International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 3 | Issue 5 | Year 2013 | Article Id. IJPTT-V3I8P102 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I8P102

Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique


S. Revathi, A. Malathi

Citation :

S. Revathi, A. Malathi, "Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 5, pp. 6-10, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I8P102

Abstract

— Network security risks grow tremendously in recent past, the attacks on computer networks have enhanced hugely and need economical network intrusion detection mechanisms. Data processing and machine-learning techniques are used for network intrusion detection throughout the past few years and have gained abundant quality. In this paper, we propose an intrusion detection mechanism based on simplified particle swarm optimization (SSO) is used to investigate the performance of various dimension reduction techniques along with a set of different classifiers including the proposed approach. SSO is used to find more appropriate set of attributes for classifying network intrusions, and also used as a classifier. In preprocessing step, we reduce the dimensions of the dataset by using various dimension reduction techniques, and then this reduced dataset is offered to the proposed hybrid SSO approach that further optimizes the dimensions of the data and finds an optimal set of features. SSO is an optimization method that has a strong global search capability and is used for dimension optimization. The analysis performed on standard KDD cup99 dataset which contain various kind of intrusion. The experimental results shows the worth of the proposed approach by using different performance metrics.

Keywords

- Swarm intelligence, Simplified Swarm Optimization, optimization, Data mining, Intrusion Detection.

References

[1]. Deris tiawan, Abdul Hanan Abdullah, Mohd. Yazid dris, “Characterizing Network Intrusion Prevention System”, International Journal of Computer Applications (0975 – 8887), Volume 14– No.1, (January 2011).
[2]. J. Han and M. Kamber, Data Mining: Concepts and Techniques. San Fransisco: Morgan Kaufmann, 2001.
[3]. C. Grosan, A. Abraham, and M. Chris, "Swarm Intelligence in Data Mining," Studies in Computational Intelligence, vol. 34, pp. 1-20, Springer-Verlag: Berlin Heidelberg, 2006.
[4]. R. C. Eberhart and Y. Shi, "Particle swarm optimization: developments, applications and resources," in Proceedings of the 2001 Congress on Evolutionary Computation, Seoul, South Korea, May 27-30, vol. 1, pp. 81-86, 2001.
[5]. I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," The Journal of Machine Learning Research, vol. 3, pp. 1157 - 1182, Mar.2003.
[6]. R. Bello, Y. Gomez, A. Nowe, and M. M. García, "Two step particle swarm optimization to solve the feature selection problem," in Proceedings of The 7th International Conference on Intelligent Systems Design and Applications, Rio de Janeiro, Brazil, Oct. 22-24, pp. 691-696, 2007.
[7]. C. S. Yang, L. Y. Chuang, J. C. Li, and C. H. Yang, "Chaotic maps in binary particle swarm optimization for feature selection," in Proceedings of the 2008 IEEE Conference on Soft Computing on Industrial Applications, Muroran, Japan, June 25-27, pp. 107-112, 2008.
[8]. KDDCUP 99 dataset, available at: http://kdd.ics.uci.edu/dataset/kddcup99/kddcup99.html.
[9]. MIT Lincoln Labs, 1998 DARPA Intrusion Detection Evaluation. Available on: http://www.ll.mit.edu/mission/communications/ist/corpora/ide val/ index.html, February 2008.
[10]. G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi, “Robust Pre-processing and Random Forests Technique for Network Probe Anomaly Detection”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-1, Issue-6, (January 2012).
[11]. Jiawei Han and Micheline Kamber “Data mining concepts and techniques” Morgan Kaufmann publishers an imprint of Elsevier .ISBN 978-1- 55860-901-3. Indian reprint ISBN 978-81-312- 0535-8.
[12]. I. H. Witten and E. Frank, Data Mining: Practical Machine Learning Toolsand Techniques, Second ed. San Fransisco: Morgan Kaufmann, 2005.
[13]. L. Ke, Z. Fenga, and Z. Rena, "An efficient ant colony optimization approach to attribute reduction in rough set theory " Pattern Recognition Letters, vol. 29, no. 9, pp. 1351-1357, July 2008.
[14]. W.C. Yeh, W.W. Chang, Y.Y. Chung, “A new hybrid approach for mining breast cancer pattern using discrete particle swarm optimization and statistical method”, Expert System with Applications 36 (May (4)) (2009) 8204–8211.
[15]. Yuk Ying Chung, Noorhaniza Wahid: “A hybrid network intrusion detection system using simplified swarm optimization (SSO)”. Appl. Soft Computing. 12(9): 3014-3022 (2012).
[16]. J. Quinlan, C4.5: “Programs for Machine Learning”. Morgan Kaufmann, 1993.
[17]. D. Ruck, S. Rogers, M. Kabrisky, M. Oxley, and B. Suter, “The multilayer perceptron as an approximation to a Bayes optimaldiscriminant function,” IEEE Transactions on Neural Networks, vol. 1, no. 4 pp. 296–298, 1990.
[18]. D. Aldous, “The continuum random tree. I,” The Annals of Probability, pp. 1–28, 1991.
[19]. “Waikato environment for knowledge analysis (weka) version 3.5.7.” Available on: http://www.cs.waikato.ac.nz/ml/weka/, June, 2008.
[20]. Y. Chen, D. Miaoa, and R. Wanga, "A rough set approach to feature selection based on ant colony optimization," Pattern Recognition Letters, vol. 31, no. 3, pp. 226-233, Feb. 2010.
[21]. Noorhaniza Wahid “A Novel Approach To Data Mining Using Simplified Swarm Optimization “, Thesis submitted to university of Sydney, January 2011