Paper
11 October 2023 Intrusion detection model for software-defined networking based on feature selection
Yang Jin, Hui Xu, Zhengbin Qin
Author Affiliations +
Proceedings Volume 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023); 128001R (2023) https://doi.org/10.1117/12.3004019
Event: 6th International Conference on Computer Information Science and Application Technology (CISAT 2023), 2023, Hangzhou, China
Abstract
Due to the problems of feature redundancy and high dimensionality in Software-Defined Networking (SDN) intrusion detection, the original Seagull Optimization Algorithm (SOA) appears to have lack of exploration capability and tends to fall into local optimum problems. A hybrid strategy Improved Seagull Optimization Algorithm (ISOA) is proposed to solve these problems. Firstly, a cubic chaotic mapping strategy is used to initialize the population, laying the foundation for the global search for an optimum. Secondly, a Cauchy-Gauss variation strategy is introduced to improve the search efficiency of the algorithm. Finally, a simulated annealing algorithm is combined with a certain probability to accept a solution that is worse than the current one, jumping out of the local optimum. The ISOA was applied to the InSDN dataset to verify the intrusion detection performance of the model. Comparing with the original SOA and six other classical algorithm models, the data dimensionality was significantly reduced and effectively improving the performance of SDN intrusion detection.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Yang Jin, Hui Xu, and Zhengbin Qin "Intrusion detection model for software-defined networking based on feature selection", Proc. SPIE 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), 128001R (11 October 2023); https://doi.org/10.1117/12.3004019
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer intrusion detection

Data modeling

Feature selection

Feature extraction

Detection and tracking algorithms

Mathematical optimization

Performance modeling

Back to Top