Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)

2021 ◽  
Vol 15 (2) ◽  
pp. 113-130
Author(s):  
V. Sandeep ◽  
Saravanan Kondappan ◽  
Amir Anton Jone ◽  
Raj Barath S.

In the last decade, many researchers have proposed several models of classification algorithms for enhancing the accuracy performance of IDSs. However, there is a minor issue arising in the classifier's incapability to process high-dimensional data. Using several classifiers always outperforms a single classifier's performance. This paper proposes a novel intrusion detection system by classifying data with SVM as well as C4.5 decision tree algorithm. The NSL-KDD dataset is first preprocessed with principal component analysis (PCA) and later feature selected with an improved particle swarm optimization (I-PSO). This framework improved the time consumption and inaccurate feature selection issues in other methodologies. Upon simplifying features more effectively, the outcomes display an excellent agreement with the conventional PSO techniques and their results, and also produce enhanced outcomes when compared to only single classifier. The results demonstrate better performance when subject to different attack-scenarios and can be used for enterprise network security applications.

2021 ◽  
Vol 12 (2) ◽  
pp. 57-73
Author(s):  
Preethi D. ◽  
Neelu Khare

Network intrusion detection system (NIDS) plays a major role in ensuring network security. In this paper, the authors propose a PSO-DNN-based intrusion detection system. The correlation-based feature selection (CFS) applied for feature selection with particle swarm optimization (PSO) as search method and deep neural networks (DNN) for classification of network intrusions. The Adam optimizer is applied for optimizing the learning rate, and softmax classifier is used for classification. The experimentations were duly conducted on the standard benchmark NSL-KDD dataset. The proposed model is validated using 10-fold cross-validation and evaluated using the performance metrics such as accuracy, precision, recall, and F1-score. Also, the results are also compared with DNN and CFS+DNN. The experimental results show that the proposed model performs better compared with other methods considered for comparison.


2021 ◽  
pp. 579-588
Author(s):  
Siti Norwahidayah Wahab ◽  
Noor Suhana Sulaiman ◽  
Noraniah Abdul Aziz ◽  
Nur Liyana Zakaria ◽  
Ainal Amirah Abd Aziz

2021 ◽  
Vol 18 (6) ◽  
pp. 8024-8044
Author(s):  
B. Ida Seraphim ◽  
◽  
E. Poovammal ◽  
Kadiyala Ramana ◽  
Natalia Kryvinska ◽  
...  

<abstract> <p>Cybersecurity experts estimate that cyber-attack damage cost will rise tremendously. The massive utilization of the web raises stress over how to pass on electronic information safely. Usually, intruders try different attacks for getting sensitive information. An Intrusion Detection System (IDS) plays a crucial role in identifying the data and user deviations in an organization. In this paper, stream data mining is incorporated with an IDS to do a specific task. The task is to distinguish the important, covered up information successfully in less amount of time. The experiment focuses on improving the effectiveness of an IDS using the proposed Stacked Autoencoder Hoeffding Tree approach (SAE-HT) using Darwinian Particle Swarm Optimization (DPSO) for feature selection. The experiment is performed in NSL_KDD dataset the important features are obtained using DPSO and the classification is performed using proposed SAE-HT technique. The proposed technique achieves a higher accuracy of 97.7% when compared with all the other state-of-art techniques. It is observed that the proposed technique increases the accuracy and detection rate thus reducing the false alarm rate.</p> </abstract>


Sign in / Sign up

Export Citation Format

Share Document