Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2018, Article ID 1578314, 9 pages
https://doi.org/10.1155/2018/1578314
Research Article

Towards Effective Network Intrusion Detection: A Hybrid Model Integrating Gini Index and GBDT with PSO

1School of Information Science & Engineering, Lanzhou University, Lanzhou 730000, China
2China Information Technology Security Evaluation Center, Beijing 100085, China
3Department of Electronic and Information Engineering, Lanzhou Vocational Technical College, Lanzhou 730070, China

Correspondence should be addressed to Longjie Li; nc.ude.uzl@iljl

Received 17 August 2017; Revised 24 January 2018; Accepted 11 February 2018; Published 26 March 2018

Academic Editor: Eduard Llobet

Copyright © 2018 Longjie Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. O. Depren, M. Topallar, E. Anarim, and M. K. Ciliz, “An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks,” Expert Systems with Applications, vol. 29, no. 4, pp. 713–722, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. C. Guo, Y. Ping, N. Liu, and S.-S. Luo, “A two-level hybrid approach for intrusion detection,” Neurocomputing, vol. 214, pp. 391–400, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. Akashdeep, I. Manzoor, and N. Kumar, “A feature reduced intrusion detection system using ANN classifier,” Expert Systems with Applications, vol. 88, pp. 249–257, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. S.-W. Lin, K.-C. Ying, C.-Y. Lee, and Z.-J. Lee, “An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection,” Applied Soft Computing, vol. 12, no. 10, pp. 3285–3290, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. M. H. Bhuyan, D. Bhattacharyya, and J. Kalita, “Network anomaly detection: methods, systems and tools,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303–336, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. K. Ilgun, R. A. Kemmerer, and P. A. Porras, “State transition analysis: a rule-based intrusion detection approach,” IEEE Transactions on Software Engineering, vol. 21, no. 3, pp. 181–199, 1995. View at Publisher · View at Google Scholar · View at Scopus
  7. D. E. Denning, “An intrusion-detection model,” IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, 1987. View at Publisher · View at Google Scholar · View at Scopus
  8. C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, “Intrusion detection by machine learning: a review,” Expert Systems with Applications, vol. 36, no. 10, pp. 11994–12000, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas, “Modeling intrusion detection system using hybrid intelligent systems,” Journal of Network and Computer Applications, vol. 30, no. 1, pp. 114–132, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. F. Kuang, W. Xu, and S. Zhang, “A novel hybrid KPCA and SVM with GA model for intrusion detection,” Applied Soft Computing, vol. 18, pp. 178–184, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Kim, S. Lee, and S. Kim, “A novel hybrid intrusion detection method integrating anomaly detection with misuse detection,” Expert Systems with Applications, vol. 41, Part 2, no. 4, pp. 1690–1700, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. A. A. Aburomman and M. B. I. Reaz, “A novel SVM-kNN-PSO ensemble method for intrusion detection system,” Applied Soft Computing, vol. 38, pp. 360–372, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. L. Khan, M. Awad, and B. Thuraisingham, “A new intrusion detection system using support vector machines and hierarchical clustering,” The VLDB Journal, vol. 16, no. 4, pp. 507–521, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. G. Wang, J. Hao, J. Ma, and L. Huang, “A new approach to intrusion detection using artificial neural networks and fuzzy clustering,” Expert Systems with Applications, vol. 37, no. 9, pp. 6225–6232, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. C. Xiang, P. C. Yong, and L. S. Meng, “Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees,” Pattern Recognition Letters, vol. 29, no. 7, pp. 918–924, 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. W.-C. Lin, S.-W. Ke, and C.-F. Tsai, “CANN: an intrusion detection system based on combining cluster centers and nearest neighbors,” Knowledge-Based Systems, vol. 78, pp. 13–21, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. E. De la Hoz, E. De la Hoz, A. Ortiz, J. Ortega, and A. Martínez-Alvarez, “Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organising maps,” Knowledge-Based Systems, vol. 71, pp. 322–338, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. E. De la Hoz, E. De La Hoz, A. Ortiz, J. Ortega, and B. Prieto, “PCA filtering and probabilistic SOM for network intrusion detection,” Neurocomputing, vol. 164, pp. 71–81, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. A. S. Eesa, Z. Orman, and A. M. A. Brifcani, “A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems,” Expert Systems with Applications, vol. 42, no. 5, pp. 2670–2679, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Chen, A. Abraham, and B. Yang, “Hybrid flexible neural-tree-based intrusion detection systems,” International Journal of Intelligent Systems, vol. 22, no. 4, pp. 337–352, 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. T. Shon and J. Moon, “A hybrid machine learning approach to network anomaly detection,” Information Sciences, vol. 177, no. 18, pp. 3799–3821, 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. J. H. Friedman, “Greedy function approximation: a gradient boosting machine,” The Annals of Statistics, vol. 29, no. 5, pp. 1189–1232, 2001. View at Publisher · View at Google Scholar
  23. R. C. Eberhart and J. Kennedy, “A new optimizer using particle swarm theory,” in Micro Machine and Human Science, 1995. MHS ‘95, Proceedings of the Sixth International Symposium on, pp. 39–43, Nagoya, Japan, 1995. View at Publisher · View at Google Scholar
  24. N. Azam and J. Yao, “Comparison of term frequency and document frequency based feature selection metrics in text categorization,” Expert Systems with Applications, vol. 39, no. 5, pp. 4760–4768, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. C. C. Aggarwal, Y. Zhao, and P. S. Yu, “On the use of side information for mining text data,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 6, pp. 1415–1429, 2014. View at Publisher · View at Google Scholar · View at Scopus
  26. W. Shang, H. Huang, H. Zhu, Y. Lin, Y. Qu, and Z. Wang, “A novel feature selection algorithm for text categorization,” Expert Systems with Applications, vol. 33, no. 1, pp. 1–5, 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. K. B. Stevens and D. U. Pfeiffer, “Spatial modelling of disease using data- and knowledge-driven approaches,” Spatial and Spatio-temporal Epidemiology, vol. 2, no. 3, pp. 125–133, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. Y. L. Cheong, P. J. L. ao, and T. Lakes, “Assessment of land use factors associated with dengue cases in Malaysia using boosted regression trees,” Spatial and Spatio-temporal Epidemiology, vol. 10, pp. 75–84, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. A. Mohan, Z. Chen, and K. Weinberger, “Web-search ranking with initialized gradient boosted regression trees,” Journal of Machine Learning Research, vol. 14, pp. 77–89, 2011. View at Google Scholar
  30. S. Tyree, K. Q. Weinberger, K. Agrawal, and J. Paykin, “Parallel boosted regression trees for web search ranking,” in Proceedings of the 20th International Conference on World Wide Web, pp. 387–396, New York, NY, USA, 2011. View at Publisher · View at Google Scholar · View at Scopus
  31. Y. Zhang and A. Haghani, “A gradient boosting method to improve travel time prediction,” Transportation Research Part C: Emerging Technologies, vol. 58, Part B, pp. 308–324, 2015. View at Publisher · View at Google Scholar · View at Scopus
  32. M. Tavallaee, E. Bagheri, W. Lu, and A.-A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 2009. View at Publisher · View at Google Scholar · View at Scopus
  33. R. Singh, H. Kumar, and R. K. Singla, “An intrusion detection system using network traffic profiling and online sequential extreme learning machine,” Expert Systems with Applications, vol. 42, no. 22, pp. 8609–8624, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. S. M. H. Bamakan, H. Wang, T. Yingjie, and Y. Shi, “An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization,” Neurocomputing, vol. 199, pp. 90–102, 2016. View at Publisher · View at Google Scholar · View at Scopus
  35. L. Dhanabal and S. P. Shantharajah, “A study on NSL-KDD dataset for intrusion detection system based on classification algorithms,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 6, pp. 446–452, 2015. View at Google Scholar
  36. F. Iglesias and T. Zseby, “Analysis of network traffic features for anomaly detection,” Machine Learning, vol. 101, no. 1-3, pp. 59–84, 2015. View at Publisher · View at Google Scholar · View at Scopus
  37. R. A. R. Ashfaq, X.-Z. Wang, J. Z. Huang, H. Abbas, and Y.-L. He, “Fuzziness based semi-supervised learning approach for intrusion detection system,” Information Sciences, vol. 378, pp. 484–497, 2017. View at Publisher · View at Google Scholar · View at Scopus
  38. J. Kennedy and R. C. Eberhart, “Particle swarm optimization,” in Proceedings of IEEE International Conference on Neural Networks, vol. 4, pp. 1942–1948, Perth, WA, Australia, 1995. View at Publisher · View at Google Scholar · View at Scopus
  39. S. X. Wu and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: a review,” Applied Soft Computing, vol. 10, no. 1, pp. 1–35, 2010. View at Publisher · View at Google Scholar · View at Scopus
  40. A. Karami and M. Guerrero-Zapata, “A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in named data networking,” Neurocomputing, vol. 151, Part 3, pp. 1262–1282, 2015. View at Publisher · View at Google Scholar · View at Scopus
  41. A. Karami and M. Guerrero-Zapata, “A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks,” Neurocomputing, vol. 149, Part C, pp. 1253–1269, 2015. View at Publisher · View at Google Scholar · View at Scopus
  42. V. N. Vapnik, The Nature of Statistical Learning Theory, Springer, New York, NY, USA, 1995. View at Publisher · View at Google Scholar
  43. L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. View at Publisher · View at Google Scholar · View at Scopus
  44. J. R. Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers, San Mateo, CA, USA, 1993.
  45. Y. Tao, X. Wu, and C. Li, “Rawls’ fairness, income distribution and alarming level of Gini coefficient,” 2014, http://arxiv.org/abs/1409.3979. View at Google Scholar
  46. R. C. Eberhart and Y. Shi, “Comparing inertia weights and constriction factors in particle swarm optimization,” in Proceedings of the 2000 Congress on Evolutionary Computation, vol. 2, pp. 84–88, La Jolla, CA, USA, 2000. View at Publisher · View at Google Scholar · View at Scopus
  47. N. R. Samal, A. Konar, S. Das, and A. Abraham, “A closed loop stability analysis and parameter selection of the particle swarm optimization dynamics for faster convergence,” in 2007 IEEE Congress on Evolutionary Computation, pp. 1769–1776, Singapore, Singapore, 2007. View at Publisher · View at Google Scholar · View at Scopus
  48. M. E. H. Pedersen and A. J. Chipperfield, “Local unimodal sampling,” Tech. Rep., Tech. Rep. HL0801, Hvass Laboratories, 2008. View at Google Scholar
  49. N. Littlestone and M. K. Warmuth, “The weighted majority algorithm,” Information and Computation, vol. 108, no. 2, pp. 212–261, 1994. View at Publisher · View at Google Scholar · View at Scopus
  50. A. Rauber, D. Merkl, and M. Dittenbach, “The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data,” IEEE Transactions on Neural Networks, vol. 13, no. 6, pp. 1331–1341, 2002. View at Publisher · View at Google Scholar · View at Scopus
  51. K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: NSGA-II,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 2, pp. 182–197, 2002. View at Publisher · View at Google Scholar · View at Scopus