CFP last date
21 October 2024
Reseach Article

Instruction Detection System based on Support Vector Machine using BAT Algorithm

by Aliya Ahmad, Bhanu Pratap Singh Senga
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 158 - Number 8
Year of Publication: 2017
Authors: Aliya Ahmad, Bhanu Pratap Singh Senga
10.5120/ijca2017912843

Aliya Ahmad, Bhanu Pratap Singh Senga . Instruction Detection System based on Support Vector Machine using BAT Algorithm. International Journal of Computer Applications. 158, 8 ( Jan 2017), 27-30. DOI=10.5120/ijca2017912843

@article{ 10.5120/ijca2017912843,
author = { Aliya Ahmad, Bhanu Pratap Singh Senga },
title = { Instruction Detection System based on Support Vector Machine using BAT Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2017 },
volume = { 158 },
number = { 8 },
month = { Jan },
year = { 2017 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume158/number8/26930-2017912843/ },
doi = { 10.5120/ijca2017912843 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:04:19.391835+05:30
%A Aliya Ahmad
%A Bhanu Pratap Singh Senga
%T Instruction Detection System based on Support Vector Machine using BAT Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 158
%N 8
%P 27-30
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now these day Computers becomes vital part of everyday life and hence use of internet becomes more and more. Due to internet, computers are becomes vulnerable of different kinds of security threats. Therefore it is required that we need to have efficient security method in order to avoid leakage of important data or misuse of data. This security method is called as Intrusion Detection System (IDS). Since from last two decades IDS becomes core area of many researchers and many methods are already presented for efficient intrusion detection and classification. Most of methods are out dated as many new attacks generated by hackers. In this project our main aim is to presented scalable and efficient method for intrusion detection and classifications. Evolutionary algorithm has recently been applied to the anomaly based intrusion detection in computer networks. Evolutionary algorithm is a new technique used to solve various problems in the field of information security. To overcome these deficiencies of the IDS, the network system, a new double detection of IDS based on the integration of Evolutionary algorithm BAT and SVM .The BAT-SVM helps us solve the problem and the correlation theory is proposed model solves the problem of the unknown and the rapid development of damaging attacks.

References
  1. S. X. Wu and W. Banzhaf, “The Use of Computational Intelligence in Intrusion Detection Systems: A Review,” Applied Soft Computing, vol. 10, 2010, pp. 1–35.
  2. Peyman Kabiri and Ali A. Ghorbani, “Research on Intrusion Detection and Response: A Survey”, International Journal of Network Security, vol. 1, 2005, pp. 84-102.
  3. C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, “Intrusion Detection by Machine Learning: A Review,” Expert Systems with Applications, vol. 36, December 2009, pp. 11994– 12000.
  4. K. Shafi and H. A. Abbass, “An Adaptive Genetic-based Signature Learning System for Intrusion Detection,” Expert Systems with Applications, vol. 36, 2009, pp. 12036–12043.
  5. A. Ahmed, A. Lisitsa, and C. Dixon, “A Misuse-Based Network Intrusion Detection System Using Temporal Logic and Stream Processing,” Proc. International Conference on Network and System Security (NSS 11), 2011, pp. 1 – 8.
  6. S. Petrovic and K. Franke, “A New Two-Stage Search Procedure for Misuse Detection,” Proc. International Conference on Future Generation Communication and Networking (FGCN 07), 2007, pp. 418 – 422.
  7. P. G. Teodoro, J. D. Verdejo, G. M. Fernández, and E. Vazquez, “Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges,” Computers & Security, vol. 28, 2009, pp. 18–28.
  8. Jonathan J. Davis and Andrew J. Clark, "Data Preprocessing for Anomaly based Network Intrusion Detection: A Review", Computers & Security, vol. 30, 2011, pp. 353–375.
  9. F. Palmieri and U. Fiore, “Network Anomaly Detection through Nonlinear Analysis,” Computers & Security, vol. 29, October 2010, pp. 737–755.
  10. M. A. Aydın, A. H. Zaim, and K. G. Ceylan, “A Hybrid Intrusion Detection System Design for Computer Network Security,” Computers & Electrical Engineering, vol. 35, May 2009. pp. 517–526.
  11. C. Xiang, P. C. Yong, and L. S. Meng, “Design of Multiple- Level Hybrid Classifier for Intrusion Detection System using Bayesian Clustering and Decision Trees,” Pattern Recognition Letters, vol. 29, May 2008, pp. 918–924.
  12. P. Gogoi1, D. K. Bhattacharyya, B. Borah, and J. K. Kalita, “MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method,” The Computer Journal, vol. 57, 2013, pp. 602-623.
  13. R. Goel, A. Sardana, and R. C. Joshi, “Parallel Misuse and Anomaly Detection Model,” International Journal of Network Security, vol. 14, July 2012, pp. 211-222.
  14. W. Ren, L. Hu, K. Zhao, and J. Chu, “A Multiple-Level Hybrid Intrusion Detection System based on Hierarchical Clustering and Decision Trees,” Journal of Computational Information Systems, vol. 9, 2013, pp. 5421–5428.
  15. Varun, C., Arindam, B., Vipin, K.: Anomaly Detection, A Survey. ACM Computing Surveys, 2009,41(3):1-58.
  16. Frey, B.J., Dueck, D. Clustering by Passing Messages between Data Points. Science, 315(5814), 972-976 (2007)
  17. Davis J J, Clark A J. Data pre-processing for anomaly based network intrusion detection. A review [J]. Computers and Security, 2011, 30(6): 353-375.
Index Terms

Computer Science
Information Sciences

Keywords

Misuse Detection Anomaly Detection IDS SVM BAT Algorithm