Network intrusion detection using hybrid binary PSO and random forests algorithm

被引:37
作者
Malik, Arif Jamal [1 ]
Shahzad, Waseem [1 ]
Khan, Farrukh Aslam [1 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Comp Sci, Islamabad, Pakistan
关键词
network intrusion detection; particle swarm optimization; random forests; intrusion detection system; data mining; machine learning; FEATURE-SELECTION; ANOMALY DETECTION; ENSEMBLE; SYSTEM;
D O I
10.1002/sec.508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security risks grow with increase in the network size. In recent past, the attacks on computer networks have increased tremendously and require efficient network intrusion detection mechanisms. Data mining and machine-learning techniques have been used for network intrusion detection during the past few years and have gained much popularity. In this paper, we propose an intrusion detection mechanism based on binary particle swarm optimization (PSO) and random forests (RF) algorithms called PSO-RF and investigate the performance of various dimension reduction techniques along with a set of different classifiers including the proposed approach. Binary PSO is used to find more appropriate set of attributes for classifying network intrusions, and RF is used as a classifier. In the preprocessing step, we reduce the dimensions of the dataset by using different state-of-the-art dimension reduction techniques, and then this reduced dataset is presented to the proposed PSO-RF approach that further optimizes the dimensions of the data and finds an optimal set of features. PSO is an optimization method that has a strong global search capability and is used here for dimension optimization. We perform extensive experimentation to prove the worth of the proposed approach by using different performance metrics. The standard benchmark, that is, KDD99Cup dataset, is used that contains the information about various kinds of network intrusions. The experimental results indicate that the proposed approach performs better than the other approaches for the detection of all kinds of attacks present in the dataset. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:2646 / 2660
页数:15
相关论文
共 43 条
  • [1] Abraham A., 2001, Connectionist Models of Neurons, Learning Processes, and Artificial Intelligence. 6th International Work-Conference on Artificial and Natural Neural Networks, IWANN 2001. Proceedings, Part I (Lecture Notes in Computer Science Vol. 2084), P269
  • [2] Alves RT, 2004, LECT NOTES COMPUT SC, V3242, P1011
  • [3] Anderson D., 1995, Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system nides
  • [4] [Anonymous], 1999, UCI KDD ARCH KDD 99
  • [5] Banzhaf W, 1998, Genetic programming: an introduction: on the automatic evolution of computer programs and its applications
  • [6] Bosin A, 2005, LECT NOTES ARTIF INT, V3533, P445
  • [7] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [8] Chandrasekar A, 2009, INT J COMPUT SCI NET, V9, P296
  • [9] Feature deduction and ensemble design of intrusion detection systems
    Chebrolu, S
    Abraham, A
    Thomas, JP
    [J]. COMPUTERS & SECURITY, 2005, 24 (04) : 295 - 307
  • [10] Chen GL, 2007, ADV SOFT COMP, V40, P666