Optimized intrusion detection mechanism using soft computing techniques

被引:21
作者
Ahmad, Iftikhar [1 ]
Abdullah, Azween [1 ,2 ]
Alghamdi, Abdullah [1 ]
Hussain, Muhammad [1 ]
机构
[1] King Saud Univ, DSE, CCIS, Riyadh 11543, Saudi Arabia
[2] Univ Teknol Petronas, Dept Comp & Informat Sci, Tronoh 31750, Perak, Malaysia
关键词
Attack; Dataset; Principal component analysis (PCA); Genetic algorithm (GA); Support vector machine (SVM); Detection rate; False positive; False negative; Artificial neural network; Neural network;
D O I
10.1007/s11235-011-9541-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates.
引用
收藏
页码:2187 / 2195
页数:9
相关论文
共 8 条
[1]  
Ahmad I., 2009, SIN '09 Proceedings of the 2nd international conference on Security of information and networks, P229
[2]  
Ahmad I] I., 2009, IEEE S IND EL APPL I
[3]   A novel intrusion detection system based on hierarchical clustering and support vector machines [J].
Horng, Shi-Jinn ;
Su, Ming-Yang ;
Chen, Yuan-Hsin ;
Kao, Tzong-Wann ;
Chen, Rong-Jian ;
Lai, Jui-Lin ;
Perkasa, Citra Dwi .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (01) :306-313
[4]  
Kim DS, 2005, LECT NOTES COMPUT SC, V3498, P415
[5]   A hierarchical intrusion detection model based on the PCA neural networks [J].
Liu, Guisong ;
Yi, Zhang ;
Yang, Shangming .
NEUROCOMPUTING, 2007, 70 (7-9) :1561-1568
[6]   Object detection using feature subset selection [J].
Sun, ZH ;
Bebis, G ;
Miller, R .
PATTERN RECOGNITION, 2004, 37 (11) :2165-2176
[7]   A research using hybrid RBF/Elman neural networks for intrusion detection system secure model [J].
Tong, Xiaojun ;
Wang, Zhu ;
Yu, Haining .
COMPUTER PHYSICS COMMUNICATIONS, 2009, 180 (10) :1795-1801
[8]  
Zargar GR, 2010, LECT NOTES ARTIF INT, V6171, P643, DOI 10.1007/978-3-642-14400-4_50