CFP last date
20 January 2025
Reseach Article

Enhancing the Efficiency of Detecting Intrusions using Improved PSOGMM

by Anidua Bano, Pankaj Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 18
Year of Publication: 2019
Authors: Anidua Bano, Pankaj Sharma
10.5120/ijca2019919021

Anidua Bano, Pankaj Sharma . Enhancing the Efficiency of Detecting Intrusions using Improved PSOGMM. International Journal of Computer Applications. 178, 18 ( Jun 2019), 19-23. DOI=10.5120/ijca2019919021

@article{ 10.5120/ijca2019919021,
author = { Anidua Bano, Pankaj Sharma },
title = { Enhancing the Efficiency of Detecting Intrusions using Improved PSOGMM },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 18 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number18/30635-2019919021/ },
doi = { 10.5120/ijca2019919021 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:50:47.155531+05:30
%A Anidua Bano
%A Pankaj Sharma
%T Enhancing the Efficiency of Detecting Intrusions using Improved PSOGMM
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 18
%P 19-23
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network security is one of the most significant problems in computer network management and intrusion. In recent years, the intrusion has occurred as a major area of ​​security for the network. Each section of the attacks is considered to be a particular problem and IDS are doing well when specialized algorithms are handled. Several surveys show that penetration in the network has been steadily increased and has led to private privacy theft. It is an important platform for recent attacks. A network intrusion is illegal activities in the computer network. It is, therefore, necessary to improve an operative intrusion system. In this paper, we use improved particle swarm optimization Gaussian mixture model (IPSOGMM) to detect infiltrative inspection. This paper shows compatibility between an integrated system using an IGKM algorithm and an interchange control system used by the IPSOGMM algorithm in the KDD-99 dataset. Finding that the test was discovered uses IPSOGMM algorithm is additionally correct when compared to IGKM algorithm.

References
  1. Zhang Z, Shen H. Application of online-training SVMs for real-time intrusion detection with different considerations. Computer Communications. 2005; 28(12):1428–42.
  2. Shyu ML, Chen S, SarinnapakornK, Chang L. A novelanomaly detection scheme based on principal componentclassifier. Proceedings of the IEEE Foundations and NewDirections of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM03), 2003. p. 172–79.
  3. Denning DE. An Intrusion-Detection Model’,IEEE Transactions on Software Engineering. 2006;SE-13(2):222–32.
  4. Lee W, Stolfo SJ. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security. 2000; 3(4):227–61.
  5. Landgrebe TCW, Pavel P, Duin RPW, Bradley AP.Precision-Recall Operating characteristic (PROC) curves in imprecise environments. Proceedings of 18th International Conference on Pattern Recognition, ICPR2006, HongKong. 2006; 4. p.123–27.
  6. Wang W, Guan XH, Zhong X. Processing of massive audit data streams for real tim anomaly intrusion detection. Computer communications. 2008; 31(1):58–72.
  7. Garcia-Teodoro P, Diaz-Verdejo J, Macia-Fernandez G,Vazquez E. Anomaly-based network intrusion detection:techniques, systems and challenges. Computer Security.2009; 28(1-2):18–28.
  8. MIT Lincoln Labs. DARPA intrusion detection evaluation [Online]. 2014 Nov. Available from:http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/index.html
  9. Lippmann RP, Fried DJ, Graf I, Haines JW. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. Proceedings of the 2000 DARPAInformation Survivability Conference and Exposition(DISCEX’00), Hilton Head, SC. 2000; 2. p. 12–26.
  10. Tavallaee M, Bagheri E, Lu W, Ghorbani AA. Detailed analysis of the KDD CUP 99 Dataset. Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications. 2009; 1–6
  11. Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y. Intrusion detection by machine learning: A Review. Expert Systems withApplications. 2009; 36(10):1994–2000.
  12. Witten IH, Frank E, Hall MA. Data Mining- PracticalMachine Learning Tools and Techniques. MorganKaufmann: San Francisco, CA, 2011.
  13. Wu X, Kumar V, Quinlan JR, Ghosh J, Yang Q, Motoda H, McLachlan GJ, Ng A, Liu B, Yu PS, Zhou Z, Steinbach M, Hand DJ, Steinberg D. Top Ten Data Mining Algorithms. Knowledge and Information Systems Journal, Springer-Verlag London. 2007; 14(1):1–37.
  14. Gaffney JE, Ulvila JW. Evaluation of intrusion detectors: A decision theory approach. Proceedings of the IEEE Symposium on Security and Privacy, S&P’01, Oakland, CA, USA. 2001; 50–61
  15. Apte C, Weiss S. Data mining with decision trees and decision rules. Future Generation Computer Systems. 1997; 13(2-3):197–210.
  16. AbdJalil K, Kamarudin MH, Masrek MN. Comparison
  17. of Machine Learning algorithms performance in detecting network intrusion. 2010 International Conference on Networking and Information Technology (ICNIT), Manila, IEEE. 2010. p. 221–26.
Index Terms

Computer Science
Information Sciences

Keywords

The intrusion detection system data mining KDD Cupp 99 IGKM and IPSOGMM.