Intrusion detection in networks using cuckoo search optimization

Muhammad Imran*, Sangeen Khan, Helmut Hlavacs, Fakhri Alam Khan, Sajid Anwar

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

28 Scopus citations

Abstract

One of the key problems for researchers and network managers is anomaly detection in network traffic. Anomalies in network traffic might signal a network intrusion, requiring the use of a quick and dependable network intrusion detection system. Intrusion detection systems based on artificial intelligence (AI) techniques are gaining the interest of the research community as AI techniques have evolved in recent years. This research proposes a novel method for anomaly detection using artificial neural networks (ANNs) optimized using cuckoo search algorithm. For simulation purposes, the NSL-KDD dataset has been utilized with a 70:30 ratio where 70% of data is used for training and the remaining 30% is used for testing. The proposed model is then evaluated in terms of mean absolute error, mean square error, root-mean-square error, and accuracy. The results of the proposed work are compared with standard methods available in the literature including fuzzy clustering artificial neural network (FC-ANN), intrusion detection with artificial bee colony, neural network intrusion detection system, and selection of relevant feature. The results clearly show that the proposed method outperforms the listed standard methods.

Original languageEnglish
Pages (from-to)10651-10663
Number of pages13
JournalSoft Computing
Volume26
Issue number20
DOIs
StatePublished - Oct 2022

Bibliographical note

Publisher Copyright:
© 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.

Keywords

  • Artificial neural networks
  • Cuckoo search
  • Intrusion detection

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Software
  • Geometry and Topology

Fingerprint

Dive into the research topics of 'Intrusion detection in networks using cuckoo search optimization'. Together they form a unique fingerprint.

Cite this