Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)

Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)

V. Sandeep, Saravanan Kondappan, Amir Anton Jone, Raj Barath S.
Copyright: © 2021 |Pages: 18
DOI: 10.4018/IJISP.2021040106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the last decade, many researchers have proposed several models of classification algorithms for enhancing the accuracy performance of IDSs. However, there is a minor issue arising in the classifier's incapability to process high-dimensional data. Using several classifiers always outperforms a single classifier's performance. This paper proposes a novel intrusion detection system by classifying data with SVM as well as C4.5 decision tree algorithm. The NSL-KDD dataset is first preprocessed with principal component analysis (PCA) and later feature selected with an improved particle swarm optimization (I-PSO). This framework improved the time consumption and inaccurate feature selection issues in other methodologies. Upon simplifying features more effectively, the outcomes display an excellent agreement with the conventional PSO techniques and their results, and also produce enhanced outcomes when compared to only single classifier. The results demonstrate better performance when subject to different attack-scenarios and can be used for enterprise network security applications.
Article Preview
Top

Introduction

Intrusion is a harmful interruption of a particular computer or a network of computers by malicious software (Malware) or data packets, which intehosseinds to weaken the integrity, confidentiality, and availability of the whole network. A remote attacker could attain access into a system illegally by handling defects in a computer program, and executing code through unauthenticated access. An intrusion detection system (IDS) is an approach for identifying malicious activity in the system, by sensing possible threat data packets passing through the system (Aburomman et al., 2016).

A review explaining the cyber kill chain models and cyber-attacks that compromise network systems was counteracted by introducing Decision Engine (DE) approaches (Moustafa et al. 2019). IDS contain a sensor in the monitored system for sensing and gathering necessary data packets. It also has an engine that could collect, analyze and configure the data, while also reporting back to the central server system about the detected threats (Amfo et al., 2018). There have been several data classification algorithms developed for machine learning and data mining purposes, like Genetic Algorithm (GA) (Aburomman et al., 2016), Support Vector Machine (SVM), Naïve Bayes, and Decision tree-based data mining algorithms like C4.5 (Aziz et al., 2017) and C5.0. Machine learning algorithms has found applications in different fields, for example, compressing data, image processing data analysis, predicting the time series and pattern recognition. A self-organizing map (SOM) was implemented by Amin Karami in 2018, a novel Anomaly Based-Intrusion Detection System was built using visualization capabilites (Karami, 2018).

Particle Swarm Optimization is a well-acknowledged feature selection technique which uses the fitness function of each particle for swarm optimization. A short study into the properties and benefits of using Particle Swarm Optimization has been given in (Al Daoud, 2013). The ablity of the PSO algorithm to outperform conventional algorithms with respect to the quality of patterns is shown in (Amfo & Hayfron-Acquah, 2018). In (Asta & Uyar 2011), three deep learning models were incorporated into an NIDS (DNN, LSTM-RNN and DBM), for the NSL-KDD and CICIDS2017 datasets and were pretrained using a PSO-based meta-heuristic algorithm. The newly acquired position of the particle is evaluated by using both the newly found velocity as well as the distances between the existing position, global best and personal best positions. In this way, the fitness function is computed for a particle among the population and the features are optimized effectively (Al Daoud, 2013). Consider an N-dimensional space where each particle could be considered a possible solution (Wang et al., 2008).

Let the position of each population particle be represented by X = X1, X2, X3, X4

The velocity of each population particle is given by V = V1, V2, V3, V4

Local memory of the best earlier position for every particle Pbest is saved. Also, the global best position of each particles Gbest. The Pbest and Gbest of each particle are used to evaluate the next best position of the particle.

VN+1 = W * VN – C1 * r1 * (Pbest – xN) + c2 * r2 * (Gbest – xN) // the new velocity(1) XN+1 = XN + VN+1 // the new position(2)

Where c1 and c2 correspond to the acceleration coefficient or also called learning factors; r1 and r2 being random numbers and w is the inertia weight;

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing