Skip to main content
Erschienen in: Soft Computing 19/2019

16.11.2018 | Focus

Improved Relevance Vector Machine (IRVM) classifier for Intrusion Detection System

verfasst von: E. M. Roopa Devi, R. C. Suganthe

Erschienen in: Soft Computing | Ausgabe 19/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intrusion detection is the most significant research area in online applications to avoid intrusion activities. The foremost goal of the present research is to use the Relevance Vector Machine which can recognize extract intrusion activities involved in the Intrusion Detection System. Classification and feature selection are implemented by Improved Relevance Vector Machine and Gaussian Firefly Algorithm, respectively. The proposed work contains three phases such as preprocessing, feature selection and classification, and it would increase the classification accuracy. Preprocessing uses the technique Kalman filtering which focuses on missing values in the given Knowledge discovery in databases. Gaussian Firefly Algorithm selects the most relevant and optimal features, thereby increasing overall execution speed. Then Improved Relevance Vector Machine identifies intrusion attacks efficiently by extracting more relevant vectors and thus classifying maximum likelihood values. The experimental result concludes that Improved Relevance Vector Machine algorithm provides greater performance in terms of precision, recall, specificity and accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat An J-Y et al (2016) Using the relevance vector machine model combined with local phase quantization to predict protein–protein interactions from protein sequences. BioMed Res Int 2016 An J-Y et al (2016) Using the relevance vector machine model combined with local phase quantization to predict protein–protein interactions from protein sequences. BioMed Res Int 2016
Zurück zum Zitat Arai K (2013) Recovering method of missing data based on proposed modified Kalman filter when time series of mean data is known. Int J Adv Res Artif Intell 7(2):18–23 Arai K (2013) Recovering method of missing data based on proposed modified Kalman filter when time series of mean data is known. Int J Adv Res Artif Intell 7(2):18–23
Zurück zum Zitat Bishop CM, Tipping ME (2000) Variational relevance vector machines. In: Proceedings of the sixteenth conference on uncertainty in artificial intelligence, Morgan Kaufmann Publishers Bishop CM, Tipping ME (2000) Variational relevance vector machines. In: Proceedings of the sixteenth conference on uncertainty in artificial intelligence, Morgan Kaufmann Publishers
Zurück zum Zitat Ektefa M, Memar S, Sidi F, Affendey LS (2010) Intrusion detection using data mining techniques. IEEE, Shah Alam, Selangor, Malaysia, pp 200–203 Ektefa M, Memar S, Sidi F, Affendey LS (2010) Intrusion detection using data mining techniques. IEEE, Shah Alam, Selangor, Malaysia, pp 200–203
Zurück zum Zitat Farahani SM, Abshouri AA, Nasiri B, Meybodi MR (2011) A Gaussian firefly algorithm. Int J Mach Learn Comput 1:448–453CrossRef Farahani SM, Abshouri AA, Nasiri B, Meybodi MR (2011) A Gaussian firefly algorithm. Int J Mach Learn Comput 1:448–453CrossRef
Zurück zum Zitat Gao J et al (2009) Adaptive distributed intrusion detection using parametric model. In: IEEE/WIC/ACM international joint conferences on web intelligence and intelligent agent technologies, 2009. WI-IAT’09, vol 1. IET Gao J et al (2009) Adaptive distributed intrusion detection using parametric model. In: IEEE/WIC/ACM international joint conferences on web intelligence and intelligent agent technologies, 2009. WI-IAT’09, vol 1. IET
Zurück zum Zitat Han J, Kamber M (2011) Data mining: concepts and techniques, 3rd edn. Morgan Kufmann, San Mateo (2nd edition 2006) MATH Han J, Kamber M (2011) Data mining: concepts and techniques, 3rd edn. Morgan Kufmann, San Mateo (2nd edition 2006) MATH
Zurück zum Zitat Hu W, Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. IEEE Trans Syst Man Cybern B Cybern 38(2):577–583CrossRef Hu W, Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. IEEE Trans Syst Man Cybern B Cybern 38(2):577–583CrossRef
Zurück zum Zitat Hu W, Gao J, Wang Y, Wu O, Maybank S (2014) Online adaboost-based parameterized methods for dynamic distributed network intrusion detection. IEEE Transactions on Cybernetics 44(1):66–82CrossRef Hu W, Gao J, Wang Y, Wu O, Maybank S (2014) Online adaboost-based parameterized methods for dynamic distributed network intrusion detection. IEEE Transactions on Cybernetics 44(1):66–82CrossRef
Zurück zum Zitat Mabu S, Chen C, Lu N, Shimada K, Hirasawa K (2011) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans Syst Man Cybern C Appl Rev 41(1):130–139CrossRef Mabu S, Chen C, Lu N, Shimada K, Hirasawa K (2011) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans Syst Man Cybern C Appl Rev 41(1):130–139CrossRef
Zurück zum Zitat Medhane DV, Sangaiah AK (2017) Search space-based multi-objective optimization evolutionary algorithm. Comput Electr Eng 58:126–143CrossRef Medhane DV, Sangaiah AK (2017) Search space-based multi-objective optimization evolutionary algorithm. Comput Electr Eng 58:126–143CrossRef
Zurück zum Zitat Nasiri B, Meybodi MR (2016) History-driven firefly algorithm for optimisation in dynamic and uncertain environments. Int J Bio-Inspired Comput 8(5):326–339CrossRef Nasiri B, Meybodi MR (2016) History-driven firefly algorithm for optimisation in dynamic and uncertain environments. Int J Bio-Inspired Comput 8(5):326–339CrossRef
Zurück zum Zitat Nayak J, Naik B, Behera HS (2015) A novel nature inspired firefly algorithm with higher order neural network: performance analysis. Int J Eng Sci Technol 19:197–211CrossRef Nayak J, Naik B, Behera HS (2015) A novel nature inspired firefly algorithm with higher order neural network: performance analysis. Int J Eng Sci Technol 19:197–211CrossRef
Zurück zum Zitat Panda M, Patra MR (2008) A comparative study of data mining algorithms for network intrusion detection. In: First international conference on emerging trends in engineering and technology, pp 504–507 Panda M, Patra MR (2008) A comparative study of data mining algorithms for network intrusion detection. In: First international conference on emerging trends in engineering and technology, pp 504–507
Zurück zum Zitat Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling of intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30:114–132CrossRef Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling of intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30:114–132CrossRef
Zurück zum Zitat Sangaiah AK, Thangavelu AK, Gao XZ, Anbazhagan N, Durai MS (2015) An ANFIS approach for evaluation of team-level service climate in GSD projects using Taguchi-genetic learning algorithm. Appl Soft Comput 30:628–635CrossRef Sangaiah AK, Thangavelu AK, Gao XZ, Anbazhagan N, Durai MS (2015) An ANFIS approach for evaluation of team-level service climate in GSD projects using Taguchi-genetic learning algorithm. Appl Soft Comput 30:628–635CrossRef
Zurück zum Zitat Sangaiah AK, Samuel OW, Li X, Abdel-Basset M, Wang H (2018a) Towards an efficient risk assessment in software projects—fuzzy reinforcement paradigm. Comput Electr Eng 71:833–846CrossRef Sangaiah AK, Samuel OW, Li X, Abdel-Basset M, Wang H (2018a) Towards an efficient risk assessment in software projects—fuzzy reinforcement paradigm. Comput Electr Eng 71:833–846CrossRef
Zurück zum Zitat Stolfo SJ, Lee W, Chan PK, Fan W, Eskin E (2001) Data mining-based intrusion detectors: an overview of the columbia IDS project. ACM SIGMOD Rec 30(4):5–14CrossRef Stolfo SJ, Lee W, Chan PK, Fan W, Eskin E (2001) Data mining-based intrusion detectors: an overview of the columbia IDS project. ACM SIGMOD Rec 30(4):5–14CrossRef
Zurück zum Zitat Upadhyaya D, Jain S (2013) Hybrid approach for network intrusion detection system using k-medoid clustering and Naïve Bayes classification. Int J Comput Sci Issues (IJCSI) 10(3):231–236 Upadhyaya D, Jain S (2013) Hybrid approach for network intrusion detection system using k-medoid clustering and Naïve Bayes classification. Int J Comput Sci Issues (IJCSI) 10(3):231–236
Zurück zum Zitat Xiang MY, Chong, Zhu HL (2004) Design of multiple-level tree classifiers for intrusion detection system. In: IEEE conference on cybernetics and intelligent system Xiang MY, Chong, Zhu HL (2004) Design of multiple-level tree classifiers for intrusion detection system. In: IEEE conference on cybernetics and intelligent system
Zurück zum Zitat Yang X-S (2009) Firefly algorithms for multimodal optimization. Stochastic algorithms: foundations and applications. Springer, Berlin, pp 169–178CrossRefMATH Yang X-S (2009) Firefly algorithms for multimodal optimization. Stochastic algorithms: foundations and applications. Springer, Berlin, pp 169–178CrossRefMATH
Zurück zum Zitat Yu H, Yang J, Han J (2003) Classifying large data sets using SVM with hierarchical clusters. In: Proceedings of the SIGKDD 2003, Washington, DC, pp 306–315 Yu H, Yang J, Han J (2003) Classifying large data sets using SVM with hierarchical clusters. In: Proceedings of the SIGKDD 2003, Washington, DC, pp 306–315
Metadaten
Titel
Improved Relevance Vector Machine (IRVM) classifier for Intrusion Detection System
verfasst von
E. M. Roopa Devi
R. C. Suganthe
Publikationsdatum
16.11.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 19/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3621-z

Weitere Artikel der Ausgabe 19/2019

Soft Computing 19/2019 Zur Ausgabe