An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization

被引:144
作者
Bamakan, Seyed Mojtaba Hosseini [1 ,2 ]
Wang, Huadong [1 ]
Tian Yingjie [1 ]
Shi, Yong [1 ,2 ,3 ]
机构
[1] Univ Chinese Acad Sci, Key Lab Big Data Min & Knowledge Management, Beijing 10090, Peoples R China
[2] Univ Chinese Acad Sci, Sch Econ & Management, Beijing 10090, Peoples R China
[3] Univ Nebraska, Coll Informat Sci & Technol, Omaha, NE 68182 USA
基金
中国国家自然科学基金;
关键词
Intrusion detection; Support vector machine; Parameter setting; Feature selection; SUPPORT VECTOR MACHINES; FEATURE-SELECTION; DETECTION SYSTEM; ANOMALY DETECTION; SVM; CLASSIFIER; PSO;
D O I
10.1016/j.neucom.2016.03.031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many organizations recognize the necessities of utilizing sophisticated tools and systems to protect their computer networks and reduce the risk of compromising their information. Although many machine learning-based data classification algorithm has been proposed in network intrusion detection problem, each of them has its own strengths and weaknesses. In this paper, we propose an effective intrusion detection framework by using a new adaptive, robust, precise optimization method, namely, time varying chaos particle swarm optimization (TVCPSO) to simultaneously do parameter setting and feature selection for multiple criteria linear programming (MCLP) and support vector machine (SVM). In the proposed methods, a weighted objective function is provided, which takes into account trade-off between the maximizing the detection rate and minimizing the false alarm rate, along with considering the number of features. Furthermore, to make the particle swarm optimization algorithm faster in searching the optimum and avoid the search being trapped in local optimum, chaotic concept is adopted in PSO and time varying inertia weight and time varying acceleration coefficient is introduced. The performance of proposed methods has been evaluated by conducting experiments with the NSL-KDD dataset, which is derived and modified from well-known KDD cup 99 data sets. The empirical results show that the proposed method performs better in terms of having a high detection rate and a low false alarm rate when compared with the obtained results using all features. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:90 / 102
页数:13
相关论文
共 75 条
  • [21] A New Intrusion Detection Approach using PSO based Multiple Criteria Linear Programming
    Bamakan, Seyed Mojtaba Hosseini
    Amiri, Behnam
    Mirzabagheri, Mahboubeh
    Shi, Yong
    [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2015, 2015, 55 : 231 - 237
  • [22] Chaotic particle swarm optimization for economic dispatch considering the generator constraints
    Cai Jiejin
    Ma Xiaoqian
    Li Lixiang
    Peng Haipeng
    [J]. ENERGY CONVERSION AND MANAGEMENT, 2007, 48 (02) : 645 - 653
  • [23] An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection
    Catania, Carlos A.
    Bromberg, Facundo
    Garcia Garino, Carlos
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (02) : 1822 - 1829
  • [24] Training ν-support vector classifiers:: Theory and algorithms
    Chang, CC
    Lin, CJ
    [J]. NEURAL COMPUTATION, 2001, 13 (09) : 2119 - 2147
  • [25] Towards an optimal support vector machine classifier using a parallel particle swarm optimization strategy
    Chen, Hui Ling
    Yang, Bo
    Wang, Su Jing
    Wang, Gang
    Liu, Da You
    Li, Huai Zhong
    Liu, Wen Bin
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2014, 239 : 180 - 197
  • [26] Application of SVM and ANN for intrusion detection
    Chen, WH
    Hsu, SH
    Shen, HP
    [J]. COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) : 2617 - 2634
  • [27] Selection of Candidate Support Vectors in incremental SVM for network intrusion detection
    Chitrakar, Roshan
    Huang, Chuanhe
    [J]. COMPUTERS & SECURITY, 2014, 45 : 231 - 241
  • [28] A hybrid network intrusion detection system using simplified swarm optimization (SSO)
    Chung, Yuk Ying
    Wahid, Noorhaniza
    [J]. APPLIED SOFT COMPUTING, 2012, 12 (09) : 3014 - 3022
  • [29] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
  • [30] de la Hoz E, 2013, LECT NOTES COMPUT SC, V8073, P103, DOI 10.1007/978-3-642-40846-5_11