Develop a Hybrid Improved Residual Attention with Efficient Net with Mosquito-Cuckoo Search Optimization to Detect the Attack during Network Traffic

Develop a Hybrid Improved Residual Attention with Efficient Net with Mosquito-Cuckoo Search Optimization to Detect the Attack during Network Traffic

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-11
Year of Publication : 2024
Author : A. Senthilkumar, L. Kathirvelkumaran, K. Kavitha, Nithyanantham Sampathkumar, S. Sureshkumar
DOI : 10.14445/22315381/IJETT-V72I11P106

How to Cite?
A. Senthilkumar, L. Kathirvelkumaran, K. Kavitha, Nithyanantham Sampathkumar, S. Sureshkumar, "Develop a Hybrid Improved Residual Attention with Efficient Net with Mosquito-Cuckoo Search Optimization to Detect the Attack during Network Traffic," International Journal of Engineering Trends and Technology, vol. 72, no. 11, pp. 45-54, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I11P106

Abstract
Network attacks encompass all forms of unapproved entry into a network, encompassing any endeavor to damage and interfere with the network, usually resulting in serious consequences. The internet facilitates communication and connection, but attackers who aim to breach and harm network security and connections may also violate and endanger the integrity and confidentiality of these relationships and data transfers. The evolution of various network assaults and growth in data interchange between the devices brings the need to safeguard networks and computing devices. The hybrid Improved Residual Attention with EfficientNet (IRAEN) with Mosquito-Cuckoo Search Optimization (MCSO) is proposed for efficient feature extraction from the network traffic. The attention mechanism focuses on something in particular and notes its specific importance. IRAEN-MCSO solves the problem by extracting more features and classifying the attacks accurately. The proposed IRAEN-MCSO model obtains an accuracy of 99.63%, which is higher than the other algorithms such as Gradient-Boost Decision Tree (GBDT), Multilayer Perceptron (MLP), Recurrent Neural Network (RNN), AE-RL and LSTM. Also, the specificity values 99.59%, precision 97.63%, recall 97.78%, and F1 score 97.97% are more efficient than the other existing algorithms.

Keywords
Improved residual attention with EfficientNet, Mosquito-cuckoo search optimization, Transfer learning, Feature extraction, Security, Network traffic detection, Performance measures, Machine learning.

References
[1] Theyazn H. H. Aldhyani, and Hasan Alkahtani, “Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model,” Mathematics, vol. 11, no. 1, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Bhawana Sharma et al., “Anomaly Based Network Intrusion Detection for IOT Attacks Using Deep Learning Technique,” Computers and Electrical Engineering, vol. 107, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mahdi Soltani et al., “An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks,” Journal of Information Security and Applications, vol. 76, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Srinath Venkatesan, “Design an Intrusion Detection System Based on Feature Selection Using ML Algorithms,” Mathematical Statistician and Engineering Applications, vol. 72, no. 1, pp. 702-710, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Mahmood A. Al-Shareeda, Selvakumar Manickam, and Murtaja Ali Saare, “DDoS Attacks Detection Using Machine Learning and Deep Learning Techniques: Analysis and Comparison,” Bulletin of Electrical Engineering and Informatics, vol. 12, no. 2, pp. 930-939, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Vanlalruata Hnamte, and Jamal Hussain, “DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System,” Telematics and Informatics Reports, vol. 10, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Ahmet Sardar Ahmed Issa, and Zafer Albayrak, “DDOS Attack Intrusion Detection System Based on Hybridization of CNN and LSTM,” Acta Polytechnica Hungarica, vol. 20, no. 2, 105-123, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Albara Awajan, “A Novel Deep Learning-Based Intrusion Detection System for IOT Networks,” Computers, vol. 12, no. 2, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Afnan Alotaibi, and Murad A. Rassam, “Adversarial Machine Learning Attacks Against Intrusion Detection Systems: A Survey on Strategies and Defense,” Future Internet, vol. 15, no. 2, pp. 1-34, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Jay Kumar Jain, and Akhilesh A. Waoo, “An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System,” Journal of Artificial Intelligence, Machine Learning and Neural Network, vol. 3, no. 2, pp. 33-42, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Andrew McCarthy et al., “Defending Against Adversarial Machine Learning Attacks Using Hierarchical Learning: A Case Study on Network Traffic Attack Classification,” Journal of Information Security and Applications, vol. 72, pp. 1-14, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Afnan Alotaibi, and Murad A. Rassam, “Enhancing the Sustainability of Deep-Learning-Based Network Intrusion Detection Classifiers against Adversarial Attacks,” Sustainability, vol. 15, no. 12, pp. 1-25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Vinod Varma Vegesna, “Secure and Reliable Designs for Intrusion Detection Methods Developed Utilizing Artificial Intelligence Approaches,” International Journal of Current Engineering and Scientific Research, vol. 10, pp. 1-7, 2023.
[Google Scholar] [Publisher Link]
[14] Rajasekhar Chaganti et al., “Deep Learning Approach for SDN-Enabled Intrusion Detection System in IOT Networks,” Information, vol. 14, no. 1, pp. 1-7, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Vikash Kumar, Ditipriya Sinha, and Ayan Kumar Das, Cyber-Attack Detection Applying Machine Learning Approach, In Applications of Mathematical Modeling, Machine Learning, and Intelligent Computing for Industrial Development, 1st ed., pp. 159-178, 2023.
[Google Scholar] [Publisher Link]
[16] Kamaldeep, Manisha Malik, and Maitreyee Dutta, “Feature Engineering and Machine Learning Framework for DDOS Attack Detection in The Standardized Internet of Things,” IEEE Internet of Things Journal, vol. 10, no. 10, pp. 8658-8669, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Harshit Shah et al., “Deep Learning-Based Malicious Smart Contract and Intrusion Detection System for IoT Environment,” Mathematics, vol. 11, no. 2, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] G. Logeswari, S. Bose, and T. Anitha, “An Intrusion Detection System for SDN Using Machine Learning,” Intelligent Automation & Soft Computing, vol. 35, no. 1, pp. 867-880, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Subhan Ullah et al., “Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks,” Computers, vol. 12, no. 6, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Rubayyi Alghamdi, and Martine Bellaiche, “A Cascaded Federated Deep Learning Based Framework for Detecting Wormhole Attacks in IOT Networks,” Computers & Security, vol. 125, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Rahma Meddeb et al., “A Deep Learning-Based Intrusion Detection Approach for Mobile Ad-Hoc Network,” Soft Computing, vol. 27, pp. 9425-9439, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Ankit Thakkar, and Ritika Lohiya, “A Review on Challenges and Future Research Directions for Machine Learning-Based Intrusion Detection System,” Archives of Computational Methods in Engineering, vol. 30, pp. 4245-4269, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] D. Shankar, “Deep Analysis of Risks and Recent Trends towards Network Intrusion Detection System,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 1, pp. 262-276, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] B. Jothi, and M. Pushpalatha, “WILS-TRS - A Novel Optimized Deep Learning Based Intrusion Detection Framework for IoT Networks,” Personal and Ubiquitous Computing, vol. 27, no. 3, pp. 1285-1301, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Khattab M. Ali Alheeti et al., “Intelligent Detection System for Multi-Step Cyber-Attack Based on Machine Learning,” Proceedings 2023 15th International Conference on Developments in eSystems Engineering (DeSE), Baghdad & Anbar, Iraq, pp. 510-514, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Ke He, Dan Dongseong Kim, and Muhammad Rizwan Asghar, “Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 538-566, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Trifa S. Othman, and Saman M. Abdullah, “An Intelligent Intrusion Detection System for Internet of Things Attack Detection and Identification Using Machine Learning,” Aro-The Scientific Journal of Koya University, vol. 11, no. 1, pp. 126-137, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Safa Mohamed, and Ridha Ejbali, “Deep SARSA-Based Reinforcement Learning Approach for Anomaly Network Intrusion Detection System,” International Journal of Information Security, vol. 22, no. 1, pp. 235-247, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Shiming Li et al., “EIFDAA: Evaluation of an IDS with Function-Discarding Adversarial Attacks in the IIoT,” Heliyon, vol. 9, no. 2, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[30] S. Murugan, and M. Jeyakarthic, “An Efficient Bio-Inspired Algorithm Based Data Classification Model for Intrusion Detection in Mobile Adhoc Networks,” The International Journal of Analytical and Experimental Modal Analysis, vol. 11, no. 11, pp. 834-848, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[31] A. Thirumalairaj, and M. Jeyakarthic, “Hybrid Cuckoo Search Optimization Based Tuning Scheme for A Deep Neural Network for Intrusion Detection Systems in the Cloud Environment,” Journal of Research on the Lepidoptera, vol. 51, no. 2, pp. 209-224, 2020.
[Google Scholar]