An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection

被引:149
|
作者
Lin, Shih-Wei [2 ]
Ying, Kuo-Ching [3 ]
Lee, Chou-Yuan
Lee, Zne-Jung [1 ]
机构
[1] Huafan Univ, Dept Informat Management, Shihding Dist 22301, New Taipei Coun, Taiwan
[2] Chang Gung Univ, Dept Informat Management, Tao Yuan, Taiwan
[3] Natl Taipei Univ Technol, Dept Ind Engn & Management, Taipei 10608, Taiwan
关键词
Intelligent algorithm; Anomaly detection; Support vector machine; Decision tree; Simulated annealing; SUPPORT VECTOR MACHINES; PARAMETER DETERMINATION; OPTIMIZATION;
D O I
10.1016/j.asoc.2012.05.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection system (IDS) is to monitor the attacks occurring in the computer or networks. Anomaly intrusion detection plays an important role in IDS to detect new attacks by detecting any deviation from the normal profile. In this paper, an intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection is proposed. The key idea is to take the advantage of support vector machine (SVM), decision tree (DT), and simulated annealing (SA). In the proposed algorithm, SVM and SA can find the best selected features to elevate the accuracy of anomaly intrusion detection. By analyzing the information from using KDD'99 dataset, DT and SA can obtain decision rules for new attacks and can improve accuracy of classification. In addition, the best parameter settings for the DT and SVM are automatically adjusted by SA. The proposed algorithm outperforms other existing approaches. Simulation results demonstrate that the proposed algorithm is successful in detecting anomaly intrusion detection. (C) 2012 Published by Elsevier B.V.
引用
收藏
页码:3285 / 3290
页数:6
相关论文
共 50 条
  • [1] Intelligent Feature Selection Method rooted in Binary Bat Algorithm for Intrusion Detection
    Enache, Adriana-Cristina
    Sgarciu, Valentin
    Petrescu-Nita, Alina
    2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2015, : 517 - 521
  • [2] A Feature Selection Approach implemented with the Binary Bat Algorithm applied for Intrusion Detection
    Enache, Adriana-Cristina
    Sgarciu, Valentin
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 11 - 15
  • [3] An Advanced Fitness Function Optimization Algorithm for Anomaly Intrusion Detection Using Feature Selection
    Hong, Sung-Sam
    Lee, Eun-joo
    Kim, Hwayoung
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [4] New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems
    Kherbache, Meriem
    Espes, David
    Amroun, Kamal
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 3 - 19
  • [5] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [6] Improving feature selection in anomaly intrusion detection using specifications
    Wang, Y
    Miner, A
    Wong, J
    Uppuluri, P
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 468 - 468
  • [7] The Influence of Salp Swarm Algorithm-Based Feature Selection on Network Anomaly Intrusion Detection
    Alsaleh, Alanoud
    Binsaeedan, Wojdan
    IEEE ACCESS, 2021, 9 : 112466 - 112477
  • [8] An Intelligent CRF Based Feature Selection for Effective Intrusion Detection
    Ganapathy, Sannasi
    Vijayakumar, Pandi
    Yogesh, Palanichamy
    Kannan, Arputharaj
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (01) : 44 - 50
  • [9] A feature selection algorithm towards efficient intrusion detection
    Yin, Chunyong
    Ma, Luyu
    Feng, Lu
    Yin, Zhichao
    Wang, Jin
    International Journal of Multimedia and Ubiquitous Engineering, 2015, 10 (11): : 253 - 264
  • [10] Cyber intrusion detection by combined feature selection algorithm
    Mohammadi, Sara
    Mirvaziri, Hamid
    Ghazizadeh-Ahsaee, Mostafa
    Karimipour, Hadis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 : 80 - 88