Comparison of Genetic Algorithm Optimization on Artificial Neural Network and Support Vector Machine in Intrusion Detection System

被引:0
作者
Dastanpour, Amin [1 ]
Ibrahim, Suhaimi [1 ]
Mashinchi, Reza [2 ]
Selamat, Ali [3 ]
机构
[1] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Univ Technol Malaysia, Fac Comp, Johor Baharu, Malaysia
[3] Univ Technol Malaysia, Fac Comp Sci & IS, Johor Baharu, Malaysia
来源
2014 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS) | 2014年
关键词
Genetic algorithm (GA); Artificial Neural Network (ANN); Support Vector Machine (SVM); intrusion detection; machine learning;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the technology trend in the recent years uses the systems with network bases, it is crucial to detect them from threats. In this study, the following methods are applied for detecting the network attacks: support vector machine (SVM) classifier, artificial Neural Networks (ANN), and Genetic Algorithms (GA). The objective of this study is to compare the outcomes of GA with SVM and GA with ANN and then comparing the outcomes of GA with SVM and GA with ANN and other algorithms. Knowledge Discovery and Data Mining (KDD CPU99) data set has been used in this paper for obtaining the results.
引用
收藏
页码:72 / 77
页数:6
相关论文
共 28 条
[1]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[2]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[3]  
[Anonymous], 2000, ACM SIGKDD EXPLORATI, DOI DOI 10.1145/846183.846201
[4]  
Bivens A., 2002, P INT ENG SYST ART N, V12, P579
[5]   Neural visualization of network traffic data for intrusion detection [J].
Corchado, Emilio ;
Herrero, Alvaro .
APPLIED SOFT COMPUTING, 2011, 11 (02) :2042-2056
[6]  
Dastanpour Amin, 2014, International Conference on Computer Security and Digital Investigation (ComSec2014), P1
[7]  
Dastanpour Amin, 2013, The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), P169
[8]  
Dhopte S., GENETIC ALGORITHM IN
[9]   Towards Intrusion Detection for Encrypted Networks [J].
Goh, Vik Tor ;
Zimmermann, Jacob ;
Looi, Mark .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :540-545
[10]  
Gupta P, 2011, COMM COM INF SC, V198, P122