Evolving optimised decision rules for intrusion detection using particle swarm paradigm

被引:9
作者
Sindhu, Siva S. Sivatha [1 ]
Geetha, S. [2 ]
Kannan, A. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
[2] Thiagarajar Coll Engn, Dept Informat Technol, Madurai 625015, Tamil Nadu, India
关键词
intrusion detection system; decision tree; particle swarm optimisation; knowledge discovery and data mining dataset; machine learning; classification; ANOMALY DETECTION; NEURAL-NETWORK;
D O I
10.1080/00207721.2011.577244
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this article is to construct a practical intrusion detection system (IDS) that properly analyses the statistics of network traffic pattern and classify them as normal or anomalous class. The objective of this article is to prove that the choice of effective network traffic features and a proficient machine-learning paradigm enhances the detection accuracy of IDS. In this article, a rule-based approach with a family of six decision tree classifiers, namely Decision Stump, C4.5, Naive Baye's Tree, Random Forest, Random Tree and Representative Tree model to perform the detection of anomalous network pattern is introduced. In particular, the proposed swarm optimisation-based approach selects instances that compose training set and optimised decision tree operate over this trained set producing classification rules with improved coverage, classification capability and generalisation ability. Experiment with the Knowledge Discovery and Data mining (KDD) data set which have information on traffic pattern, during normal and intrusive behaviour shows that the proposed algorithm produces optimised decision rules and outperforms other machine-learning algorithm.
引用
收藏
页码:2334 / 2350
页数:17
相关论文
共 30 条
[1]   Intrusion detection using a fuzzy genetics-based learning algorithm [J].
Abadeh, M. Sanlee ;
Habibi, J. ;
Lucas, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :414-428
[2]   Evolutionary learning of hierarchical decision rules [J].
Aguilar-Ruiz, JS ;
Riquelme, JC ;
Toro, M .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2003, 33 (02) :324-331
[3]  
[Anonymous], 2008, WAIK ENV KNOWL AN WE
[4]  
[Anonymous], 2007, KDD CUP DATA SET
[5]  
[Anonymous], 1984, OLSHEN STONE CLASSIF, DOI 10.2307/2530946
[6]  
Bridges S.M., 2000, Proceedings of 12th Annual Canadian Information Technology Security Symposium, P109
[7]   Using evolutionary algorithms as instance selection for data reduction in KDD: An experimental study [J].
Cano, JR ;
Herrera, F ;
Lozano, M .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2003, 7 (06) :561-575
[8]  
Chen Y.M., 2010, INT J SYST SCI, V41, P1464
[9]   Environmentally constrained economic dispatch using Pareto archive particle swarm optimisation [J].
Chen, Yee Ming ;
Wang, Wen-Shiang .
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2010, 41 (05) :593-605
[10]   Protecting complex infrastructures against multiple strategic attackers [J].
Hausken, Kjell .
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2011, 42 (01) :11-29