CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Intelligent Intrusion Detection in Computer Networks using Swarm Intelligence

by Apoorv Saxena, Carsten Mueller
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 16
Year of Publication: 2018
Authors: Apoorv Saxena, Carsten Mueller

Apoorv Saxena, Carsten Mueller . Intelligent Intrusion Detection in Computer Networks using Swarm Intelligence. International Journal of Computer Applications. 179, 16 ( Jan 2018), 1-9. DOI=10.5120/ijca2018916224

@article{ 10.5120/ijca2018916224,
author = { Apoorv Saxena, Carsten Mueller },
title = { Intelligent Intrusion Detection in Computer Networks using Swarm Intelligence },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2018 },
volume = { 179 },
number = { 16 },
month = { Jan },
year = { 2018 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2018916224 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:55:30.163226+05:30
%A Apoorv Saxena
%A Carsten Mueller
%T Intelligent Intrusion Detection in Computer Networks using Swarm Intelligence
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 16
%P 1-9
%D 2018
%I Foundation of Computer Science (FCS), NY, USA

Swarm Intelligence is inspired by the collective behaviour of many individuals. It is coordinated using decentralized control and self-organization. The individual simplicity and their complex group behaviours can outperform the vast majority of individual members when solving problems and making decisions. During recent years, the number of attacks on networks has dramatically increased and consequently, interest in network intrusion detection has increased among the researchers. In this research paper, a software architecture is modelled and implemented which uses Ant Colony Optimization (ACO), ACO is combined with Non-Negative Matrix Factorization method for classifying a computer network behaviour as a sequence of system calls.

  1. Vittorio Maniezzo Alberto Colorni, Marco Dorigo. Distributed Optimization by Ant Colonies. In European Conference on Artificial Life, pages 134–142, 1991.
  2. Tony Bradley. Introduction to intrusion detection systems (ids).
  3. Sung-Bae Cho and Hyuk-Jang Park. Efficient anomaly detection by modeling privilege flows using hidden markov model. Comput. Secur., 22(1):45–55, January 2003.
  4. M. Dorigo and L. Gambardella. Ant Colonies for the Traveling Salesman Problem. BioSystems, 43:73–81, 1997.
  5. Marco Dorigo and Thomas St¨utzle. Ant Colony Optimization. Bradford Company, Scituate, MA, USA, 2004.
  6. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff. A sense of self for unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, SP ’96, pages 120–, Washington, DC, USA, 1996. IEEE Computer Society.
  7. David E. Goldberg. Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1st edition, 1989.
  8. Xiaohong Guan, Wei Wang, and Xiangliang Zhang. Fast intrusion detection based on a non-negative matrix factorization model. J. Netw. Comput. Appl., 32(1):31–44, January 2009.
  9. Navneet Kaur Harshna. Survey paper of fuzzy data mining using genetic algorithm for intrusion detection. International Journal of Scientific & Engineering Research, 4(6), jun 2013.
  10. Peter M. Mell Karen A. Scarfone. Guide to intrusion detection and prevention systems (idps). Special Publication 800-94, NIST, Gaithersburg, MD, February 2007.
  11. Daniel D. Lee and H. Sebastian Seung. Learning the parts of objects by nonnegative matrix factorization. Nature, 401:788–791, 1999.
  12. Daniel D. Lee and H. Sebastian Seung. Algorithms for non-negative matrix factorization. In T. K. Leen, T. G. Dietterich, and V. Tresp, editors, Advances in Neural Information Processing Systems 13, pages 556–562. MIT Press, 2001.
  13. Wenke Lee and Salvatore J. Stolfo. Data mining approaches for intrusion detection. In Proceedings of the 7th Conference on USENIX Security Symposium - Volume 7, SSYM’98, pages 6–6, Berkeley, CA, USA, 1998. USENIX Association.
  14. A. Colorni M. Dorigo, V. Maniezzo. Ant system: optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 26(1):29 – 41, February 1996.
  15. Luca M. G M. Dorigo. Ant Colony system: A Cooperative learning approach to the Travelling Salesman Problem. IEEE transaction on evolutionary computation, 1(1):53 – 66, April 1997.
  16. Thomas Sttzle Marco Dorigo. The ant colony optimization metaheuristic: Algorithms, applications, and advances. In Handbook of Metaheuristics, pages 250–285. Springer US.
  17. Robert J. Shimonski. What you need to know about intrusion detection systems, Nov 2002.
  18. Anil Somayaji. Steven A. Hofmeyr, Stephanie Forrest. Intrusion Detection using Sequences of System Calls. Journal of Computer Security, 6(3):151 – 180, August 1998.
  19. Shamik Sural Suvasini Panigrahi. Detection of database intrusion using a two-stage fuzzy system. In Information Security, pages 107–120. Springer Berlin Heidelberg.
  20. Jajish Thomas. Types of intrusion detection systems (ids).
  21. M. Duran Toksari. A hybrid algorithm of ant colony optimization (aco) and iterated local search (ils) for estimating electricity domestic consumption: Case of turkey. International Journal of Electrical Power and Energy Systems, 78:776 – 782, 2016.
  22. C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: alternative data models. Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on, pages 133–145, 1999.
  23. Dit-Yan Yeung and Yuxin Ding. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition, 36:229–243, 2003.
Index Terms

Computer Science
Information Sciences


Ant Colony Optimization Meta-heuristics Anomaly-based Intrusion Detection System Non-Negative Matrix Factorization