Skip to main content
Erschienen in: Neural Computing and Applications 6/2016

01.08.2016 | Original Article

A hybrid method consisting of GA and SVM for intrusion detection system

verfasst von: B. M. Aslahi-Shahri, R. Rahmani, M. Chizari, A. Maralani, M. Eslami, M. J. Golkar, A. Ebrahimi

Erschienen in: Neural Computing and Applications | Ausgabe 6/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, a hybrid method of support vector machine and genetic algorithm (GA) is proposed and its implementation in intrusion detection problem is explained. The proposed hybrid algorithm is employed in reducing the number of features from 45 to 10. The features are categorized into three priorities using GA algorithm as the highest important is the first priority and the lowest important is placed in the third priority. The feature distribution is done in a way that 4 features are placed in the first priority, 4 features in the second, and 2 features in the third priority. The results reveal that the proposed hybrid algorithm is capable of achieving a true-positive value of 0.973, while the false-positive value is 0.017.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Massa D, Valverde R (2014) A fraud detection system based on anomaly intrusion detection systems for e-commerce applications. Comput Inf Sci 7(2):117 Massa D, Valverde R (2014) A fraud detection system based on anomaly intrusion detection systems for e-commerce applications. Comput Inf Sci 7(2):117
2.
Zurück zum Zitat Luo B, Xia J (2014) A novel intrusion detection system based on feature generation with visualization strategy. Expert Syst Appl 41(9):4139CrossRef Luo B, Xia J (2014) A novel intrusion detection system based on feature generation with visualization strategy. Expert Syst Appl 41(9):4139CrossRef
3.
Zurück zum Zitat Agah A, Das SK, Basu K, Asadi M (2004) In: Proceedings of network computing and applications, 2004 (NCA 2004). Symposium on third IEEE international. IEEE, pp 343–346 Agah A, Das SK, Basu K, Asadi M (2004) In: Proceedings of network computing and applications, 2004 (NCA 2004). Symposium on third IEEE international. IEEE, pp 343–346
4.
Zurück zum Zitat Anantvalee T, Wu J (2007) Wireless network security. Springer, US, pp 159–180CrossRef Anantvalee T, Wu J (2007) Wireless network security. Springer, US, pp 159–180CrossRef
5.
Zurück zum Zitat Hwang K, Cai M, Chen Y, Qin M (2007) Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Trans Dependable Secure Comput 4(1):41–55CrossRef Hwang K, Cai M, Chen Y, Qin M (2007) Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Trans Dependable Secure Comput 4(1):41–55CrossRef
6.
Zurück zum Zitat Tsang CH, Kwong S, Wang H (2007) Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognit 40(9):2373–2391CrossRefMATH Tsang CH, Kwong S, Wang H (2007) Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognit 40(9):2373–2391CrossRefMATH
7.
Zurück zum Zitat Tsai CF, Lin CY (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222–229MathSciNetCrossRefMATH Tsai CF, Lin CY (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222–229MathSciNetCrossRefMATH
8.
Zurück zum Zitat Jing W, Yan-heng L, Fan-xue M, Rong L (2010) In: The 7th international conference on informatics and systems (INFOS), 2010. IEEE, pp 1–6 Jing W, Yan-heng L, Fan-xue M, Rong L (2010) In: The 7th international conference on informatics and systems (INFOS), 2010. IEEE, pp 1–6
9.
Zurück zum Zitat Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232CrossRef Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232CrossRef
10.
Zurück zum Zitat Kumar G, Reddy DK (2014) In: International conference on electronic systems, signal processing and computing technologies (ICESC), 2014. IEEE, pp 429–433 Kumar G, Reddy DK (2014) In: International conference on electronic systems, signal processing and computing technologies (ICESC), 2014. IEEE, pp 429–433
11.
Zurück zum Zitat Li W (2004) In: Proceedings of the United States Department of Energy Cyber Security Group, pp 1–8 Li W (2004) In: Proceedings of the United States Department of Energy Cyber Security Group, pp 1–8
13.
Zurück zum Zitat Rahmani R, Seyedmahmoudian M, Mekhilef S, Yusof R (2013) Implementation of fuzzy logic maximum power point tracking controller for photovoltaic system. Am J Appl Sci 10:209–218CrossRef Rahmani R, Seyedmahmoudian M, Mekhilef S, Yusof R (2013) Implementation of fuzzy logic maximum power point tracking controller for photovoltaic system. Am J Appl Sci 10:209–218CrossRef
15.
Zurück zum Zitat Rahmani R, Othman M, Shojaei A, Yusof R (2014) Static VAR compensator using recurrent neural network. Electr Eng 96(2):109–119CrossRef Rahmani R, Othman M, Shojaei A, Yusof R (2014) Static VAR compensator using recurrent neural network. Electr Eng 96(2):109–119CrossRef
16.
Zurück zum Zitat Fa HK, Yusof R, Rahmani R, Ahmadi M (2013) Optimization of DNA sensor model based nanostructured graphene using particle swarm optimization technique. J Nanomater 2013(2013):1–9 Fa HK, Yusof R, Rahmani R, Ahmadi M (2013) Optimization of DNA sensor model based nanostructured graphene using particle swarm optimization technique. J Nanomater 2013(2013):1–9
17.
Zurück zum Zitat Rahmani R, Yusof R (2014) A new simple, fast and efficient algorithm for global optimization over continuous search-space problems: radial movement optimization. Appl Math Comput 248:287–300MathSciNetMATH Rahmani R, Yusof R (2014) A new simple, fast and efficient algorithm for global optimization over continuous search-space problems: radial movement optimization. Appl Math Comput 248:287–300MathSciNetMATH
18.
Zurück zum Zitat Rahmani R, Karimi H, Ranjbari L, Emadi M, Seyedmahmoudian M, Shafiabady A, Ismail R (2014) Structure and thickness optimization of active layer in nanoscale organic solar cells. Plasmonics 10(3):495–502CrossRef Rahmani R, Karimi H, Ranjbari L, Emadi M, Seyedmahmoudian M, Shafiabady A, Ismail R (2014) Structure and thickness optimization of active layer in nanoscale organic solar cells. Plasmonics 10(3):495–502CrossRef
19.
Zurück zum Zitat Abdullah K, Lee C, Conti G, Copeland JA, Stasko J (2005) IDS rainstorm: Visualizing IDS alarms. In: IEEE workshops on visualization for computer security, 2005. IEEE, p 1 Abdullah K, Lee C, Conti G, Copeland JA, Stasko J (2005) IDS rainstorm: Visualizing IDS alarms. In: IEEE workshops on visualization for computer security, 2005. IEEE, p 1
20.
Zurück zum Zitat Kruegel C, Toth T (2003) Using decision trees to improve signature-based intrusion detection. In: Recent advances in intrusion detection. Springer, Berlin, pp 173–191 Kruegel C, Toth T (2003) Using decision trees to improve signature-based intrusion detection. In: Recent advances in intrusion detection. Springer, Berlin, pp 173–191
21.
Zurück zum Zitat Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernndez G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput secur 28(1):18–28CrossRef Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernndez G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput secur 28(1):18–28CrossRef
22.
Zurück zum Zitat Wool A (2004) A quantitative study of firewall configuration errors. Computer 37(6):62–67CrossRef Wool A (2004) A quantitative study of firewall configuration errors. Computer 37(6):62–67CrossRef
23.
Zurück zum Zitat Aneetha A, Indhu T, Bose S In: Proceedings of the second international conference on computational science, engineering and information technology. ACM, pp 47–51 Aneetha A, Indhu T, Bose S In: Proceedings of the second international conference on computational science, engineering and information technology. ACM, pp 47–51
24.
Zurück zum Zitat Kohavi R, John GH (1997) Wrappers for feature subset selection. Artif Intell 97(1):273–324CrossRefMATH Kohavi R, John GH (1997) Wrappers for feature subset selection. Artif Intell 97(1):273–324CrossRefMATH
25.
Zurück zum Zitat Chebrolu S, Abraham A, Thomas JP (2005) Feature deduction and ensemble design of intrusion detection systems. Comput Secur 24(4):295–307CrossRef Chebrolu S, Abraham A, Thomas JP (2005) Feature deduction and ensemble design of intrusion detection systems. Comput Secur 24(4):295–307CrossRef
26.
Zurück zum Zitat Li Y, Wang JL, Tian ZH, Lu TB, Young C (2009) Building lightweight intrusion detection system using wrapper-based feature selection mechanisms. Comput Secur 28(6):466–475CrossRef Li Y, Wang JL, Tian ZH, Lu TB, Young C (2009) Building lightweight intrusion detection system using wrapper-based feature selection mechanisms. Comput Secur 28(6):466–475CrossRef
27.
Zurück zum Zitat Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K (2012) An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst Appl 39(1):424–430CrossRef Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K (2012) An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst Appl 39(1):424–430CrossRef
28.
Zurück zum Zitat Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall KR, McClung D, Weber D, Webster SE, Wyschogrod D, Cunningham RK (2000) In: Proceedings of DARPA information survivability conference and exposition, 2000. DISCEX’00, vol. 2. IEEE, vol. 2, pp 12–26 Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall KR, McClung D, Weber D, Webster SE, Wyschogrod D, Cunningham RK (2000) In: Proceedings of DARPA information survivability conference and exposition, 2000. DISCEX’00, vol. 2. IEEE, vol. 2, pp 12–26
29.
Zurück zum Zitat Cunningham RK, Lippmann RP, Fried DJ, Garfinkel SL, Graf I, Kendall KR, Webster SE, Wyschogrod D, Zissman MA (1999) Evaluating intrusion detection systems without attacking your friends: the 1998 darpa intrusion detection evaluation. Tech. rep., DTIC Document Cunningham RK, Lippmann RP, Fried DJ, Garfinkel SL, Graf I, Kendall KR, Webster SE, Wyschogrod D, Zissman MA (1999) Evaluating intrusion detection systems without attacking your friends: the 1998 darpa intrusion detection evaluation. Tech. rep., DTIC Document
30.
Zurück zum Zitat Goh VT, Zimmermann J, Looi M (2009) In: International conference on availability, reliability and security, 2009. ARES’09. IEEE, pp 540–545 Goh VT, Zimmermann J, Looi M (2009) In: International conference on availability, reliability and security, 2009. ARES’09. IEEE, pp 540–545
31.
Zurück zum Zitat Goh VT, Zimmermann J, Looi M (2010) Experimenting with an intrusion detection system for encrypted networks. Int J Cryptol Res 5:172 Goh VT, Zimmermann J, Looi M (2010) Experimenting with an intrusion detection system for encrypted networks. Int J Cryptol Res 5:172
32.
Zurück zum Zitat Hashemi VM, Muda Z, Yassin W (2013) Improving intrusion detection using genetic algorithm. Inf Technol J 12(5):2167–2173CrossRef Hashemi VM, Muda Z, Yassin W (2013) Improving intrusion detection using genetic algorithm. Inf Technol J 12(5):2167–2173CrossRef
33.
Zurück zum Zitat Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297MATH Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297MATH
34.
Zurück zum Zitat Gupta P, Shinde SK (2011) Genetic algorithm technique used to detect intrusion detection. Springer, Berlin, pp 122–131 Gupta P, Shinde SK (2011) Genetic algorithm technique used to detect intrusion detection. Springer, Berlin, pp 122–131
35.
Zurück zum Zitat Alcalá R, Alcalá-Fdez J, Casillas J, Cordón O, Herrera F (2006) Hybrid learning models to get the interpretability–accuracy trade-off in fuzzy modeling. Soft Comput 10(9):717–734CrossRef Alcalá R, Alcalá-Fdez J, Casillas J, Cordón O, Herrera F (2006) Hybrid learning models to get the interpretability–accuracy trade-off in fuzzy modeling. Soft Comput 10(9):717–734CrossRef
36.
Zurück zum Zitat Abraham A, Corchado E, Corchado JM (2009) Hybrid learning machines. Neurocomputing 72(13):2729–2730CrossRef Abraham A, Corchado E, Corchado JM (2009) Hybrid learning machines. Neurocomputing 72(13):2729–2730CrossRef
37.
Zurück zum Zitat Yu E, Cho S (2003) In: Neural networks, 2003. Proceedings of the International Joint Conference on IEEE, vol. 3, pp 2253–2257 Yu E, Cho S (2003) In: Neural networks, 2003. Proceedings of the International Joint Conference on IEEE, vol. 3, pp 2253–2257
38.
Zurück zum Zitat Li L, Jiang W, Li X, Moser KL, Guo Z, Du L, Wang Q, Topol EJ, Wang Q, Rao S (2005) A robust hybrid between genetic algorithm and support vector machine for extracting an optimal feature gene subset. Genomics 85(1):16–23CrossRef Li L, Jiang W, Li X, Moser KL, Guo Z, Du L, Wang Q, Topol EJ, Wang Q, Rao S (2005) A robust hybrid between genetic algorithm and support vector machine for extracting an optimal feature gene subset. Genomics 85(1):16–23CrossRef
39.
Zurück zum Zitat Bolon-Canedo V, Sanchez-Marono N, Alonso-Betanzos A (2011) Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset. Expert Syst Appl 38(5):5947–5957CrossRef Bolon-Canedo V, Sanchez-Marono N, Alonso-Betanzos A (2011) Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset. Expert Syst Appl 38(5):5947–5957CrossRef
40.
Zurück zum Zitat Engen V, Vincent J, Phalp K (2011) Exploring discrepancies in findings obtained with the KDD Cup’99 data set. Intell Data Anal 15(2):251–276 Engen V, Vincent J, Phalp K (2011) Exploring discrepancies in findings obtained with the KDD Cup’99 data set. Intell Data Anal 15(2):251–276
41.
Zurück zum Zitat Raghuveer K et al (2012) Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set. Int J Inf Netw Secur (IJINS) 1(4):294–305 Raghuveer K et al (2012) Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set. Int J Inf Netw Secur (IJINS) 1(4):294–305
42.
Zurück zum Zitat Cheng J, Hatzis C, Hayashi H, Krogel MA, Morishita S, Page D, Sese J (2002) KDD Cup 2001 report. ACM SIGKDD Explor Newsl 3(2):47–64CrossRef Cheng J, Hatzis C, Hayashi H, Krogel MA, Morishita S, Page D, Sese J (2002) KDD Cup 2001 report. ACM SIGKDD Explor Newsl 3(2):47–64CrossRef
Metadaten
Titel
A hybrid method consisting of GA and SVM for intrusion detection system
verfasst von
B. M. Aslahi-Shahri
R. Rahmani
M. Chizari
A. Maralani
M. Eslami
M. J. Golkar
A. Ebrahimi
Publikationsdatum
01.08.2016
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 6/2016
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-015-1964-2

Weitere Artikel der Ausgabe 6/2016

Neural Computing and Applications 6/2016 Zur Ausgabe