers DM. Evaluation: from Precision, Recall and F-Measure to ROC, Informedness, Markedness and Correlation. arXiv preprint arXiv:2010.16061. 2020.
21.
Khraisat A, Alazab A. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity. 2021 Mar 8;4(1):18.
22.
Ulkilan A. Optimization of Power Flow in Hybrid Microgrids Using AI-Based Algorithms. Journal of Scalable Data Engineering and Intelligent Computing. 2024 Dec 9;1(1):41-7.
23.
Chaganti R, Varadarajan V, Gorantla VS, Gadekallu TR, Ravi V. Blockchain-based cloud-enabled security monitoring using internet of things in smart agriculture. Future Internet. 2022 Aug 24;14(9):250.
24.
Rahman F. Artificial Intelligence-Driven Cybersecurity Framework for Industrial Control Networks. Transactions on Secure Communication Networks and Protocol Engineering. 2025 Mar 5;2(1):1-8.
25.
Li M, Liu Y, Tian Z, Shan C. Privacy protection method based on multidimensional feature fusion under 6G networks. IEEE Transactions on Network Science and Engineering. 2022 Jun 29;10(3):1462-71.

Citation

This is an open access article distributed under the  Creative Commons Attribution Non-Commercial License (CC BY-NC) License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.