Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System


  • D. K. Singh Department of Computer Science & Engineering, Guru Ghasidas University, India
  • M. Shrivastava Department of Computer Science & Engineering, Guru Ghasidas University, India


Keeping computer reliability to confirm reliable, secure, and truthful correspondence of data between different enterprises is a major security issue. Ensuring information correspondence over the web or computer grids is always under threat of hackers or intruders. Many techniques have been utilized in intrusion detections, but all have flaws. In this paper, a new hybrid technique is proposed, which combines the Ensemble of Feature Selection (EFS) algorithm and Teaching Learning-Based Optimization (TLBO) techniques. In the proposed, EFS-TLBO method, the EFS strategy is applied to rank the features for choosing the ideal best subset of applicable information, and the TLBO is utilized to identify the most important features from the produced datasets. The TLBO algorithm uses the Extreme Learning Machine (ELM) to choose the most effective attributes and to enhance classification accuracy. The performance of the recommended technique is evaluated in a benchmark dataset. The experimental outcomes depict that the proposed model has high predictive accuracy, detection rate, false-positive rate, and requires less significant attributes than other techniques known from the literature.


classification, feature selection, teaching learning-based optimization, intrusion detection


Download data is not yet available.


A. Praseed and P. S. Thilagam, "DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications," IEEE Communications Surveys Tutorials, vol. 21, no. 1, pp. 661–685, Firstquarter 2019. DOI: https://doi.org/10.1109/COMST.2018.2870658

S. Pontarelli, G. Bianchi, and S. Teofili, "Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System," IEEE Transactions on Computers, vol. 62, no. 11, pp. 2322–2334, Nov. 2013. DOI: https://doi.org/10.1109/TC.2012.105

N. Fallahi, A. Sami, and M. Tajbakhsh, "Automated flow-based rule generation for network intrusion detection systems," in 24th Iranian Conference on Electrical Engineering, Shiraz, Iran, May 2016, pp. 1948–1953. DOI: https://doi.org/10.1109/IranianCEE.2016.7585840

Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, "A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 447–456, Feb. 2014. DOI: https://doi.org/10.1109/TPDS.2013.146

Y. Wang, W. Meng, W. Li, J. Li, W.-X. Liu, and Y. Xiang, "A fog-based privacy-preserving approach for distributed signature-based intrusion detection," Journal of Parallel and Distributed Computing, vol. 122, pp. 26–35, Dec. 2018. DOI: https://doi.org/10.1016/j.jpdc.2018.07.013

S. A. Medjahed, T. A. Saadi, A. Benyettou, and M. Ouali, "Kernel-based learning and feature selection analysis for cancer diagnosis," Applied Soft Computing, vol. 51, pp. 39–48, Feb. 2017. DOI: https://doi.org/10.1016/j.asoc.2016.12.010

A. K. Shukla and P. Singh, "Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection," International Journal of Information Security and Privacy, vol. 13, no. 3, pp. 31–47, 2019. DOI: https://doi.org/10.4018/IJISP.201907010102

T. F. Ghanem, W. S. Elkilani, and H. M. Abdul-kader, "A hybrid approach for efficient anomaly detection using metaheuristic methods," Journal of Advanced Research, vol. 6, no. 4, pp. 609–619, Jul. 2015. DOI: https://doi.org/10.1016/j.jare.2014.02.009

S. Dwivedi, M. Vardhan, and S. Tripathi, "Incorporating evolutionary computation for securing wireless network against cyberthreats," The Journal of Supercomputing, vol. 76, no. 11, pp. 8691–8728, Nov. 2020. DOI: https://doi.org/10.1007/s11227-020-03161-w

R. Singh, H. Kumar, and R. K. Singla, "An intrusion detection system using network traffic profiling and online sequential extreme learning machine," Expert Systems with Applications, vol. 42, no. 22, pp. 8609–8624, Dec. 2015. DOI: https://doi.org/10.1016/j.eswa.2015.07.015

A. K. Shukla, P. Singh, and M. Vardhan, "A two-stage gene selection method for biomarker discovery from microarray data for cancer classification," Chemometrics and Intelligent Laboratory Systems, vol. 183, pp. 47–58, Dec. 2018. DOI: https://doi.org/10.1016/j.chemolab.2018.10.009

C. Liu, W. Wang, Q. Zhao, X. Shen, and M. Konan, "A new feature selection method based on a validity index of feature subset," Pattern Recognition Letters, vol. 92, pp. 1–8, Jun. 2017. DOI: https://doi.org/10.1016/j.patrec.2017.03.018

P. E. Meyer, C. Schretter, and G. Bontempi, "Information-Theoretic Feature Selection in Microarray Data Using Variable Complementarity," IEEE Journal of Selected Topics in Signal Processing, vol. 2, no. 3, pp. 261–274, Jun. 2008. DOI: https://doi.org/10.1109/JSTSP.2008.923858

A. K. Shukla, P. Singh, and M. Vardhan, "A hybrid gene selection method for microarray recognition," Biocybernetics and Biomedical Engineering, vol. 38, no. 4, pp. 975–991, Jan. 2018. DOI: https://doi.org/10.1016/j.bbe.2018.08.004

A. K. Shukla, P. Singh, and M. Vardhan, "Gene selection for cancer types classification using novel hybrid metaheuristics approach," Swarm and Evolutionary Computation, vol. 54, May 2020, Art. no. 100661. DOI: https://doi.org/10.1016/j.swevo.2020.100661

L. Barolli and O. Terzo, Eds., Complex, Intelligent, and Software Intensive Systems, 1st edition. New York, NY, USA: Springer, 2017. DOI: https://doi.org/10.1007/978-3-319-61566-0

R. V. Rao, V. J. Savsani, and D. P. Vakharia, "Teaching–learning-based optimization: A novel method for constrained mechanical design optimization problems," Computer-Aided Design, vol. 43, no. 3, pp. 303–315, Mar. 2011. DOI: https://doi.org/10.1016/j.cad.2010.12.015

A. Rajasekhar, R. Rani, K. Ramya, and A. Abraham, "Elitist Teaching Learning Opposition based algorithm for global optimization," in IEEE International Conference on Systems, Man, and Cybernetics, Seoul, Korea (South), Oct. 2012, pp. 1124–1129. DOI: https://doi.org/10.1109/ICSMC.2012.6377882

Y. Oubbati and S. Arif, "Transient stability constrained optimal power flow using teaching learning based optimization," in 8th International Conference on Modelling, Identification and Control, Algiers, Algeria, Nov. 2016, pp. 284–289. DOI: https://doi.org/10.1109/ICMIC.2016.7804124

A. K. Shukla, S. K. Pippal, and S. S. Chauhan, "An empirical evaluation of teaching–learning-based optimization, genetic algorithm and particle swarm optimization," International Journal of Computers and Applications, pp. 1–15, Nov. 2019. DOI: https://doi.org/10.1080/1206212X.2019.1686562

M. M. Polycarpou, A. de Carvalho, J.-S. Pan, M. Wozniak, H. Quintian, and E. Corchado, Eds., Hybrid Artificial Intelligence Systems. New York, NY, USA: Springer International Publishing, 2014. DOI: https://doi.org/10.1007/978-3-319-07617-1

A. K. Shukla, P. Singh, and M. Vardhan, "An adaptive inertia weight teaching-learning-based optimization algorithm and its applications," Applied Mathematical Modelling, vol. 77, pp. 309–326, Jan. 2020. DOI: https://doi.org/10.1016/j.apm.2019.07.046

P. K. Nayak, S. Mishra, P. K. Dash, and R. Bisoi, "Comparison of modified teaching–learning-based optimization and extreme learning machine for classification of multiple power signal disturbances," Neural Computing and Applications, vol. 27, no. 7, pp. 2107–2122, Oct. 2016. DOI: https://doi.org/10.1007/s00521-015-2010-0

A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys Tutorials, vol. 18, no. 2, pp. 1153–1176, Secondquarter 2016. DOI: https://doi.org/10.1109/COMST.2015.2494502

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," in IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, Canada, Jul. 2009, pp. 1–6. DOI: https://doi.org/10.1109/CISDA.2009.5356528

G. V. Nadiammai and M. Hemalatha, "Effective approach toward Intrusion Detection System using data mining techniques," Egyptian Informatics Journal, vol. 15, no. 1, pp. 37–50, Mar. 2014. DOI: https://doi.org/10.1016/j.eij.2013.10.003

K. Ray, S. N. Sharan, S. Rawat, S. K. Jain, S. Srivastava, and A. Bandyopadhyay, Eds., Engineering Vibration, Communication and Information Processing, 1st edition. New York, NY, USA: Springer, 2018. DOI: https://doi.org/10.1007/978-981-13-1642-5

N. Shakhovska, Ed., Advances in Intelligent Systems and Computing: Selected Papers from the International Conference on Computer Science and Information Technologies, ... in Intelligent Systems and Computing, 512), 1st ed. New York, NY: Springer, 2016.

S. R. Basha and J. K. Rani, "A Comparative Approach of Dimensionality Reduction Techniques in Text Classification," Engineering, Technology & Applied Science Research, vol. 9, no. 6, pp. 4974–4979, Dec. 2019. DOI: https://doi.org/10.48084/etasr.3146

F. Kuang, S. Zhang, Z. Jin, and W. Xu, "A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection," Soft Computing, vol. 19, no. 5, pp. 1187–1199, May 2015. DOI: https://doi.org/10.1007/s00500-014-1332-7

J. Gu, L. Wang, H. Wang, and S. Wang, "A novel approach to intrusion detection using SVM ensemble with feature augmentation," Computers & Security, vol. 86, pp. 53–62, Sep. 2019. DOI: https://doi.org/10.1016/j.cose.2019.05.022

S. Senthamarai Kannan and N. Ramaraj, "A novel hybrid feature selection via Symmetrical Uncertainty ranking based local memetic search algorithm," Knowledge-Based Systems, vol. 23, no. 6, pp. 580–585, Aug. 2010. DOI: https://doi.org/10.1016/j.knosys.2010.03.016

P. Gogoi, M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Packet and Flow Based Network Intrusion Dataset," in International Conference on Contemporary Computing, Noida, India, Aug. 2012, pp. 322–334. DOI: https://doi.org/10.1007/978-3-642-32129-0_34

M. M. Abd-Eldayem, "A proposed HTTP service based IDS," Egyptian Informatics Journal, vol. 15, no. 1, pp. 13–24, Mar. 2014. DOI: https://doi.org/10.1016/j.eij.2014.01.001

G. Kim, S. Lee, and S. Kim, "A novel hybrid intrusion detection method integrating anomaly detection with misuse detection," Expert Systems with Applications, vol. 41, no. 4, Part 2, pp. 1690–1700, Mar. 2014. DOI: https://doi.org/10.1016/j.eswa.2013.08.066

"NSL-KDD Datasets," Canadian Institute for Cybersecurity | UNB. https://www.unb.ca/cic/datasets/nsl.html (accessed Apr. 23, 2021).

A. S. A. Aziz, S. E.-O. Hanafi, and A. E. Hassanien, "Comparison of classification techniques applied for network intrusion detection and classification," Journal of Applied Logic, vol. 24, pp. 109–118, Nov. 2017. DOI: https://doi.org/10.1016/j.jal.2016.11.018


How to Cite

D. K. Singh and M. Shrivastava, “Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 3, pp. 7130–7134, Jun. 2021.


Abstract Views: 113
PDF Downloads: 104

Metrics Information
Bookmark and Share

Most read articles by the same author(s)