We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Data Preprocessing for Intrusion Detection System using Swarm Intelligence Techniques

by S. Revathi, A. Malathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 6
Year of Publication: 2013
Authors: S. Revathi, A. Malathi
10.5120/13116-0458

S. Revathi, A. Malathi . Data Preprocessing for Intrusion Detection System using Swarm Intelligence Techniques. International Journal of Computer Applications. 75, 6 ( August 2013), 22-27. DOI=10.5120/13116-0458

@article{ 10.5120/13116-0458,
author = { S. Revathi, A. Malathi },
title = { Data Preprocessing for Intrusion Detection System using Swarm Intelligence Techniques },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 6 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number6/13116-0458/ },
doi = { 10.5120/13116-0458 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:43:33.603967+05:30
%A S. Revathi
%A A. Malathi
%T Data Preprocessing for Intrusion Detection System using Swarm Intelligence Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 6
%P 22-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to access of malicious data in internet, Intrusion detection system becomes an important element in system security that controls real time data and leads to huge dimensional problem, so a data pre-processing is necessary to reduce haziness and to clean network data. To reduce false positive rate and to increase efficiency of detection, the paper proposed a new swarm intelligence technique to solve complex optimization problem. The paper work based on hybrid Simplified Swarm Optimization (SSO) algorithm to pre-process the data. SSO is a simplified Particle Swarm Optimization (PSO) that has a self-organizing ability to emerge in highly distributed control problem area, and is versatile, strong and cost effective to resolve complex computing environments. It recognize not only known attacks but also filters noisy and irrelevant data that may result on knowledge Discovery and Data Mining (KDDCup 1999) dataset and compared to a new hybrid Partial Swarm Optimization with Random Forest (PSO-RF) and with other benchmark classifiers. The testing result shows that the proposed method provides competitively high detection rates and produce a near optimal solution.

References
  1. R. Heady, G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system. Technical report, Computer Science Department, University of New Mexico, (August 1990).
  2. Khaled Sellami, Rachid Chelouah, Lynda Sellami, Mohamed Ahmed-Nacer, Intrusion Detection Based on Swarm Intelligence using mobile agent, ICSI 2011: International conference on swarm intelligence, Cergy, France, June 14-15,( 2011).
  3. P. Amudha, H. Abdul Rauf Ph. D, A Study on Swarm Intelligence Techniques in Intrusion Detection, IJCA Special Issue on "Computational Intelligence & Information Security" CIIS (2012).
  4. Deris tiawan, Abdul Hanan Abdullah, Mohd. Yazid dris, Characterizing Network Intrusion Prevention System, International Journal of Computer Applications (0975 – 8887), Volume 14– No. 1, (January 2011).
  5. G. Sunil Kumar, C. V. K Sirisha, Kanaka Durga. R, A. Devi, Robust Pre-processing and Random Forests Technique for Network Probe Anomaly Detection, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-1, Issue-6, (January 2012).
  6. S. Banerjee, C. Grosan, A. Abraham, P. K. Mahanti, Intrusion detection on sensor networks using emotional ants, International Journal of Applied Science and Computations 12 (3) 152–173, (2005).
  7. S. Banerjee, C. Grosan, A. Abraham, IDEAS: intrusion detection based on emotional ants for sensors, in: Proceedings of the 5th International Conference on Intelligent Systems Design and Applications (ISDS'05), Wroclaw, Poland, pp. 344–349, (2005).
  8. G. Chen, Q. Chen, W. Guo, A PSO-based approach to rule learning in network intrusion detection, in: Advances in Soft Computing, vol. 40, Springer, Berlin- Heidelberg, and pp. 666–673, (2007).
  9. Arif Jamal Malik, Waseem Shahzad, Farrukh Aslam Khan. Binary PSO and Random Forests Algorithms for PROBE attacks Detection in a network. In Proceedings of IEEE Congress on Evolutionary Computation, 662-668, (2011).
  10. Dharmendra G. Bhatti, P. V. Virparia, Bankim Patel, Data Pre-processing for Reducing False Positive Rate in Intrusion Detection, International Journal of Computer Applications (0975 – 8887) Volume 57– No. 5, November (2012).
  11. KDDCUP 99 dataset, available at: http://kdd. ics. uci. edu/dataset/kddcup99/kddcup99. html.
  12. Bhawana Pillai, Uday Pratap Singh, NIDS for Unsupervised Authentication Records of KDD Dataset in MATLAB, (IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Wireless & Mobile Networks, Page 57 – 61, ISSN 2156-5570 (Online), (2011).
  13. S. H. Zahiri and S. A. Seyedin, Swarm intelligence based classifiers, Journal of the Franklin Institute, vol. 344, no. 5, pp. 362-376, (2007).
  14. Salem benferhat, karima sedki, karim tabia, pre-processing rough network traffic for intrusion detection purposes, iadis international telecommunications, networks and systems (2007).
  15. T. Sousa, A. Silva, A. Neves, Particle swarm based data mining algorithms for classification tasks, Parallel Computing 6 (May/June) (2004) 767–783.
  16. K. Shafi, H. A. Abbass, Biologically inspired complex adaptive systems approaches to network intrusion detection, Information Security Technical Report 12 (4) (2007) 209–217.
  17. Yao Liu, Yuk Ying Chung, Wei-Chang Yeh: Simplified Swarm Optimization with Sorted Local Search for golf data classification. IEEE Congress on Evolutionary Computation (2012): 1-8.
  18. Angeline P J. (1999). Using selection to improve Particle Swarm Optimization of the 1999 Congress on Evolutionary Computation. Piscataway. NJ: IEEE Press, (1999):84-89.
  19. Lepetit, V. , Fu, P. : Key point recognition using randomized trees. IEEE Trans. Pattern Anal. Mach. Intel. 28(9), 1465– 1479 (2006).
  20. Ozuysal, M. , Fua, P. , Lepetit, V. : Fast key point recognition in ten lines of code. In: IEEE CVPR (2007).
  21. Bosh, A. , Zisserman, A. , Munoz, X. : Image classification using Random Forests and ferns. In: IEEE ICCV (2007).
  22. Introduction to Decision Trees and Random Forests, Ned Horning; American Museum of Natural History's.
  23. W. C. Yeh, W. W. Chang, Y. Y. Chung, A new hybrid approach for mining breast cancer pattern using discrete particle swarm optimization and statistical method, Expert System with Applications 36 (May (4)) (2009) 8204–8211.
  24. Yuk Ying Chung, Noorhaniza Wahid: A hybrid network intrusion detection system using simplified swarm optimization (SSO). Appl. Soft Computing. 12(9): 3014-3022 (2012).
  25. Tadeusz Pietraszek and Axel Tanner, Data Mining and Machine Learning - Towards Reducing False Positives in Intrusion Detection, Information Security Tech. Report (Elsevier Advanced Technology Publications Oxford, UK), Volume 10 Issue 3, Pages 169-183, (January 2005).
  26. Zheng Zhang, Jun Li, C. N. Manikopoulos, Jay Jorgenson, Jose Ucles, HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Pre-processing and Neural Network Classification, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 5-6 (June, 2001).
  27. Banks A, Vincent J, Anyakoha C. A review of Particle Swarm Optimization, Part I: Background and Development, Natural Computing, vol. 6, 467–484. (2008).
  28. Kennedy J, Eberhart R. Particle Swarm Optimization. In Proceedings of IEEE International Conference on Neural Networks, 1942-1948. (1995).
  29. Qinghai Bai. Analysis of Particle Swarm Optimization Algorithm. In Computer and information Science, Vol 3, No1. (Feb 2010).
Index Terms

Computer Science
Information Sciences

Keywords

Swarm intelligence Simplified Swarm Optimization Partial Swarm Optimization Random Forest Intrusion detection