Toward support-vector machine-based ant colony optimization algorithms for intrusion detection

被引:13
作者
Alqarni, Ahmed Abdullah [1 ]
机构
[1] Al Baha Univ, Dept Comp Sci & Informat Technol, Al Baha, Saudi Arabia
关键词
Machine learning; Computation algorithms; Network traffic analysis; Cybersecurity; MODEL;
D O I
10.1007/s00500-023-07906-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the major challenges of network traffic analysis is intrusion detection. Intrusion detection systems (IDSs) are designed to detect malicious activities that attempt to compromise the confidentiality, integrity, and assurance of computer systems. Intrusion detection system has become the most widely employed security technology. The novelty of the proposed research is to develop a system for IDSs. In this research, a support-vector machine (SVM) with ant colony optimization (ACO) is proposed to detect an intrusion. Standard data sets, namely Knowledge Discovery and Data Mining (KDD) Cup '99 and Network Security Laboratory (NSL)-KDD, were utilized to test the results of the proposed system. One of the greatest challenges in a network analysis dataset is dimensionality. To handle dimensionality reduction, the ant colony optimization algorithm was applied. In the ACO method, significant subset features are selected from the entire dataset. These subset features have proceeded the SVM machine learning algorithm for detection intrusion. The empirical results point out that the SVM with ACO has obtained superior accuracy. It is concluded that the SVM-ACO model can more efficiently protect a network system from intrusion.
引用
收藏
页码:6297 / 6305
页数:9
相关论文
共 25 条
[11]   SUPPORT-VECTOR NETWORKS [J].
CORTES, C ;
VAPNIK, V .
MACHINE LEARNING, 1995, 20 (03) :273-297
[12]   Machine Learning DDoS Detection for Consumer Internet of Things Devices [J].
Doshi, Rohan ;
Apthorpe, Noah ;
Feamster, Nick .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :29-35
[13]  
Hu W., 2003, ICMLA, P168
[14]  
Joshi M, 2015, REV NETWORK TRAFFIC, P23
[15]  
Kanaka Vardhini K., 2017, INT J APPL ENG RES, V12, P1844
[16]  
Kokila RT, 2014, INT CONF ADV COMPU, P205, DOI 10.1109/ICoAC.2014.7229711
[17]   Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP'99 IDS Database [J].
Kotpalliwar, Manjiri V. ;
Wajgi, Rakhi .
2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, :987-990
[18]   An efficient intrusion detection system based on support vector machines and gradually feature removal method [J].
Li, Yinhui ;
Xia, Jingbo ;
Zhang, Silan ;
Yan, Jiakai ;
Ai, Xiaochuan ;
Dai, Kuobin .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) :424-430
[19]   Intrusion detection in MANET using classification algorithms: The effects of cost and model selection [J].
Mitrokotsa, Aikaterini ;
Dimitrakakis, Christos .
AD HOC NETWORKS, 2013, 11 (01) :226-237
[20]  
Moskovitch R, 2007, LECT NOTES ARTIF INT, V4667, P489