Skip to main content

2017 | OriginalPaper | Buchkapitel

PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks

verfasst von : Kanaka Raju Gariga, A. Rama Mohan Reddy, N. Sambasiva Rao

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The act of network intrusion detection is an obligatory part of network performance under security. Unlike other network security strategies, the act of intrusion detection systems should aware the behavior of the users and signature of the intruded and normal transactions, which is continuous process since the user behavior is not static as well the attack strategies are redefining in magnified speed. Hence, the objective of effective intrusion detection is always a significant factor for research. The bioinspired evolutionary strategies are getting the attention of most of the recent research studies. In order to this, the divergent contexts such as minimal computational complexity, prediction accuracy, ensemble models have been considered as significant objective. The other most significant objective and compatible to current state of art is IDS scalability and robustness in high-speed networks, hence the evolutionary computation approaches are adoptable. In this study, we propose an intrusion detection approach that is based on evolutionary computation technique called Cuckoo search. Further, the proposed detection system is investigated thoroughly in the context of accuracy, robustness, and also from the evolutionary computation point of view.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat D.S Bauer, M. K. (1988). NIDX- an expert system for real-time network intrusion detection. Proceedings of the Computer Networking Symposium, 98–106. D.S Bauer, M. K. (1988). NIDX- an expert system for real-time network intrusion detection. Proceedings of the Computer Networking Symposium, 98–106.
2.
Zurück zum Zitat Mell, R. B. (2001). Intrusion Detection Systems. NIST Special Publication on Intrusion Detection System. Mell, R. B. (2001). Intrusion Detection Systems. NIST Special Publication on Intrusion Detection System.
3.
Zurück zum Zitat A. Sundaram. (1996). An introduction to intrusion detection. The ACM student magazine. A. Sundaram. (1996). An introduction to intrusion detection. The ACM student magazine.
4.
Zurück zum Zitat Denning, D. (1986). An intrusion-detection model. In IEEE computer society symposium on research in security and privacy, 118–131. Denning, D. (1986). An intrusion-detection model. In IEEE computer society symposium on research in security and privacy, 118–131.
5.
Zurück zum Zitat T.Lane. (2000). Machine Learning techniques for the computer Security. Purdue University. T.Lane. (2000). Machine Learning techniques for the computer Security. Purdue University.
6.
Zurück zum Zitat Stolfo, W. L. (1998). Data mining approaches for intrusion detection. Proc. of the 7th USENIX security symposium. Stolfo, W. L. (1998). Data mining approaches for intrusion detection. Proc. of the 7th USENIX security symposium.
7.
Zurück zum Zitat W. H. Chen, S. H. (2005). Application of SVM and ANN for intrusion detection. Comput Oper Res Vol-ume 32, Issue 10, 2617–2634. W. H. Chen, S. H. (2005). Application of SVM and ANN for intrusion detection. Comput Oper Res Vol-ume 32, Issue 10, 2617–2634.
8.
Zurück zum Zitat Kennedy, J. (2010). Particle swarm optimization. Encyclopedia of Machine Learning, 760–766. Kennedy, J. (2010). Particle swarm optimization. Encyclopedia of Machine Learning, 760–766.
9.
Zurück zum Zitat Katar, C. (2006). Combining multiple techniques for intrusion detection. Int J Comput Sci Network Security, 208–218. Katar, C. (2006). Combining multiple techniques for intrusion detection. Int J Comput Sci Network Security, 208–218.
10.
Zurück zum Zitat Chen Y, A. A. (2005). Feature deduction and intrusion detection using flexible neural trees. Second IEEE International Symposium on Neural Networks, 2617–2634. Chen Y, A. A. (2005). Feature deduction and intrusion detection using flexible neural trees. Second IEEE International Symposium on Neural Networks, 2617–2634.
11.
Zurück zum Zitat A. Abraham, R. J. (2007). D-scids: distributed soft computing intrusion detection system. J Network Computer, 81–98. A. Abraham, R. J. (2007). D-scids: distributed soft computing intrusion detection system. J Network Computer, 81–98.
12.
Zurück zum Zitat Hassan, M. M. (2013). Current studies on intrusion detection system, genetic algorithm and fuzzy logic. International Journal of Distributed and Parallel Systems, 35–48. Retrieved from arXiv. Hassan, M. M. (2013). Current studies on intrusion detection system, genetic algorithm and fuzzy logic. International Journal of Distributed and Parallel Systems, 35–48. Retrieved from arXiv.
13.
Zurück zum Zitat Sindhu, S. S. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with applications, 129–141. Sindhu, S. S. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with applications, 129–141.
14.
Zurück zum Zitat Li, Y. X. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 424–430. Li, Y. X. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 424–430.
15.
Zurück zum Zitat Bhatti, D. G. (2012). Conceptual Framework for Soft Computing based Intrusion Detection to Reduce False Positive Rate. International Journal of Computer Applications, 1–3. Bhatti, D. G. (2012). Conceptual Framework for Soft Computing based Intrusion Detection to Reduce False Positive Rate. International Journal of Computer Applications, 1–3.
18.
Zurück zum Zitat Goodman, N. R. (1963). Statistical analysis based on a certain multivariate complex Gaussian distribution. Annals of mathematical statistics, 152–177. Goodman, N. R. (1963). Statistical analysis based on a certain multivariate complex Gaussian distribution. Annals of mathematical statistics, 152–177.
19.
Zurück zum Zitat Leys, C. L. (2013). Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. Journal of Experimental Social Psychology, 764–766. Leys, C. L. (2013). Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. Journal of Experimental Social Psychology, 764–766.
20.
Zurück zum Zitat Powers, D. M. (2006). Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. 23rd International conference on machine learning. Pitsburg. Powers, D. M. (2006). Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. 23rd International conference on machine learning. Pitsburg.
Metadaten
Titel
PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks
verfasst von
Kanaka Raju Gariga
A. Rama Mohan Reddy
N. Sambasiva Rao
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_17

Premium Partner