An Empirical Study of Intrusion Detection System Using Feature Reduction Based on Evolutionary Algorithms and Swarm Intelligence Methods
نویسندگان
چکیده
The use of computer more and more need to be increase the security day by day in a real world, the process of monitoring the computer system in a secure way for an unknown and known attack increase the availability and confidentiality of the system, the system provides the solution of such a problem is known as an Intrusion detection system. Intrusion detection systems play a vital role in network security, its check the system for integrity, confidentiality and availability in an individual manner i.e. Host based intrusion detection system and or in a group i.e. Network based intrusion detection system. Basically an IDS inspects the suspicious behavior of a system in a network may be an attack or misuse of a system. The performance of IDS measures in the detection rate in terms of Precision and recall on the basis of performance parameters such as true positive, false positive, true negative and false negative. In this paper we analyze a existing methods like Neural network techniques, Evolutionary like Genetic algorithm with swarm intelligence based techniques like Particle Swarm optimization for the intrusion detection system to compare the detection rate for the reduced dataset using with experimental result on the basis of KDDCUP dataset to test the performance of various methods and existing algorithm, the dataset include normal and abnormal dataset with the complete features or an attributes. An experimental result shows that the better comparative analysis method provides the results in the form of higher detection rates than other existing techniques.
منابع مشابه
Adaptive Rule-Base Influence Function Mechanism for Cultural Algorithm
This study proposes a modified version of cultural algorithms (CAs) which benefits from rule-based system for influence function. This rule-based system selects and applies the suitable knowledge source according to the distribution of the solutions. This is important to use appropriate influence function to apply to a specific individual, regarding to its role in the search process. This rule ...
متن کاملDesigning an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملIntrusion Detection based on a Novel Hybrid Learning Approach
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...
متن کاملSoft Computing Methods based on Fuzzy, Evolutionary and Swarm Intelligence for Analysis of Digital Mammography Images for Diagnosis of Breast Tumors
Soft computing models based on intelligent fuzzy systems have the capability of managing uncertainty in the image based practices of disease. Analysis of the breast tumors and their classification is critical for early diagnosis of breast cancer as a common cancer with a high mortality rate between women all around the world. Soft computing models based on fuzzy and evolutionary algorithms play...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017