Evolutionary Approach for Network Anomaly Detection Using Effective Classification

被引:0
|
作者
Chandrasekar, A. [1 ]
Vasudevan, V. [3 ]
Yogesh, P. [2 ]
机构
[1] Anna Univ, Madras, Tamil Nadu, India
[2] Anna Univ, Comp Sci & Engn Dept, Madras, Tamil Nadu, India
[3] AK Coll Engn, Informat Technol, Chennai, Tamil Nadu, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2009年 / 9卷 / 01期
关键词
IDS; PSO; PSO-SVM; Anomaly detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection Systems (IDS) have become a necessary component of the computer and information security framework. Due to the increase in unauthorized access and stealing of internet resources, internet security has become a very significant issue. Network anomalies in particular can cause many potential problems. This work discusses about the ways of implementing Evolutionary Approach for Network based Anomaly Detection Systems using Effective Classification. It involves characterizing the network traffic and detecting intrusion through observation of deviation from normal behavior patterns. This work aims at providing a potential solution to the problem of Network intrusion by using effective classification technique Support Vector Machines, Evolutionary approaches namely genetic algorithm(GA) and Particle Swarm Optimization (PSO). These evolutionary approaches are used for feature selection and SVM is used for classification. We tested this technique using KDD Cup99 dataset, and analyzed its performance. The experimental results show that the PSO-SVM is an effective approach in network intrusion detection.
引用
收藏
页码:296 / 302
页数:7
相关论文
共 50 条
  • [1] Network Traffic Classification for Anomaly Detection Fuzzy Clustering Based Approach
    Asmuss, Julija
    Lauks, Gunars
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 313 - 318
  • [2] Network anomaly detection by continuous hidden markov models: An evolutionary programming approach
    Flores, Juan J.
    Calderon, Felix
    Antolino, Anastacio
    Garcia, Juan M.
    INTELLIGENT DATA ANALYSIS, 2015, 19 (02) : 391 - 412
  • [3] A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection
    Nkenyereye, Lewis
    Tama, Bayu Adhi
    Lim, Sunghoon
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (02): : 2217 - 2227
  • [4] An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection
    Kumar, Gunupudi Rajesh
    Gugulothu, Narsimha
    Nimmala, Mangathayaru
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (04) : 19 - 49
  • [5] IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach
    Thing, Vrizlynn L. L.
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [6] An Effective Unsupervised Network Anomaly Detection Method
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 533 - 539
  • [7] Anomaly Detection Using Classification CNN Models: A Video Analytic Approach
    Girisha, S.
    Pai, Manohara M. M.
    Verma, Ujjwal
    Pai, Radhika M.
    Shreesha, S.
    2021 IEEE REGION 10 CONFERENCE (TENCON 2021), 2021, : 923 - 928
  • [8] A Unified Approach to Network Anomaly Detection
    Babaie, Tahereh
    Chawla, Sanjay
    Ardon, Sebastien
    Yu, Yue
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014, : 650 - 655
  • [9] BAYESIAN CLASSIFICATION, ANOMALY DETECTION, AND SURVIVAL ANALYSIS USING NETWORK INPUTS WITH APPLICATION TO THE
    Josephs, Nathaniel
    Lin, Lizhen
    Rosenberg, Steven
    Kolaczyk, Eric D.
    ANNALS OF APPLIED STATISTICS, 2023, 17 (01): : 199 - 224
  • [10] A Novel Network Traffic Anomaly Detection Approach Using the Optimal φ-DTW
    Zhan, Peng
    Xu, Haoran
    Luo, Wei
    Li, Xueqing
    PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 48 - 51