Open Access Open Access  Restricted Access Subscription or Fee Access

GA and SVM Algorithms for Selection of Hybrid Feature in Intrusion Detection Systems


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i3.5180

Abstract


Higher dimensionality of data that has to be analyzed for detecting attack is one of the key issues concerning intrusion detection system (IDS). This is due to the different features in the attack on network that eats up time in terms of training and prediction setups. In this study a hybrid method of Support Vector Machine (SVM) as well as Genetic Algorithm (GA) is suggested and their implementation in IDS is outlined. The suggested methods are used for reducing the number of features from 41 to 11 using KDD Cup’99 dataset. The features are classified as three priorities using GA with the most significant as the first priority and the least one as the third priority. The way in which feature distribution is done is that four features are placed in the first priority, five in the second and two in the third. The results show that the suggested hybrid algorithms, GA and SVM are able to achieve true and false positive values of 0.973 and 0.017 respectively.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


IDS; Hybrid Method; SVM; GA; Reducing Features

Full Text:

PDF


References


H.-K. Kim and K.E. Davis, Toward a comprehensive theory of problematic Internet use: Evaluating the role of self-esteem, anxiety, flow, and the self-rated importance of Internet activities.Computers in Human Behavior, Vol. 25, n. 2, pp. 490-500, 2009.
http://dx.doi.org/10.1016/j.chb.2008.11.001

J.J. Blais, et al., Adolescents online: The importance of Internet activity choices to salient relationships.Journal of Youth and Adolescence, Vol. 37, n. 5, pp. 522-536, 2008.
http://dx.doi.org/10.1007/s10964-007-9262-7

S. McClure, et al., Hacking exposed: network security secrets and solutions (McGraw-Hill, 2009).

R.E. Todd Sr, A.C. Glahe, and A.H. Pendleton, Method for network self security assessment. 2001, Google Patents.

S.E. Gaul Jr, Internet/network security method and system for checking security of a client from a remote facility. 2001, US Patent 20,010,034,847.

J.M. Boyle, E.S. Maiwald, and D.W. Snow, Apparatus and method for providing network security. 1999, Google Patents.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.

Weihua, H., Qi, J., Yuge, D., Li, C., Zhao, W., Li, C., Anides: Agent-based network intrusion detection expert system, (2012) International Review on Computers and Software (IRECOS), 7 (4), pp. 1453-1457.

Chihab, Y., Ouahman, A.A., Bencharef, O., Network intrusion detection system based on negative selection algorithm reinforced by danger theory, (2013) International Review on Computers and Software (IRECOS), 8 (5), pp. 1195-1198.

C. Kruegel and T. Toth. Using decision trees to improve signature-based intrusion detection. in Recent Advances in Intrusion Detection (Page: 173-191 Year of Publication: 2003 ISBN: 3540408789)
http://dx.doi.org/10.1007/978-3-540-45248-5_10

P. Garcia-Teodoro, et al., Anomaly-based network intrusion detection: Techniques, systems and challenges.computers & security, Vol. 28, n. 1, pp. 18-28, 2009.
http://dx.doi.org/10.1016/j.cose.2008.08.003

Thinh, T.N., Vu, T.H., Tomiyama, S., High performance TCP reassembly for network intrusion detection system, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3320-3325.

C.-H. Tsang, S. Kwong, and H. Wang, Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection.Pattern Recognition, Vol. 40, n. 9, pp. 2373-2391, 2007.
http://dx.doi.org/10.1016/j.patcog.2006.12.009

C.-F. Tsai and C.-Y. Lin, A triangle area based nearest neighbors approach to intrusion detection.Pattern Recognition, Vol. 43, n. 1, pp. 222-229, 2010.
http://dx.doi.org/10.1016/j.patcog.2009.05.017

G. Wang, et al., A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering.Expert Systems with Applications, Vol. 37, n. 9, pp. 6225-6232, 2010.
http://dx.doi.org/10.1016/j.eswa.2010.02.102

R. Kohavi and G.H. John, Wrappers for feature subset selection.Artificial intelligence, Vol. 97, n. 1, pp. 273-324, 1997.
http://dx.doi.org/10.1016/s0004-3702(97)00043-x

S. Chebrolu, A. Abraham, and J.P. Thomas, Feature deduction and ensemble design of intrusion detection systems.Computers & Security, Vol. 24, n. 4, pp. 295-307, 2005.
http://dx.doi.org/10.1016/j.cose.2004.09.008

Y. Li, et al., Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.Computers & Security, Vol. 28, n. 6, pp. 466-475, 2009.
http://dx.doi.org/10.1016/j.cose.2009.01.001

Y. Li, et al., An efficient intrusion detection system based on support vector machines and gradually feature removal method.Expert Systems with Applications, Vol. 39, n. 1, pp. 424-430, 2012.
http://dx.doi.org/10.1016/j.eswa.2011.07.032

V. M. Hashemi, Z. Muda, and W. Yassin, Improving Intrusion Detection Using Genetic Algorithm.Information Technology Journal, Vol. 12, n. 5, pp., 2013.
http://dx.doi.org/10.3923/itj.2013.2167.2173

V. T. Goh, J. Zimmermann, and M. Looi, Intrusion detection system for encrypted networks using secret-sharing schemes.International Journal of Cryptology Research, Vol., n. pp., 2010.

V. T. Goh, J. Zimmermann, and M. Looi. Towards intrusion detection for encrypted networks. in Availability, Reliability and Security, 2009. ARES'09. International Conference on (Page: 540-545 Year of Publication: 2009 ISBN: 1424435722)
http://dx.doi.org/10.1109/ares.2009.76

A.J. Smola and B. Schölkopf, A tutorial on support vector regression.Statistics and computing, Vol. 14, n. 3, pp. 199-222, 2004.
http://dx.doi.org/10.1023/b:stco.0000035301.49549.88

S. Tong and D. Koller, Support vector machine active learning with applications to text classification.The Journal of Machine Learning Research, Vol. 2, n. pp. 45-66, 2002.

D.S. Kim and J.S. Park. Network-based intrusion detection with support vector machines. in Information Networking (Page: 747-756 Year of Publication: 2003 ISBN: 3540408274)
http://dx.doi.org/10.1007/978-3-540-45235-5_73

J. H. Holland, Genetic algorithms.Scientific american, Vol. 267, n. 1, pp. 66-72, 1992.
http://dx.doi.org/10.1038/scientificamerican0792-66

R. Alcalá, et al., Hybrid learning models to get the interpretability–accuracy trade-off in fuzzy modeling.Soft Computing, Vol. 10, n. 9, pp. 717-734, 2006.
http://dx.doi.org/10.1007/s00500-005-0002-1

A. Abraham, E. Corchado, and J.M. Corchado, Hybrid learning machines.Neurocomputing, Vol. 72, n. 13, pp. 2729-2730, 2009.
http://dx.doi.org/10.1016/j.neucom.2009.02.017

Nirmaladevi, P., Tamilarasi, A., An efficient intrusion detection system based on GA to recognize attacks in user privileges, (2013) International Review on Computers and Software (IRECOS), 8 (8), pp. 1917-1922.

Z. Sun, G. Bebis, and R. Miller, Object Detection Using Feature Subset Selection. Pattern Recognition, Vol. 37, pp. 2165–2176, 2004.
http://dx.doi.org/10.1016/j.patcog.2004.03.013

S. Maldonado and R. Weber, A wrapper method for feature selection using support vector machines.Information Sciences, Vol. 179, n. 13, pp. 2208-2217, 2009.
http://dx.doi.org/10.1016/j.ins.2009.02.014


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize