Skip to main content
Erschienen in: Soft Computing 21/2020

06.05.2020 | Methodologies and Application

A novel Chaotic Flower Pollination-based intrusion detection framework

verfasst von: Amrit Pal Singh, Arvinder Kaur, Saibal Kumar Pal

Erschienen in: Soft Computing | Ausgabe 21/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rise of network on handheld devices, security of the network has become critical issue. Intrusion detection system is used to predict intrusive packets on network; two-step procedure has been used to predict the intrusion, i.e., feature selection and then classification. Firstly, unwanted and expandable features in data lead to network classification problem which affect the decision capability of the classifiers, so we need optimize feature selection technique. Feature selection technique used in this paper is based on the correlation information known as correlation-based feature selection (CFS). In this paper, CFS’s search algorithm is implemented using Chaotic Flower Pollination Algorithm (CFPA) that logically selects the most favorable features for classification referred as CFPA-CFS. Further, hybridization of CFPA and support vector machine classifier is implemented and named as CFPSVM. Finally, novel IDS framework uses CFPA-CFS and CFPSVM in sequence to predict the intrusion. Further, performance of proposed framework is evaluated using two intrusion detection evaluation datasets, namely KDDCup99 and NSL-KDD. The results demonstrate that proposed CFPA-CFS contributes more critical features for CFPSVM to achieve better accuracy compared with the state-of-the-art methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Abdel-Raouf O, Abdel-Baset M, El-Henawy I (2014a) An improved chaotic bat algorithm for solving integer programming problems. Int J Mod Educ Comput Sci 6(8):18 Abdel-Raouf O, Abdel-Baset M, El-Henawy I (2014a) An improved chaotic bat algorithm for solving integer programming problems. Int J Mod Educ Comput Sci 6(8):18
Zurück zum Zitat Abdel-Raouf O, El-Henawy I, Abdel-Baset M et al (2014b) A novel hybrid flower pollination algorithm with chaotic harmony search for solving sudoku puzzles. Int J Mod Educ Comput Sci 6(3):38 Abdel-Raouf O, El-Henawy I, Abdel-Baset M et al (2014b) A novel hybrid flower pollination algorithm with chaotic harmony search for solving sudoku puzzles. Int J Mod Educ Comput Sci 6(3):38
Zurück zum Zitat Abraham A, Jain R, Thomas J, Han SY (2007) D-scids: distributed soft computing intrusion detection system. J Netw Comput Appl 30(1):81–98 Abraham A, Jain R, Thomas J, Han SY (2007) D-scids: distributed soft computing intrusion detection system. J Netw Comput Appl 30(1):81–98
Zurück zum Zitat Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin
Zurück zum Zitat Abualigah LMQ, Hanandeh ES (2015) Applying genetic algorithms to information retrieval using vector space model. Int J Comput Sci Eng Appl 5(1):19 Abualigah LMQ, Hanandeh ES (2015) Applying genetic algorithms to information retrieval using vector space model. Int J Comput Sci Eng Appl 5(1):19
Zurück zum Zitat Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795 Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795
Zurück zum Zitat Abualigah LM, Khader AT, Hanandeh ES (2018a) A combination of objective functions and hybrid krill herd algorithm for text document clustering analysis. Eng Appl Artif Intell 73:111–125 Abualigah LM, Khader AT, Hanandeh ES (2018a) A combination of objective functions and hybrid krill herd algorithm for text document clustering analysis. Eng Appl Artif Intell 73:111–125
Zurück zum Zitat Abualigah LM, Khader AT, Hanandeh ES (2018b) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071 Abualigah LM, Khader AT, Hanandeh ES (2018b) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071
Zurück zum Zitat Abualigah LM, Khader AT, Hanandeh ES (2018c) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456–466 Abualigah LM, Khader AT, Hanandeh ES (2018c) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456–466
Zurück zum Zitat Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60:708–713 Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60:708–713
Zurück zum Zitat Altwaijry H, Algarny S (2012) Bayesian based intrusion detection system. J King Saud Univ Comput Inf Sci 24(1):1–6 Altwaijry H, Algarny S (2012) Bayesian based intrusion detection system. J King Saud Univ Comput Inf Sci 24(1):1–6
Zurück zum Zitat Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998MathSciNetMATH Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998MathSciNetMATH
Zurück zum Zitat Arana-Daniel N, Gallegos AA, López-Franco C, Alanís AY, Morales J, López-Franco A (2016) Support vector machines trained with evolutionary algorithms employing kernel adatron for large scale classification of protein structures. Evol Bioinform 12:EBO-S40912 Arana-Daniel N, Gallegos AA, López-Franco C, Alanís AY, Morales J, López-Franco A (2016) Support vector machines trained with evolutionary algorithms employing kernel adatron for large scale classification of protein structures. Evol Bioinform 12:EBO-S40912
Zurück zum Zitat Arora IS, Bhatia GK, Singh AP (2016) Comparative analysis of classification algorithms on KDD’99 data set. Int J Comput Netw Inf Secur 8(9):34 Arora IS, Bhatia GK, Singh AP (2016) Comparative analysis of classification algorithms on KDD’99 data set. Int J Comput Netw Inf Secur 8(9):34
Zurück zum Zitat Ashwin P (1997) Cycles homoclinic to chaotic sets; robustness and resonance. Chaos Interdiscip J Nonlinear Sci 7(2):207–220MathSciNetMATH Ashwin P (1997) Cycles homoclinic to chaotic sets; robustness and resonance. Chaos Interdiscip J Nonlinear Sci 7(2):207–220MathSciNetMATH
Zurück zum Zitat Aslani H, Yaghoobi M, Akbarzadeh TMR (2015) Chaotic inertia weight in black hole algorithm for function optimization. In: 2015 International congress on technology, communication and knowledge (ICTCK). IEEE, pp 123–129 Aslani H, Yaghoobi M, Akbarzadeh TMR (2015) Chaotic inertia weight in black hole algorithm for function optimization. In: 2015 International congress on technology, communication and knowledge (ICTCK). IEEE, pp 123–129
Zurück zum Zitat Chakravarthy VVSSS, Chowdary PSR, Panda G, Anguera J, Andújar A, Majhi B (2018) On the linear antenna array synthesis techniques for sum and difference patterns using flower pollination algorithm. Arab J Sci Eng 43(8):3965–3977 Chakravarthy VVSSS, Chowdary PSR, Panda G, Anguera J, Andújar A, Majhi B (2018) On the linear antenna array synthesis techniques for sum and difference patterns using flower pollination algorithm. Arab J Sci Eng 43(8):3965–3977
Zurück zum Zitat El-henawy I, Ismail M (2014) An improved chaotic flower pollination algorithm for solving large integer programming problems. Int J Digit Content Technol Its Appl 8(3):72 El-henawy I, Ismail M (2014) An improved chaotic flower pollination algorithm for solving large integer programming problems. Int J Digit Content Technol Its Appl 8(3):72
Zurück zum Zitat Faisal MA, Aung Z, Williams JR, Sanchez A et al (2015) Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9(1):31–44 Faisal MA, Aung Z, Williams JR, Sanchez A et al (2015) Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9(1):31–44
Zurück zum Zitat Fister I Jr, Perc M, Kamal SM, Fister I (2015) A review of chaos-based firefly algorithms: perspectives and research challenges. Appl Math Comput 252:155–165MathSciNetMATH Fister I Jr, Perc M, Kamal SM, Fister I (2015) A review of chaos-based firefly algorithms: perspectives and research challenges. Appl Math Comput 252:155–165MathSciNetMATH
Zurück zum Zitat Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1–2):18–28 Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1–2):18–28
Zurück zum Zitat Hall MA (1999) Correlation-based feature selection for machine learning. Ph.D. thesis, University of Waikato Hamilton Hall MA (1999) Correlation-based feature selection for machine learning. Ph.D. thesis, University of Waikato Hamilton
Zurück zum Zitat He X, Huang J, Rao Y, Gao L (2016) Chaotic teaching-learning-based optimization with lévy flight for global numerical optimization. Comput Intell Neurosci 2016:43 He X, Huang J, Rao Y, Gao L (2016) Chaotic teaching-learning-based optimization with lévy flight for global numerical optimization. Comput Intell Neurosci 2016:43
Zurück zum Zitat Hitam NA, Ismail AR, Saeed F (2019) An optimized support vector machine (SVM) based on particle swarm optimization (PSO) for cryptocurrency forecasting. Procedia Comput Sci 163:427–433 Hitam NA, Ismail AR, Saeed F (2019) An optimized support vector machine (SVM) based on particle swarm optimization (PSO) for cryptocurrency forecasting. Procedia Comput Sci 163:427–433
Zurück zum Zitat Hongwu L (2009) An adaptive chaotic particle swarm optimization. In: ISECS international colloquium on computing, communication, control, and management, 2009 (CCCM 2009), vol 2. IEEE, pp 324–327 Hongwu L (2009) An adaptive chaotic particle swarm optimization. In: ISECS international colloquium on computing, communication, control, and management, 2009 (CCCM 2009), vol 2. IEEE, pp 324–327
Zurück zum Zitat Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. Procedia Comput Sci 48:338–346 Jabez J, Muthukumar B (2015) Intrusion detection system (IDS): anomaly detection using outlier detection approach. Procedia Comput Sci 48:338–346
Zurück zum Zitat Karim A (2005) Computational intelligence for network intrusion detection: recent contributions. In: International conference on computational and information science. Springer, Berlin, pp 170–175 Karim A (2005) Computational intelligence for network intrusion detection: recent contributions. In: International conference on computational and information science. Springer, Berlin, pp 170–175
Zurück zum Zitat Kaur A, Pal SK, Singh AP (2018a) Hybridization of k-means and firefly algorithm for intrusion detection system. Int J Syst Assur Eng Manag 9:901–910 Kaur A, Pal SK, Singh AP (2018a) Hybridization of k-means and firefly algorithm for intrusion detection system. Int J Syst Assur Eng Manag 9:901–910
Zurück zum Zitat Kaur A, Pal SK, Singh AP (2018b) New chaotic flower pollination algorithm for unconstrained non-linear optimization functions. Int J Syst Assur Eng Manag 9:853–865 Kaur A, Pal SK, Singh AP (2018b) New chaotic flower pollination algorithm for unconstrained non-linear optimization functions. Int J Syst Assur Eng Manag 9:853–865
Zurück zum Zitat Kaya D (2019) Optimization of SVM parameters with hybrid cs-pso algorithms for Parkinson’s disease in labview environment. Parkinson’s Disease 2019 Kaya D (2019) Optimization of SVM parameters with hybrid cs-pso algorithms for Parkinson’s disease in labview environment. Parkinson’s Disease 2019
Zurück zum Zitat Kohli M, Arora S (2018) Chaotic grey wolf optimization algorithm for constrained optimization problems. J Comput Des Eng 5(4):458–472 Kohli M, Arora S (2018) Chaotic grey wolf optimization algorithm for constrained optimization problems. J Comput Des Eng 5(4):458–472
Zurück zum Zitat Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30(8):625–642 Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30(8):625–642
Zurück zum Zitat Liu H, Abraham A, Clerc M (2007) Chaotic dynamic characteristics in swarm intelligence. Appl Soft Comput 7(3):1019–1026 Liu H, Abraham A, Clerc M (2007) Chaotic dynamic characteristics in swarm intelligence. Appl Soft Comput 7(3):1019–1026
Zurück zum Zitat Mukherjee S, Sharma N (2012) Intrusion detection using naive bayes classifier with feature reduction. Procedia Technol 4:119–128 Mukherjee S, Sharma N (2012) Intrusion detection using naive bayes classifier with feature reduction. Procedia Technol 4:119–128
Zurück zum Zitat Nadiammai G, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inform J 15(1):37–50 Nadiammai G, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inform J 15(1):37–50
Zurück zum Zitat Pan W, Li W (2005) A hybrid neural network approach to the classification of novel attacks for intrusion detection. In: International symposium on parallel and distributed processing and applications. Springer, Berlin, pp 564–575 Pan W, Li W (2005) A hybrid neural network approach to the classification of novel attacks for intrusion detection. In: International symposium on parallel and distributed processing and applications. Springer, Berlin, pp 564–575
Zurück zum Zitat Pan G, Xu Y (2016) Chaotic glowworm swarm optimization algorithm based on Gauss mutation. In: 12th International conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD). IEEE, pp 205–210 Pan G, Xu Y (2016) Chaotic glowworm swarm optimization algorithm based on Gauss mutation. In: 12th International conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD). IEEE, pp 205–210
Zurück zum Zitat Panda M, Abraham A, Patra MR (2012) A hybrid intelligent approach for network intrusion detection. Procedia Eng 30:1–9 Panda M, Abraham A, Patra MR (2012) A hybrid intelligent approach for network intrusion detection. Procedia Eng 30:1–9
Zurück zum Zitat Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132 Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132
Zurück zum Zitat Sharma N, Mukherjee S (2012) A novel multi-classifier layered approach to improve minority attack detection in IDS. Procedia Technol 6:913–921 Sharma N, Mukherjee S (2012) A novel multi-classifier layered approach to improve minority attack detection in IDS. Procedia Technol 6:913–921
Zurück zum Zitat Singh AP, Kaur A (2018) Comparative analysis of chaotic variant of firefly algorithm, flower pollination algorithm and dragonfly algorithm for high dimension non-linear test functions. In: International conference on innovations in bio-inspired computing and applications. Springer, Berlin, pp 192–201 Singh AP, Kaur A (2018) Comparative analysis of chaotic variant of firefly algorithm, flower pollination algorithm and dragonfly algorithm for high dimension non-linear test functions. In: International conference on innovations in bio-inspired computing and applications. Springer, Berlin, pp 192–201
Zurück zum Zitat Singh AP, Kaur A (2019) Flower pollination algorithm for feature analysis of kyoto 2006+ data set. J Inf Optim Sci 40(2):467–478 Singh AP, Kaur A (2019) Flower pollination algorithm for feature analysis of kyoto 2006+ data set. J Inf Optim Sci 40(2):467–478
Zurück zum Zitat Singh AP, Singh MD (2014) Analysis of host-based and network-based intrusion detection system. Int J Comput Netw Inf Secur 6(8):41–47 Singh AP, Singh MD (2014) Analysis of host-based and network-based intrusion detection system. Int J Comput Netw Inf Secur 6(8):41–47
Zurück zum Zitat Soliman H, Hikal NA, Sakr NA (2012) A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egypt Inform J 13(3):225–238 Soliman H, Hikal NA, Sakr NA (2012) A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egypt Inform J 13(3):225–238
Zurück zum Zitat Song Y, Chen Z, Yuan Z (2007) New chaotic pso-based neural network predictive control for nonlinear process. IEEE Trans Neural Netw 18(2):595–601 Song Y, Chen Z, Yuan Z (2007) New chaotic pso-based neural network predictive control for nonlinear process. IEEE Trans Neural Netw 18(2):595–601
Zurück zum Zitat Song J, Zhu Z, Price C (2014) Feature grouping for intrusion detection system based on hierarchical clustering. In: International conference on availability, reliability, and security. Springer, Berlin, pp 270–280 Song J, Zhu Z, Price C (2014) Feature grouping for intrusion detection system based on hierarchical clustering. In: International conference on availability, reliability, and security. Springer, Berlin, pp 270–280
Zurück zum Zitat Srilatha K, Ulagamuthalvi V (2019) Support vector machine and particle swarm optimization based classification of ovarian tumour. Biosc Biotech Res Comm 12(3):714–719 Srilatha K, Ulagamuthalvi V (2019) Support vector machine and particle swarm optimization based classification of ovarian tumour. Biosc Biotech Res Comm 12(3):714–719
Zurück zum Zitat Steinwart I, Christmann A (2008) Support vector machines. Springer, BerlinMATH Steinwart I, Christmann A (2008) Support vector machines. Springer, BerlinMATH
Zurück zum Zitat Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J (2015) Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 64(9):2519–2533 Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J (2015) Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 64(9):2519–2533
Zurück zum Zitat Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35 Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35
Zurück zum Zitat Xiang-Tao L, Ming-Hao Y (2012) Parameter estimation for chaotic systems using the cuckoo search algorithm with an orthogonal learning method. Chin Phys B 21(5):050507 Xiang-Tao L, Ming-Hao Y (2012) Parameter estimation for chaotic systems using the cuckoo search algorithm with an orthogonal learning method. Chin Phys B 21(5):050507
Zurück zum Zitat Xue B, Zhang M, Browne WN (2013) Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE Trans Cybern 43(6):1656–1671 Xue B, Zhang M, Browne WN (2013) Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE Trans Cybern 43(6):1656–1671
Zurück zum Zitat Xue B, Zhang M, Browne WN (2014) Particle swarm optimisation for feature selection in classification: novel initialisation and updating mechanisms. Appl Soft Comput 18:261–276 Xue B, Zhang M, Browne WN (2014) Particle swarm optimisation for feature selection in classification: novel initialisation and updating mechanisms. Appl Soft Comput 18:261–276
Zurück zum Zitat Yang XS (2010) Nature-inspired metaheuristic algorithms. Luniver Press, London Yang XS (2010) Nature-inspired metaheuristic algorithms. Luniver Press, London
Zurück zum Zitat Yang XS (2012) Flower pollination algorithm for global optimization. In: International conference on unconventional computing and natural computation. Springer, Berlin, pp 240–249 Yang XS (2012) Flower pollination algorithm for global optimization. In: International conference on unconventional computing and natural computation. Springer, Berlin, pp 240–249
Zurück zum Zitat Yang XS, Karamanoglu M, He X (2013) Multi-objective flower algorithm for optimization. Procedia Comput Sci 18:861–868 Yang XS, Karamanoglu M, He X (2013) Multi-objective flower algorithm for optimization. Procedia Comput Sci 18:861–868
Metadaten
Titel
A novel Chaotic Flower Pollination-based intrusion detection framework
verfasst von
Amrit Pal Singh
Arvinder Kaur
Saibal Kumar Pal
Publikationsdatum
06.05.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 21/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-020-04937-1

Weitere Artikel der Ausgabe 21/2020

Soft Computing 21/2020 Zur Ausgabe