In response to the security issues in industrial networks, a new intrusion detection method is proposed. The specific innovations of the method are divided into two aspects. First, in the process of processing, in order to solve the problem of high dimensionality of the original data, a particle swarm optimize genetic algorithm (PSO-GA) hybrid algorithm with dynamically adjusted parameters was proposed for feature extraction. It successfully screened out a subset of features that are meaningful to model training and accelerated training speed. Secondly, when building a machine learning model, theStacking integrated learning framework is used to generalize the output results of multiple models to improve the overall prediction accuracy. The experimental results on both two datasets show that the detection precision on the publicly available intrusion detection dataset CICDS-2017 has reached 95%, and it also has a 93% precision on a real industrial dataset developed by Lan Turnipseed from the gas pipeline control system.
GaikwadD P, ThoolR C.Intrusion detection system using bagging ensemble method of machine learning[C]∥International Conference on Computing Communication Control and Automation, Pune, India,2015: 291-295.
[2]
ShenY, ZhengK, WuC, et al. An ensemble method based on selection using bat algorithm for intrusion detection[J]. The Computer Journal, 2018, 61(4): 526-538.
[3]
BhatiB S, ChughG, Al‐TurjmanF, et al. An improved ensemble based intrusion detection technique using XGBoost[J]. Transactions on Emerging TeleCommunications Technologies, 2021, 32(6): No.e4076.
[4]
MnihV, HeessN, GravesA, et al. Recurrent models of visual attention[J]. Advances in Neural Information Processing Systems, 2014, 27:1-12.
[5]
AhmadI. Feature selection using particle swarm optimization in intrusion detection[J]. International Journal of Distributed Sensor Networks, 2015, 11(10):No. 806954.
[6]
DicksonA, ThomasC. Improved PSO for optimizing the performance of intrusion detection systems[J]. Journal of Intelligent & Fuzzy Systems, 2020, 38(5): 6537-6547.
[7]
AzizM R, AlfoudiA S. Feature selection of the anomaly network intrusion detection based on restoration particle swarm optimization[J]. International Journal of Intelligent Engineering & Systems, 2022, 15(5):592-600.
[8]
WeiP, LiY F, ZhangZ, et al. An optimization method for intrusion detection classification model based on deep belief network[J]. IEEE Access, 2019, 7: 87593-87605.
[9]
PanigrahiR, BorahS. A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems[J]. International Journal of Engineering & Technology, 2018, 7(3): 479-482.
[10]
GoryunovM N, MatskevichA G, RybolovlevD A. Synthesis of a machine learning model for detecting computer attacks based on the Cicids2017 dataset[J]. Proceedings of the Institute for System Programming of the RAS, 2020, 32(5): 81-94.
[11]
StiawanD, IdrisM Y B, BamhdiA M, et al. CICIDS-2017 dataset feature analysis with information gain for anomaly detection[J]. IEEE Access, 2020, 8:132911-132921.
[12]
SaloF, InjadatM, NassifA B, et al. Data mining techniques in intrusion detection systems: a systematic literature review[J]. IEEE Access, 2018, 6: 56046-56058.
[13]
TurnipseedI P. A new scada dataset for intrusion detection research[D]. Starkville:James Worth Bagley College of Engineering,Mississippi State University, 2015.
[14]
RastogiA K, NarangN, SiddiquiZ A. Imbalanced big data classification: a distributed implementation of smote[C]∥Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, Varanasi, India,2018: 1-6.
[15]
MylesA J, FeudaleR N, LiuY, et al. An introduction to decision tree modeling[J]. Journal of Chemometrics: a Journal of the Chemometrics Society, 2004, 18(6): 275-285.
[16]
BiauG, ScornetE. A random forest guided tour[J]. Test, 2016, 25: 197-227.
[17]
ChenT, HeT, BenestyM, et al. Xgboost: extreme gradient boosting(version 0.4-2)[DB/OL]. [2015-12-13].
WenBo-wen, DongWen-han, XieWu-jie, et al. Parameter optimization method for random forest based on improved grid search algorithm[J]. Computer Engineering and Applications,2018,54(10):154-157.
[20]
PattawaroA, PolprasertC. Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique[C]∥The 16th International Conference on ICT and Knowledge Engineering(ICT&KE), Bangkok, Thailand, 2018: 1-6.
LiHong-ya, PengYu-zhong, DengChu-yan, et al. Review of hybrids of GA and PSO[J]. Computer Engineering and Applications, 2018, 54(2):20-28.
[23]
MohammedM, MwambiH, OmoloB, et al. Using stacking ensemble for microarray-based cancer classification[C]∥International Conference on Computer, Control, Electrical, and Electronics Engineering, Khartoum, Sudan, 2018: 1-8.
ZhangKai-fang, SuHua-you, DouYong. A new multi-classification task accuracy evaluation method based on confusion matrix[J]. Computer Engineering & Science, 2021, 43(11): 1910-1919.
[28]
BelarbiO, KhanA, CarnelliP, et al. An intrusion detection system based on deep belief networks[C]∥International Conference on Science of Cyber Security,Matsue, Japan, 2022: 377-392.
[29]
YaoY, SuL, LuZ. DeepGFL: deep feature learning via graph for attack detection on flow-based network traffic[C]∥IEEE Military Communications Conference(MILCOM),Los Angeles, USA, 2018: 579-584.
[30]
RoopakM, TianG Y, ChambersJ. Deep learning models for cyber security in IoT networks[C]∥IEEE The 9th Annual Computing and Communication Workshop and Conference, Las Vegas, USA,2019: 452-457.