Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015 (2015), Article ID 574589, 15 pages
http://dx.doi.org/10.1155/2015/574589
Research Article

A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

1Department of CSE, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore 641 108, India
2Department of CSE, SNS College of Technology, Coimbatore 641 035, India

Received 20 January 2015; Revised 19 May 2015; Accepted 31 May 2015

Academic Editor: Giuseppe A. Trunfio

Copyright © 2015 P. Amudha et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. X. Wu and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: a review,” Applied Soft Computing Journal, vol. 10, no. 1, pp. 1–35, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. E. Bonabeau, M. Dorigo, and G. Theraulaz, Swarm Intelligence: From Natural to Artificial Intelligence, Oxford University Press, Oxford, UK, 1999.
  3. G. Zhu and S. Kwong, “Gbest-guided artificial bee colony algorithm for numerical function optimization,” Applied Mathematics and Computation, vol. 217, no. 7, pp. 3166–3173, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. R. Kohavi and G. H. John, “Wrappers for feature subset selection,” Artificial Intelligence, vol. 97, no. 1-2, pp. 273–324, 1997. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Lee and S. J. Stolfo, “A framework for constructing features and models for intrusion detection systems,” ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 227–261. View at Publisher · View at Google Scholar
  6. H. Nguyen, K. Franke, and S. Petrović, “Improving effectiveness of intrusion detection by correlation feature selection,” in Proceedings of the 5th International Conference on Availability, Reliability, and Security (ARES '10), pp. 17–24, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Wang, T. Li, and R. Ren, “A real time IDSs based on artificial bee colony-support vector machine algorithm,” in Proceedings of the 3rd International Workshop on Advanced Computational Intelligence (IWACI '10), pp. 91–96, IEEE, Suzhou, China, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Parsazad, E. Saboori, and A. Allahyar, “Fast feature reduction in intrusion detection datasets,” in Proceedings of the 35th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO '12), pp. 1023–1029, May 2012. View at Scopus
  9. A. H. Sung and S. Mukkamala, “Identifying important features for intrusion detection using support vector machines and neural networks,” in Proceedings of the International Symposium on Applications and the Internet, pp. 209–216, IEEE, Orlando, Fla, USA, January 2003. View at Publisher · View at Google Scholar
  10. S. Revathi and A. Malathi, “Optimization of KDD Cup 99 dataset for intrusion detection using hybrid swarm intelligence with random forest classifier,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 7, pp. 1382–1387, 2013. View at Google Scholar
  11. S. Revathi and A. Malathi, “Data preprocessing for intrusion detection system using swarm intelligence techniques,” International Journal of Computer Applications, vol. 75, no. 6, pp. 22–27, 2013. View at Publisher · View at Google Scholar
  12. Y. Y. Chung and N. Wahid, “A hybrid network intrusion detection system using simplified swarm optimization (SSO),” Applied Soft Computing, vol. 12, no. 9, pp. 3014–3022, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. L. Zhou and F. Jiang, “A rough set based decision tree algorithm and its application in intrusion detection,” in Pattern Recognition and Machine Intelligence, S. O. Kuznetsov, D. P. Mandal, M. K. Kundu, and S. K. Pal, Eds., vol. 6744 of Lecture Notes in Computer Science, pp. 333–338, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  14. G. Wang, J. Hao, J. Mab, and L. Huang, “A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering,” Expert Systems with Applications, vol. 37, no. 9, pp. 6225–6232, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. S. S. Sivatha Sindhu, S. Geetha, and A. Kannan, “Decision tree based light weight intrusion detection using a wrapper approach,” Expert Systems with Applications, vol. 39, no. 1, pp. 129–141, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. Z. A. Baig, S. M. Sait, and A. Shaheen, “GMDH-based networks for intelligent intrusion detection,” Engineering Applications of Artificial Intelligence, vol. 26, no. 7, pp. 1731–1740, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Mukkamala, G. Janoski, and A. Sung, “Intrusion detection using neural networks and support vector machines,” in Proceedings of the International Joint Conference on Neural Networks (IJCNN '02), pp. 1702–1707, May 2002. View at Scopus
  18. F. Li, “Hybrid neural network intrusion detection system using genetic algorithm,” in Proceedings of the International Conference on Multimedia Technology, pp. 1–4, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Wang, G. Zhang, E. Mingjie, and N. Sun, “A novel intrusion detection method based on improved SVM by combining PCA and PSO,” Wuhan University Journal of Natural Sciences, vol. 16, no. 5, pp. 409–413, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. T.-S. Chou, J. Fan, S. Fan, and K. Makki, “Ensemble of machine learning algorithms for intrusion detection,” in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC '09), pp. 3976–3980, IEEE, San Antonio, TX, USA, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Panda and M. Ranjan Patra, “Ensemble voting system for anomaly based network intrusion detection,” International Journal of Recent Trends in Engineering, vol. 2, no. 5, pp. 8–13, 2009. View at Google Scholar
  22. N. I. Ghali, “Feature selection for effective anomaly-based intrusion detection,” International Journal of Computer Science and Network Security, vol. 9, no. 3, pp. 285–289, 2009. View at Google Scholar
  23. A. Einipour, “Intelligent intrusion detection in computer networks using fuzzy systems,” Global Journal of Computer Science and Technology, vol. 12, no. 11, pp. 19–29, 2012. View at Google Scholar
  24. V. N. Vapnik, The Nature of Statistical Learning Theory, Springer, New York, NY, USA, 1995. View at Publisher · View at Google Scholar · View at MathSciNet
  25. K. Satpute, S. Agrawal, J. Agrawal, and S. Sharma, “A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques,” in Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), vol. 199 of Advances in Intelligent Systems and Computing, pp. 441–452, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  26. Y. Y. Chung and N. Wahid, “A hybrid network intrusion detection system using simplified swarm optimization (SSO),” Applied Soft Computing Journal, vol. 12, no. 9, pp. 3014–3022, 2012. View at Publisher · View at Google Scholar · View at Scopus
  27. D. Karaboga and B. Basturk, “On the performance of artificial bee colony (ABC) algorithm,” Applied Soft Computing Journal, vol. 8, no. 1, pp. 687–697, 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. D. Karaboga and B. Akay, “A comparative study of artificial Bee colony algorithm,” Applied Mathematics and Computation, vol. 214, no. 1, pp. 108–132, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. D. D. Kumar and B. Kumar, “Optimization of benchmark functions using artificial bee colony (ABC) algorithm,” IOSR Journal of Engineering, vol. 3, no. 10, pp. 9–14, 2013. View at Publisher · View at Google Scholar
  30. http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz.
  31. C. B. D. Newman and C. Merz, “UCI repository of machine learning databases,” Tech. Rep., Department of Information and Computer Science, University of California, Irvine, Calif, USA, 1998, http://www.ics.uci.edu/~mlearn/MLRepository. View at Google Scholar
  32. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA '09), July 2009. View at Publisher · View at Google Scholar · View at Scopus
  33. P. Amudha and H. Abdul Rauf, “Performance analysis of data mining approaches in intrusion detection,” in Proceedings of the International Conference on Process Automation, Control and Computing (PACC '11), pp. 9–16, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  34. R. A. Thakker, M. S. Baghini, and M. B. Patil, “Automatic design of low-power low-voltage analog circuits using particle swarm optimization with re-initialization,” Journal of Low Power Electronics, vol. 5, no. 3, pp. 291–302, 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. D. Karaboga and B. Basturk, “A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm,” Journal of Global Optimization, vol. 39, no. 3, pp. 459–471, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  36. Y. Shi and R. C. Eberhart, “A modified particle swarm optimizer,” in Proceedings of the IEEE World Congress on Computational Intelligence, pp. 69–73, IEEE, Anchorage, Alaska, USA, May 1998.
  37. N. A. Diamantidis, D. Karlis, and E. A. Giakoumakis, “Unsupervised stratification of cross-validation for accuracy estimation,” Artificial Intelligence, vol. 116, no. 1-2, pp. 1–16, 2000. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  38. D. T. Larose, Discovering Knowledge in Data—An Introduction to Data Mining, John Wiley & Sons, 2005. View at MathSciNet