We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Intrusion Detection Model based on Differential Evolution

by M. Sailaja, R. Kiran Kumar, P. Sita Rama Murty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 36 - Number 6
Year of Publication: 2011
Authors: M. Sailaja, R. Kiran Kumar, P. Sita Rama Murty
10.5120/4494-6328

M. Sailaja, R. Kiran Kumar, P. Sita Rama Murty . Intrusion Detection Model based on Differential Evolution. International Journal of Computer Applications. 36, 6 ( December 2011), 10-13. DOI=10.5120/4494-6328

@article{ 10.5120/4494-6328,
author = { M. Sailaja, R. Kiran Kumar, P. Sita Rama Murty },
title = { Intrusion Detection Model based on Differential Evolution },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 36 },
number = { 6 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume36/number6/4494-6328/ },
doi = { 10.5120/4494-6328 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:22:27.055325+05:30
%A M. Sailaja
%A R. Kiran Kumar
%A P. Sita Rama Murty
%T Intrusion Detection Model based on Differential Evolution
%J International Journal of Computer Applications
%@ 0975-8887
%V 36
%N 6
%P 10-13
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information systems need to be constantly monitored and audited; analysis of security event logs in heavy traffic networks is a challenging task. In this paper we considered Differential Evolution for the intrusion detection problem. We used NSL_KDD dataset for our experiments which is derived from the standard KDD CUP 99 Intrusion Dataset. We also provided the comparative results of the differential evolution with the state of the art classification algorithm like SVM. We reduced the dimension/features of the NSK_KDD datasets using rough set algorithm and ran DE and SVM this increased the speed of the evolutionary algorithm without compromising the detection rate.

References
  1. R Storn and K Price, Differential Evolution – A Simple and Efficient Heuristic for Global Optimization over Continuous Spaces, Journal of Global Optimization 11: 341-359, 1997.
  2. Xiaobu Liu, Chao Yu, and Zhihua Cai., Differential Evolution Based Band Selection in Hyperspectral Data Classification, ISICA 2010, LNCS 6382, pp. 86-94, 2010.
  3. Mahbood Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani., A Detailed Analysis of the KDD CUP 99 Data set, Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009).
  4. H. Jin, J. Sun, H. Chen, and Z. Han., A Fuzzy Data Mining Based Intrusion Detection System, Proceedings of 10thInternational Workshop on future Trends in Distributed Computing Systems (FTDCS04) IEEE Computer Society, Suzhou, China, May 26-28, 2004, 191-197.
  5. Surat Srinoy., Intrusion Detection Model Based on Particle Swarm Optimization and Support Vector Machine, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2007), 186-192.
  6. H. T. Ptacek and N. T. Newsham., Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection; Secure Networks, Inc., January 1998.
  7. Chih-Chung Chang and Chih-Jen Lin, LIBSVM : a library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2:27:1--27:27, 2011. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
Index Terms

Computer Science
Information Sciences

Keywords

Common Intrusion Detection Framework (CIDF) Differential Evolution (DE) Support Vector Machines (SVM)