Research Article | Open Access | Download PDF
Volume 3 | Issue 5 | Year 2013 | Article Id. IJPTT-V3I8P102 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I8P102Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique
S. Revathi, A. Malathi
Citation :
S. Revathi, A. Malathi, "Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 5, pp. 6-10, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I8P102
Abstract
— Network security risks grow tremendously in recent past, the attacks on computer networks have enhanced hugely and need economical network intrusion detection mechanisms. Data processing and machine-learning techniques are used for network intrusion detection throughout the past few years and have gained abundant quality. In this paper, we propose an intrusion detection mechanism based on simplified particle swarm optimization (SSO) is used to investigate the performance of various dimension reduction techniques along with a set of different classifiers including the proposed approach. SSO is used to find more appropriate set of attributes for classifying network intrusions, and also used as a classifier. In preprocessing step, we reduce the dimensions of the dataset by using various dimension reduction techniques, and then this reduced dataset is offered to the proposed hybrid SSO approach that further optimizes the dimensions of the data and finds an optimal set of features. SSO is an optimization method that has a strong global search capability and is used for dimension optimization. The analysis performed on standard KDD cup99 dataset which contain various kind of intrusion. The experimental results shows the worth of the proposed approach by using different performance metrics.
Keywords
- Swarm intelligence, Simplified Swarm Optimization, optimization, Data mining, Intrusion Detection.
References
[1]. Deris tiawan, Abdul Hanan Abdullah, Mohd. Yazid dris, “Characterizing Network Intrusion Prevention System”, International Journal of Computer Applications (0975 – 8887), Volume 14– No.1, (January 2011).
[2]. J. Han and M. Kamber, Data Mining: Concepts and Techniques. San Fransisco: Morgan Kaufmann, 2001.
[3]. C. Grosan, A. Abraham, and M. Chris, "Swarm Intelligence in Data Mining," Studies in Computational Intelligence, vol. 34, pp. 1-20, Springer-Verlag: Berlin Heidelberg, 2006.
[4]. R. C. Eberhart and Y. Shi, "Particle swarm optimization: developments, applications and resources," in Proceedings of the 2001 Congress on Evolutionary Computation, Seoul, South Korea, May 27-30, vol. 1, pp. 81-86, 2001.
[5]. I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," The Journal of Machine Learning Research, vol. 3, pp. 1157 - 1182, Mar.2003.
[6]. R. Bello, Y. Gomez, A. Nowe, and M. M. García, "Two step particle swarm optimization to solve the feature selection problem," in Proceedings of The 7th International Conference on Intelligent Systems Design and Applications, Rio de Janeiro, Brazil, Oct. 22-24, pp. 691-696, 2007.
[7]. C. S. Yang, L. Y. Chuang, J. C. Li, and C. H. Yang, "Chaotic maps in binary particle swarm optimization for feature selection," in Proceedings of the 2008 IEEE Conference on Soft Computing on Industrial Applications, Muroran, Japan, June 25-27, pp. 107-112, 2008.
[8]. KDDCUP 99 dataset, available at: http://kdd.ics.uci.edu/dataset/kddcup99/kddcup99.html.
[9]. MIT Lincoln Labs, 1998 DARPA Intrusion Detection Evaluation. Available on: http://www.ll.mit.edu/mission/communications/ist/corpora/ide val/ index.html, February 2008.
[10]. G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi, “Robust Pre-processing and Random Forests Technique for Network Probe Anomaly Detection”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-1, Issue-6, (January 2012).
[11]. Jiawei Han and Micheline Kamber “Data mining
concepts and techniques” Morgan Kaufmann
publishers an imprint of Elsevier .ISBN 978-1-
55860-901-3. Indian reprint ISBN 978-81-312-
0535-8.
[12]. I. H. Witten and E. Frank, Data Mining: Practical
Machine Learning Toolsand Techniques, Second ed.
San Fransisco: Morgan Kaufmann, 2005.
[13]. L. Ke, Z. Fenga, and Z. Rena, "An efficient ant
colony optimization approach to attribute reduction
in rough set theory " Pattern Recognition Letters,
vol. 29, no. 9, pp. 1351-1357, July 2008.
[14]. W.C. Yeh, W.W. Chang, Y.Y. Chung, “A new
hybrid approach for mining breast cancer pattern
using discrete particle swarm optimization and
statistical method”, Expert System with Applications
36 (May (4)) (2009) 8204–8211.
[15]. Yuk Ying Chung, Noorhaniza Wahid: “A hybrid
network intrusion detection system using simplified
swarm optimization (SSO)”. Appl. Soft Computing.
12(9): 3014-3022 (2012).
[16]. J. Quinlan, C4.5: “Programs for Machine Learning”.
Morgan Kaufmann, 1993.
[17]. D. Ruck, S. Rogers, M. Kabrisky, M. Oxley, and B.
Suter, “The multilayer perceptron as an
approximation to a Bayes optimaldiscriminant
function,” IEEE Transactions on Neural Networks,
vol. 1, no. 4 pp. 296–298, 1990.
[18]. D. Aldous, “The continuum random tree. I,” The
Annals of Probability, pp. 1–28, 1991.
[19]. “Waikato environment for knowledge analysis
(weka) version 3.5.7.” Available on:
http://www.cs.waikato.ac.nz/ml/weka/, June, 2008.
[20]. Y. Chen, D. Miaoa, and R. Wanga, "A rough set
approach to feature selection based on ant colony
optimization," Pattern Recognition Letters, vol. 31,
no. 3, pp. 226-233, Feb. 2010.
[21]. Noorhaniza Wahid “A Novel Approach To Data
Mining Using Simplified Swarm Optimization “,
Thesis submitted to university of Sydney, January
2011