Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Improved the Detection Ratio of Cyber Attack using Feature Reduction based on Support Vector Machine and Glowworm Optimization

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Himanshu Shroti, Kaptan Singh, Amit Saxena

Himanshu Shroti, Kaptan Singh and Amit Saxena. Improved the Detection Ratio of Cyber Attack using Feature Reduction based on Support Vector Machine and Glowworm Optimization. International Journal of Computer Applications 155(10):33-37, December 2016. BibTeX

	author = {Himanshu Shroti and Kaptan Singh and Amit Saxena},
	title = {Improved the Detection Ratio of Cyber Attack using Feature Reduction based on Support Vector Machine and Glowworm Optimization},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {155},
	number = {10},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {33-37},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2016912453},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The swarm intelligence plays vital role in feature reduction process in cyber-attack detection. The family of swarm intelligence gives bucket of algorithm for the processing of feature reduction such as ant colony optimization, particle swarm optimization and many more. In family of swarm new algorithm is called glowworm optimization algorithm based on the concept of luciferin. The luciferin collects the similar agent of glow and proceeds the minimum distance for the processing of lights. Such concept used for the reduction of feature in cyber-attack classification. The reduce attribute classified by well know classifier is called support vector machine. The combination of support vector machine and glowworm swarm optimization performs very well in compression of pervious feature reduction technique. The proposed algorithm is implemented in MATLAB software, for the validation of algorithm used KDDCUP99 dataset.


  1. Alvaro A. Cárdenas, Robin Berthier, Rakesh B. Bobba, Jun Ho Huh, Jorjeta G. Jetcheva, David Grochocki and William H. Sanders “A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures”, IEEE, 2014, Pp 906-915.
  2. Junho Hong, Chen-Ching Liu and ManimaranGovindarasu “Integrated Anomaly Detection for Cyber Security of the Substations”, IEEE, 2014, Pp 1-11.
  3. Preeti Singh and Amrish Tiwari “An Efficient Approach for Intrusion Detection in Reduced Features of KDD99 using ID3 and classification with KNNGA”, IEEE, 2015, Pp 445-452.
  4. Gaby AbouHaidar and CharbelBoustany “High Perception Intrusion Detection Systems Using Neural Networks”, IEEE, 2015, Pp 497-501.
  5. D.P.Gaikwad and Ravindra C. Thool “Intrusion Detection System Using Bagging Ensemble Method of Machine Learning”, IEEE, 2015, Pp 291-295.
  6. Robin Berthier and William H. Sanders “Specification-based Intrusion Detection for Advanced Metering Infrastructures”, IEEE, 2011, Pp 184-193.
  7. Robin Berthier and William H. Sanders “Monitoring Advanced Metering Infrastructures with Amilyzer”, IEEE, 2013, Pp 1-13.
  8. Adel NadjaranToosi and Mohsen Kahani “A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers”, Computer Communications, 2007, Pp 2201-2212.
  9. NasimBeigiMohammadi, Jelena Misic, Vojislav B. Misic and HamzehKhazaei “A framework for intrusion detection system in advanced metering infrastructure”, SECURITY AND COMMUNICATION NETWORKS, 2012, Pp 195-205.
  10. Massimo Ficco, Salvatore Venticinque and Beniamino Di Martino “MOSAIC-Based Intrusion Detection Framework for Cloud Computing”, COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2012, Pp 1-17.
  11. Mustafa Amir Faisal, Zeyar Aung, John R. Williams and Abel Sanchez “Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining”, Springer-Verlag Berlin Heidelberg, 2012, Pp 96-111.
  12. Vincenzo Gulisano, Magnus Almgren and Marina Papatriantafilou “Online and Scalable Data Validation in Advanced Metering Infrastructures”, IEEE, 2014, Pp 1-6.
  13. Gianluigi Folino, Clara Pizzuti and GiandomenicoSpezzano “GP Ensemble for Distributed Intrusion Detection Systems”, Springer Berlin Heidelberg, 2005, Pp 54-62.
  14. Chih-Fong Tsai, Yu-Feng Hsu, Chia-Ying Lin and Wei-Yang Lin “Intrusion detection by machine learning: A review”, EXPERT SYSTEMS WITH APPLICATIONS, 2009, Pp 11995-12000.
  15. Edward Guillen, Jhordany Rodriguez and Rafael Paez “Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation”, International Scholarly and Scientific Research & Innovation, 2013, Pp 1484-1490.
  16. Mustafa Amir Faisal, Zeyar Aung, John R. Williams and Abel Sanchez “Data Stream-based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study”, IEEE, 2014, Pp 1-14.
  17. Yu-Li Zhang, Xiao-Ping Ma, Ying Gu and Yan-Zi Miao “A Modified Glowworm Swarm Optimization for Multimodal Functions”, IEEE, 2011, Pp 2070-2075.
  18. K.N. Krishnanand and D. Ghose “Glowworm swarm optimization for simultaneous capture of multiple local optima of multimodal functions”, Springer, 2009, Pp 87-124.


Cyber Attack, Feature Reduction, GSO, SVM