ArticlePublisher preview available

Quantum particle Swarm optimized extreme learning machine for intrusion detection

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

Ensuring a secure online environment hinges on the timely detection of network attacks. Nevertheless, existing detection methods often grapple with the delicate balance between speed and accuracy. In this paper, we introduce a novel intrusion detection algorithm that marries quantum particle swarm optimization with an extreme learning machine (QPSO-ELM). Firstly, we present a feature selection algorithm grounded in partitioned gains to distill vital features from data samples, thereby diminishing feature count to amplify both model training speed and accuracy. Subsequently, we unveil an intrusion detection scheme underpinned by QPSO-ELM, capable of achieving exceptional levels of training and detection speed, all while maintaining high accuracy. Finally, we fine-tune the trained model using the proposed hidden layer node selection algorithm, reducing the detection model size without compromising detection accuracy, thus further elevating its speed. The experiment results indicate that compared to the current baseline, our proposed intrusion detection scheme achieves the best results in terms of accuracy, precision, recall, and detection latency. Furthermore, the ablation experiment results demonstrate the effectiveness of our proposed method in improving both detection speed and detection accuracy.
This content is subject to copyright. Terms and conditions apply.
Vol:.(1234567890)
The Journal of Supercomputing (2024) 80:14622–14644
https://doi.org/10.1007/s11227-024-06022-y
1 3
Quantum particle Swarm optimized extreme learning
machine forintrusion detection
HanQi1· XinyuLiu1· AbdullahGani2· ChangqingGong1
Accepted: 23 February 2024 / Published online: 21 March 2024
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature
2024
Abstract
Ensuring a secure online environment hinges on the timely detection of network
attacks. Nevertheless, existing detection methods often grapple with the delicate
balance between speed and accuracy. In this paper, we introduce a novel intru-
sion detection algorithm that marries quantum particle swarm optimization with
an extreme learning machine (QPSO-ELM). Firstly, we present a feature selection
algorithm grounded in partitioned gains to distill vital features from data samples,
thereby diminishing feature count to amplify both model training speed and accu-
racy. Subsequently, we unveil an intrusion detection scheme underpinned by QPSO-
ELM, capable of achieving exceptional levels of training and detection speed, all
while maintaining high accuracy. Finally, we fine-tune the trained model using the
proposed hidden layer node selection algorithm, reducing the detection model size
without compromising detection accuracy, thus further elevating its speed. The
experiment results indicate that compared to the current baseline, our proposed
intrusion detection scheme achieves the best results in terms of accuracy, precision,
recall, and detection latency. Furthermore, the ablation experiment results demon-
strate the effectiveness of our proposed method in improving both detection speed
and detection accuracy.
Keywords Network security· Feature selection· Quantum particle swarm
optimization· Extreme learning machine· Intrusion detection
1 Introduction
With the rapid advancement of information technology, the internet is expanding
at an unprecedented rate, becoming increasingly intertwined with our daily lives.
Unfortunately, malicious actors, often motivated by personal gain, are continually
orchestrating a wide array of network attacks, including malware attacks, exploi-
tation of zero-day vulnerabilities, web-based assaults, and disruptive Distributed
Extended author information available on the last page of the article
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The purpose of this paper is to design and implement a complete system for monitoring and detecting attacks and anomalies in 5G wireless local area networks. Regrettably, the development of most open source systems has been stopped, making them unable to detect emerging forms of threats. The system provides a modular framework to create and add new detection rules as new attacks emerge. The system is based on packet analysis modules and rules and incorporates machine learning models to enhance its efficiency. The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new and emerging attacks at an early stage. Therefore, the ultimate aim is to create a tool that constantly evolves by integrating novel attack detection techniques. The efficiency of the system is proven experimentally with accuracy levels up to 98.57% and precision as well as recall scores as high as 92%.
Article
Full-text available
The automotive Ethernet is gradually replacing the traditional controller area network (CAN) as the backbone network of the vehicle. As an essential protocol to solve service-based communication, Scalable service-Oriented MiddlewarE over IP (SOME/IP) is expected to be applied to an in-vehicle network (IVN). The increasing number of external attack interfaces and the protocol's vulnerability makes SOME/IP in-vehicle networks vulnerable to intrusion. This paper proposes a multi-layer intrusion detection system (IDS) architecture, including rule-based and artificial intelligence (AI)-based modules. The rule-based module is used to detect the SOME/IP header, SOME/IP-SD message, message interval, and communication process. The AI-based module acts on the payload. We propose a SOME/IP dataset establishment method to evaluate the performance of the proposed multi-layer IDS. Experiments are carried out on a Jetson Xavier NX, showing that the accuracy of AI-based detection reached 99.7761% and that of rule-based detection was 100%. The average detection time per packet is 0.3958 ms with graphics processing unit (GPU) acceleration and 0.6669 ms with only a central processing unit (CPU). After vehicle-level real-time analyses, the proposed IDS can be deployed for distributed or select critical advanced driving assistance system (ADAS) traffic for detection in a centralized layout.
Preprint
Full-text available
In order to safeguard “Wireless Sensor Networks (WSNs),” this research suggests a new rule-based intrusion detection architecture that includes a number of security techniques. The framework employs a set of rules generated by the Random Forest algorithm, which outperforms other machine learning algorithms in terms of detection accuracy, false positive rate, and overhead. The generated rules are based on features extracted from WSNs data, including packet size, energy consumption, and hop count. The framework’s performance is evaluated using a set of metrics, demonstrating its effectiveness in identifying numerous attack kinds. Combining rule-based systems and machine learning approaches in this proposed framework can improve the accuracy and efficiency of intrusion detection mechanisms for secure WSNs. The proposed framework can be a valuable addition to the existing intrusion detection mechanisms for secure WSNs.
Article
Full-text available
The mobile healthcare (mHealth) is a promising and fascinating paradigm, which can dramatically improve the quality of healthcare delivery by providing remote diagnosis and medical record sharing. Now, the mHealth faces serious challenges such as data leakage and unauthorised access currently. Attribute-based encryption (ABE) which has been employed for mHealth is an excellent cryptographic primitive of securing data sharing. However, there are still some security and efficiency issues in the ABE-based data sharing scheme for mHealth. Firstly, the explicit storage of access policy may expose the privacy of users. Secondly, the computation cost is high, especially in the mHealth with IoT devices. Thirdly, the authentication of access rights to shared data is usually performed by the centralised third parties or IoT devices with limited resources. To handle the above issues, this paper presents a privacy-preserving and efficient data sharing scheme. The scheme partially hides access policy to protect user's privacy, and introduces an offline mechanism in key generation and encryption phase to improve efficiency of mHealth. Furthermore, it also provides decentralised and trusted authentication of data access right based on blockchain. The security proofs and the experiment results demonstrate that the presented scheme has better security and efficiency.
Article
Internet of Things (IoT) applications are growing in popularity for being widely used in many real-world services. In an IoT ecosystem, many devices are connected with each other via internet, making IoT networks more vulnerable to various types of cyber attacks, thus a major concern in its deployment is network security and user privacy. To protect IoT networks against various attacks, an efficient and practical Intrusion Detection System (IDS) could be an effective solution. In this paper, a novel anomaly-based IDS system for IoT networks is proposed using Deep Learning technique. Particularly, a filter-based feature selection Deep Neural Network (DNN) model where highly correlated features are dropped has been presented. Further, the model is tuned with various parameters and hyper parameters. The UNSW-NB15 dataset comprising of four attack classes is utilized for this purpose. The proposed model achieved an accuracy of 84%. Generative Adversarial Networks (GANs) were used to generate synthetic data of minority attacks to resolve class imbalance issues in the dataset and achieved 91% accuracy with balanced class dataset.