An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection

被引:149
作者
Lin, Shih-Wei [2 ]
Ying, Kuo-Ching [3 ]
Lee, Chou-Yuan
Lee, Zne-Jung [1 ]
机构
[1] Huafan Univ, Dept Informat Management, Shihding Dist 22301, New Taipei Coun, Taiwan
[2] Chang Gung Univ, Dept Informat Management, Tao Yuan, Taiwan
[3] Natl Taipei Univ Technol, Dept Ind Engn & Management, Taipei 10608, Taiwan
关键词
Intelligent algorithm; Anomaly detection; Support vector machine; Decision tree; Simulated annealing; SUPPORT VECTOR MACHINES; PARAMETER DETERMINATION; OPTIMIZATION;
D O I
10.1016/j.asoc.2012.05.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection system (IDS) is to monitor the attacks occurring in the computer or networks. Anomaly intrusion detection plays an important role in IDS to detect new attacks by detecting any deviation from the normal profile. In this paper, an intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection is proposed. The key idea is to take the advantage of support vector machine (SVM), decision tree (DT), and simulated annealing (SA). In the proposed algorithm, SVM and SA can find the best selected features to elevate the accuracy of anomaly intrusion detection. By analyzing the information from using KDD'99 dataset, DT and SA can obtain decision rules for new attacks and can improve accuracy of classification. In addition, the best parameter settings for the DT and SVM are automatically adjusted by SA. The proposed algorithm outperforms other existing approaches. Simulation results demonstrate that the proposed algorithm is successful in detecting anomaly intrusion detection. (C) 2012 Published by Elsevier B.V.
引用
收藏
页码:3285 / 3290
页数:6
相关论文
共 50 条
  • [21] Network Intrusion Detection with Bat Algorithm for Synchronization of Feature Selection and Support Vector Machines
    Cheng, Chunying
    Bao, Lanying
    Bao, Chunhua
    ADVANCES IN NEURAL NETWORKS - ISNN 2016, 2016, 9719 : 401 - 408
  • [22] A feature selection-driven machine learning framework for anomaly-based intrusion detection systems
    Emirmahmutoglu, Emre
    Atay, Yilmaz
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)
  • [23] An Intrusion Detection Algorithm Based on Feature Graph
    Yu, Xiang
    Tian, Zhihong
    Qiu, Jing
    Su, Shen
    Yan, Xiaoran
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 61 (01): : 255 - 273
  • [24] Intrusion detection system model: a white-box decision tree with feature selection optimization
    W. K. Wong
    Filbert H. Juwono
    Sivaraman Eswaran
    Foad Motelebi
    Neural Computing and Applications, 2025, 37 (7) : 5655 - 5670
  • [25] An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    Depren, O
    Topallar, M
    Anarim, E
    Ciliz, MK
    EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) : 713 - 722
  • [26] Supervised feature selection techniques in network intrusion detection: A critical review
    Di Mauro, M.
    Galatro, G.
    Fortino, G.
    Liotta, A.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 101
  • [27] A survey of intrusion detection techniques based on negative selection algorithm
    Singh, Kuldeep
    Kaur, Lakhwinder
    Maini, Raman
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) : 175 - 185
  • [28] Evolving optimised decision rules for intrusion detection using particle swarm paradigm
    Sindhu, Siva S. Sivatha
    Geetha, S.
    Kannan, A.
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2012, 43 (12) : 2334 - 2350
  • [29] INTRUSION DETECTION BASED ON MACHINE LEARNING AND FEATURE SELECTION
    Alaoui, Souad
    El Gonnouni, Amina
    Lyhyaoui, Abdelouahid
    MENDEL 2011 - 17TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING, 2011, : 199 - 206
  • [30] Optimal evaluation of feature selection in intrusion detection modeling
    Hu, Wei
    Li, Jianhua
    Shi, Jianjun
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 5919 - +