CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Selective Iteration based Particle Swarm Optimization (SIPSO) for Intrusion Detection System

by Sana Warsi, Yogesh Rai, Santosh Kushwaha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 17
Year of Publication: 2015
Authors: Sana Warsi, Yogesh Rai, Santosh Kushwaha
10.5120/ijca2015905822

Sana Warsi, Yogesh Rai, Santosh Kushwaha . Selective Iteration based Particle Swarm Optimization (SIPSO) for Intrusion Detection System. International Journal of Computer Applications. 124, 17 ( August 2015), 24-30. DOI=10.5120/ijca2015905822

@article{ 10.5120/ijca2015905822,
author = { Sana Warsi, Yogesh Rai, Santosh Kushwaha },
title = { Selective Iteration based Particle Swarm Optimization (SIPSO) for Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 17 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number17/22197-2015905822/ },
doi = { 10.5120/ijca2015905822 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:41.021745+05:30
%A Sana Warsi
%A Yogesh Rai
%A Santosh Kushwaha
%T Selective Iteration based Particle Swarm Optimization (SIPSO) for Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 17
%P 24-30
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the current age Intrusion detection is an interest in and challenging area. As there are now a few exploration works are as of now done and the outcome change is in advancement. In this paper a hybrid approach has been proposed which is based on association rule mining and Selective Iteration based Particle Swarm Optimization (SIPSO). The NSL-KDD dataset is used. First normal and attack nodes are separated. Then normal node is checked for suspicious behavior. Then association rule mining is applied to form the associated for the next preprocessing. Then we apply SIPSO to check the threshold value obtained for the different intrusion types. If it is passed the threshold velocity assigned, then it will be categorized as the specific attack. We have considered a Denial of Service (DoS), User to Root (U2R), Remote to User (R2L) and Probing (Probe) attacks in this research work. The results show the improvement in detection as compared to the previous method.

References
  1. Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov ,” A Formal Immune Network and Its Implementation for On-line Intrusion Detection”, Lecture Notes in Computer Science Volume 3685, pp 394- 405, 2005.
  2. Ranjna Patel, Deepa Bakhshi and Tripti Arjariya,“Random Particle Swarm Optimization (RPSO) based Intrusion Detection System " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-2, Issue-5, April-2015 ,pp.60-66.
  3. Meng Jianliang,Shang Haikun,Bian Ling,” The Application on Intrusion Detection Based on K-means Cluster Algorithm”, International Forum on Information Technology and Applications, 2009.
  4. Lundin, E. and Jonsson, E. “Survey of research in the intrusion detection area”, Technical Report, Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden. January 2002.
  5. R.Venkatesan, R. Ganesan, A. Arul Lawrence Selvakumar, " A Comprehensive Study in Data Mining Frameworks for Intrusion Detection " , International Journal of Advanced Computer Research (IJACR), Volume-2, Issue-7, December-2012 ,pp.29-34.
  6. S.Devaraju, S.Ramakrishnan:,”Analysis of Intrusion Detection System Using Various Neural Network classifiers, IEEE 2011.
  7. Moriteru Ishida, Hiroki Takakura and Yasuo Okabe,” High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-based Labelling”, IEEE/IPSJ International Symposium on Applications and the Internet, 2011.
  8. S. T. Brugger, “Data mining methods for network intrusion detection”,pp. 1-65, 2004.
  9. W. Lee, S. J. Stolfo, “Data Mining Approaches for Intrusion Detection”,Proceedings of the 1998 USENIX Security Symposium, 1998.
  10. Kamini Nalavade, B.B. Meshram, “Mining Association Rules to Evade Network Intrusion in Network Audit Data " , International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-15, June-2014 ,pp.560-567.
  11. W. Lee, S. J. Stolfo, “Data mining approaches for intrusion detection” Proc. of the 7th USENIX Security Symp.. San Antonio, TX, 1998.
  12. Reyadh Naoum, Shatha Aziz, Firas Alabsi, “An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection”, International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-15, June-2014, pp.487-493.
  13. Aditya Shrivastava, Mukesh Baghel, Hitesh Gupta, " A Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach " , International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-12, September-2013 ,pp.224-228.
  14. LI Yin–huan , “Design of Intrusion Detection Model Based on Data Mining Technology”, International Conference on Industrial Control and Electronics Engineering, 2012.
  15. P. Prasenna, R. Krishna Kumar, A.V.T Raghav Ramana and A. Devanbu “Network Programming And Mining Classifier For Intrusion Detection Using Probability Classification”, Pattern Recognition, Informatics and Medical Engineering, March 21-23, 2012.
  16. LI Han, ”Using a Dynamic K-means Algorithm to Detect Anomaly Activities”, Seventh International Conference on Computational Intelligence and Security, 2011.
  17. Z. Muda, W. Yassin, M.N. Sulaiman, N.I. Udzir,” Intrusion Detection based on K-Means Clustering and Naïve Bayes Classification”, 7th International Conference on IT in Asia (CITA), 2011.
  18. Deshmukh, D.H.; Ghorpade, T.; Padiya, P., "Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset," Electronics and Communication Systems (ICECS), 2014 International Conference on , vol., no., pp.1,7, 13-14 Feb. 2014.
  19. Benaicha, S.E.; Saoudi, L.; Bouhouita Guermeche, S.E.; Lounis, O., "Intrusion detection system using genetic algorithm," Science and Information Conference (SAI), 2014 , vol., no., pp.564,568, 27-29 Aug. 2014.
  20. Kiss, I.; Genge, B.; Haller, P.; Sebestyen, G., "Data clustering-based anomaly detection in industrial control systems," Intelligent Computer Communication and Processing (ICCP), 2014 IEEE International Conference on , vol., no., pp.275,281, 4-6 Sept. 2014.
  21. Thaseen, I.S.; Kumar, C.A., "Intrusion detection model using fusion of PCA and optimized SVM," Contemporary Computing and Informatics (IC3I), 2014 International Conference on , vol., no., pp.879,884, 27-29 Nov. 2014.
  22. Wagh, S.K.; Kolhe, S.R., "Effective intrusion detection system using semi-supervised learning," Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on , vol., no., pp.1,5, 5-6 Sept. 2014.
  23. Masarat, S.; Taheri, H.; Sharifian, S., "A novel framework, based on fuzzy ensemble of classifiers for intrusion detection systems," Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on , vol., no., pp.165,170, 29-30 Oct. 2014.
  24. Description of Kyoto University Benchmark Data http://www.takakura.com/Kyoto_data/BenchmarkData-Description-v3.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Association rule mining SIPSO DoS U2R R2L Probe