A novel Chaotic Flower Pollination-based intrusion detection framework

被引:2
作者
Singh, Amrit Pal [1 ]
Kaur, Arvinder [2 ]
Pal, Saibal Kumar [3 ]
机构
[1] Jaypee Inst Informat Technol, Noida, India
[2] USICT, GGSIPU, New Delhi, India
[3] DRDO, SAG Lab, New Delhi, India
关键词
Intrusion detection system; Flower Pollination Algorithm; Chaotic distribution; Feature selection; support vector machine; PARTICLE SWARM OPTIMIZATION; DETECTION SYSTEM; FEATURE-SELECTION; ALGORITHM; CLASSIFICATION; ATTACKS;
D O I
10.1007/s00500-020-04937-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rise of network on handheld devices, security of the network has become critical issue. Intrusion detection system is used to predict intrusive packets on network; two-step procedure has been used to predict the intrusion, i.e., feature selection and then classification. Firstly, unwanted and expandable features in data lead to network classification problem which affect the decision capability of the classifiers, so we need optimize feature selection technique. Feature selection technique used in this paper is based on the correlation information known as correlation-based feature selection (CFS). In this paper, CFS's search algorithm is implemented using Chaotic Flower Pollination Algorithm (CFPA) that logically selects the most favorable features for classification referred as CFPA-CFS. Further, hybridization of CFPA and support vector machine classifier is implemented and named as CFPSVM. Finally, novel IDS framework uses CFPA-CFS and CFPSVM in sequence to predict the intrusion. Further, performance of proposed framework is evaluated using two intrusion detection evaluation datasets, namely KDDCup99 and NSL-KDD. The results demonstrate that proposed CFPA-CFS contributes more critical features for CFPSVM to achieve better accuracy compared with the state-of-the-art methods.
引用
收藏
页码:16249 / 16267
页数:19
相关论文
共 60 条
  • [1] Abdel-Raouf Osama, 2014, International Journal of Modern Education and Computer Science, V6, P18, DOI 10.5815/ijmecs.2014.08.03
  • [2] Abdel-Raouf Osama, 2014, International Journal of Modern Education and Computer Science, V6, P38, DOI 10.5815/ijmecs.2014.03.05
  • [3] D-SCIDS: Distributed soft computing intrusion detection system
    Abraham, Ajith
    Jain, Ravi
    Thomas, Johnson
    Han, Sang Yong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 81 - 98
  • [4] Abualigah L.M.Q., 2019, FEATURE SELECTION EN
  • [5] Hybrid clustering analysis using improved krill herd algorithm
    Abualigah, Laith Mohammad
    Khader, Ahamad Tajudin
    Hanandeh, Essam Said
    [J]. APPLIED INTELLIGENCE, 2018, 48 (11) : 4047 - 4071
  • [6] A combination of objective functions and hybrid Krill herd algorithm for text document clustering analysis
    Abualigah, Laith Mohammad
    Khader, Ahamad Tajudin
    Hanandeh, Essam Said
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2018, 73 : 111 - 125
  • [7] A new feature selection method to improve the document clustering using particle swarm optimization algorithm
    Abualigah, Laith Mohammad
    Khader, Ahamad Tajudin
    Hanandeh, Essam Said
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 456 - 466
  • [8] Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering
    Abualigah, Laith Mohammad
    Khader, Ahamad Tajudin
    [J]. JOURNAL OF SUPERCOMPUTING, 2017, 73 (11) : 4773 - 4795
  • [9] Abualigah Laith Mohammad Qasim, 2015, INT J COMPUTER SCI E, V5, P19, DOI DOI 10.5121/ijcsea.2015.5102
  • [10] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713