CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Intrusion Detection System based on SVM and Bee Colony

by Monika Gupta, S. K. Shrivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 10
Year of Publication: 2015
Authors: Monika Gupta, S. K. Shrivastava
10.5120/19576-1377

Monika Gupta, S. K. Shrivastava . Intrusion Detection System based on SVM and Bee Colony. International Journal of Computer Applications. 111, 10 ( February 2015), 27-32. DOI=10.5120/19576-1377

@article{ 10.5120/19576-1377,
author = { Monika Gupta, S. K. Shrivastava },
title = { Intrusion Detection System based on SVM and Bee Colony },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 10 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number10/19576-1377/ },
doi = { 10.5120/19576-1377 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:32.702798+05:30
%A Monika Gupta
%A S. K. Shrivastava
%T Intrusion Detection System based on SVM and Bee Colony
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 10
%P 27-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An intrusion detection system (IDS) is an active process or device that analyzes system and network activity for unauthorized entry. Nowadays many intrusion detection systems are developed based on many different machine learning techniques. Some of the models are based on single classifying techniques while some models are based on combining different classifying techniques, such as hybrid or ensemble techniques. The basic task is to classify network activities (in the network log as connection records) as normal or abnormal while minimizing misclassification. Even if different classification models have been developed for network intrusion detection, each classification technique has its vitality and vulnerability. The machine learning based SVM method is a good choice for learning with little volume of data. Whenever new information is added into a system, updating of the old model is required immediately to ensure that the system is properly protected. As retraining may take weeks, or even months, it is impractical to retrain the new model on all available data. Thus, a mechanism is needed to generate an adaptive model that can be updated by cooperation of the old model with the new information. We can take advantage of the clustering based on Bee Colony in updating the models. We propose a new approach of combining SVM and Bee Colony to achieve high quality performance of Intrusion Detection System. Our algorithm is implemented and evaluated using a standard benchmark KDD99 data set. In this paper experimental result shows that SVM with Bee colony achieves an average accuracy is 88. 46%.

References
  1. Qinglei Zhang, Wenying Feng. 2009. Network Intrusion Detection by Support Vectors and Ant Colony. Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009), pp 639-642.
  2. J. C. Burges and Christopher. 1998. A tutorial on support vector machines for pattern recognition. DataMining and Knowledge Discovery 2, PP. 121-167.
  3. S. Kotsiantis. 2007. Supervised machine learning: A Review of classification techniques. Informatics Journal 31, PP. 249-268.
  4. R. O. Duda, P. E. Hart and D. G. Stock. 2001. Unsupervised Learning and Clustering (2nd edition). wiley, New York, ISBN 0-471-05669-3, P. 571.
  5. Ashis Pradhan,. 2012. SUPPORT VECTOR MACHINE-A Survey. International Journal of Emerging echnology and Advanced Engineering. vol. 2, Issue 8, pp 82-85.
  6. Reda M. Elbasiony, Elsayed A. Sallam, Tarek E. Eltobely, Mahmoud M. Fahmy. 2013. A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Engineering Journal.
  7. Levent Koc, Thomas A. Mazzuchi, Shahram Sarkani. 2012. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Systems with Applications 39. pp 13492–13500.
  8. Wenying Feng, Qinglei Zhang, Gongzhu Hu, Jimmy Xiangji Huang. 2014. Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Generation Computer Systems.
  9. Jaskiran Kaur, Inderpal Singh. (2013, June). A Survey on Ant Colony Optimization. International Journel Of Compute r Science & Engineering Technology (Ijcset). Issn: 2229-3345 Vol. 4 No.
  10. S. J. Horng, M. Y. Su, Y. H. Chen, T. W. Kao, R. J. Chen, J. L. Lai, C. D. Perkasa. 2011. A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Systems with Applications. 38, 306–313
  11. Monther Aldwairi, Yaser Khamayseh and Mohammad Al-Masri. 2012. Application of artificial bee colony for intrusion detection systems. Security And Communication Networks Security Comm. Networks.
  12. Abolfazl Toroghi Haghighat, "Data Clustering Using Bee Colony Optimization" ICCGI 2012: The Seventh International Multi-Conference on Computing in the Global Information Technology.
  13. S. X. Wu, W. Banzhaf. 2010. The use of computational intelligence in intrusion detection systems: a review. Applied Soft Computing 10 (2010) 1–35.
  14. C. -H. Tsang, S. Kwong. 2006. Ant colony clustering and feature extraction for anomaly intrusion detection. In: warm Intelligence in Data Mining, in: Studies in Computational Intelligence. vol. 34, Springer, , pp. 101–123.
  15. S. Janakiraman, V. Vasudevan. 2011. ACO based distributed intrusion detection system. Journal of Digital Content Technology and its Applications 3 (1).
  16. Lincoln Laboratory, MIT, Intrusion detection attacksdatabase,2009. http://www. ll. mit. edu/mission/communications/ist/corpora/ideval/docs/attackDB. html.
  17. S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, P. K. Chan, 2000 Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection: results from the jam project 2, , pp. 1130–1144.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System (IDS) Data Classification Machine Learning Support Vector Machine (SVM) Bee Colony.