Genetic Programming Feature Extraction with Different Robust Classifiers for Network Intrusion Detection
![]() |
10.5120/ijca2017914276 |
Khaled Badran and Alaa Rohim. Genetic Programming Feature Extraction with Different Robust Classifiers for Network Intrusion Detection. International Journal of Computer Applications 168(1):37-43, June 2017. BibTeX
@article{10.5120/ijca2017914276, author = {Khaled Badran and Alaa Rohim}, title = {Genetic Programming Feature Extraction with Different Robust Classifiers for Network Intrusion Detection}, journal = {International Journal of Computer Applications}, issue_date = {June 2017}, volume = {168}, number = {1}, month = {Jun}, year = {2017}, issn = {0975-8887}, pages = {37-43}, numpages = {7}, url = {http://www.ijcaonline.org/archives/volume168/number1/27841-2017914276}, doi = {10.5120/ijca2017914276}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
In this paper, we compare the performance of three traditional robust classifiers (Neural Networks, Support Vector Machines, and Decision Trees) with and without utilizing multi-objective genetic programming in the feature extraction phase. This work argues that effective feature extraction can significantly enhance the performance of these classifiers. We have applied these three classifiers stand alone to real world five datasets from the UCI machine learning database and also to network intrusion “KDD-99 cup” dataset. Then, the experiments were repeated by adding the feature extraction phase. The results of the two approaches are compared and conclude that the effective method is to evolve optimal feature extractors that transform input pattern space into a decision space in which the performance of traditional robust classifiers can be enhanced.
References
- Y Zhang and P I Rockett “Domain-Independent Approaches to Optimise Feature Extraction for MultiClassification using Multi-Objective Genetic Programming” Technical Report No. VIE 2007/001 Department of Electronic and Electrical Engineering University of Sheffield
- Y. Liu, F. Tang, and Z. Zeng, “Feature selection based on dependency margin,” IEEE Trans. Cybern., vol. 45, no. 6, pp. 1209–1221, Jun. 2015.
- H. Liu and Z. Zhao, “Manipulating data and dimension reduction methods: Feature selection,” in Encyclopedia of Complexity and Systems Science. Berlin, Germany: Springer, 2009, pp. 5348–5359.
- H. Liu, H. Motoda, R. Setiono, and Z. Zhao, “Feature selection: An ever evolving frontier in data mining,” in Proc. JMLR Feature Sel. Data Min., vol. 10. Hyderabad, India, 2010, pp. 4–13.
- H. Liu and L. Yu, “Toward integrating feature selection algorithms for classification and clustering,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 4, pp. 491–502, Apr. 2005.
- J. Koza “ Genetic programming: On the programming of computers by means of natural selection MIT Press, Cambridge, Massachusetts (1992)
- C. Darwin “ On the origin of species by means of natural selection or the preservation of favoured races in the struggle for life” Cambridge University Press, Cambridge, UK (1864)
- Peter A. Whigham, and Grant Dick, “Implicitly Controlling Bloat in Genetic Programming,” IEEE Transaction on Evolutionary Computation, Vol. 14, No. 2, APRIL 2010, pp. 173-190.
- M. J. Streeter, “The root causes of code growth in genetic programming,” in Proc. Genet. Programming (EuroGP ’03), vol. 2610. Essex: SpringerVerlag, Apr. 14–16, 2003, pp. 443–454
- H. Stringer and A. Wu, “Bloat is unnatural: An analysis of changes invariable chromosome length absent selection pressure,” Univ. Central Florida, Tech. Rep. CS-TR-04-01, 2004.
- C. Skinner, P. J. Riddle, and C. Triggs, “Mathematics prevents bloat,” in Proc. 2005 IEEE Congr. Evol.Comput., vol. 1. Edinburgh, U.K.: IEEE Press, Sep.2–5, 2005, pp. 390–395
- Elsayed S, Sarker R, Essam D (2015) Survey of uses of evolutionary computation algorithms and swarm intelligence for network intrusion detection. International Journal of Computational Intelligence and Applications 14(04):1550,025, D
- H. Liu and Z. Zhao, “Manipulating data and dimension reduction methods: Feature selection,” in Encyclopedia of Complexity and Systems Science. Berlin, Germany: Springer, 2009, pp. 5348–5359.
- H. Liu, H. Motoda, R. Setiono, and Z. Zhao, “Feature selection: An ever evolving frontier in data mining,” in Proc. JMLR Feature Sel. DataMin., vol. 10. Hyderabad, India, 2010, pp. 4–13.
- B. Xue, M. Zhang, and W. N. Browne, “Particle swarm optimization for feature selection in classification: A multi-objective approach,” IEEETrans. Cybern., vol. 43, no. 6, pp. 1656–1671, Dec. 2013.
- Raymer, M., Punch, W., Goodman, E., & Kuhn, L.. Genetic programming for improved data mining: Application to the biochemistry of protein interactions. In Proceedings of the first annual conference on genetic programming (pp. 375–380). Cambridge, Massachusetts: MIT Press. (1996)
- Bot, M., & Langdon, W. Application of genetic programming to induction of linear classification trees. In Genetic programming, proceedings of EuroGP’2000 (pp. 247–258). Berlin, Heidelberg: Springer-Verlag. Chui, C. (1992). An introduction to wavelets. Boston: Academic Press.
- Kotani, M., Nakai, M., & Akazawa, K. . Feature extraction using evolutionary computation. In Proceedings of the 1999 congress on evolutionary computation, 1999. CEC 99 (Vol. 2, pp. 1230–1236).
- Raymer, M., Punch, W., Goodman, E., & Kuhn, L. Genetic programming for improved data mining: Application to the biochemistry of protein interactions. In Proceedings of the first annual conference on genetic programming (pp. 375–380). Cambridge, Massachusetts: MIT Press.1996
- Tackett, W. Genetic programming for feature discovery and image discrimination. In Proceedings of the fifth international conference on genetic algorithms, ICGA-93 (pp. 303–309). 1993
- Sherrah, J. Automatic feature extraction for pattern recognition. Ph.D. Thesis, The University of Adelaide.1998
- Krawiec, K. Genetic programming-based construction of features for machine learning and knowledge discovery tasks. Genetic Programming and Evolvable Machines, 3(4), 329–343.2002
- Cristina Vatamanu, Dragos Gavrilut, Razvan Benchea, Henri Luchian, "Feature Extraction Using Genetic Programming with Applications in Malware Detection", , vol. 00, no. , pp. 224-231, 2015.
- D. Song, M. Heywood and A. N. Zincir-Heywood, A linear genetic programming approach to intrusion detection, Genetic and Evolutionary Computation — GECCO 2003 (2003) 2325–2336.
- A. Abraham, C. Grosan and C. Martin-Vide, Evolutionary design of intrusion detection programs, Int. J. Netw. Security 4 (2007) 328–339.
- W. Lu and I. Traore, Detecting new forms of network intrusion using genetic programming, Comput. Intell. 20 (2004) 475–494.
- A. Boukelif and K. M. Faraoun, Genetic programming approach for multi-category pattern classification applied to network intrusions detection, Int. J. Comput. Intell. Appl. 6 (2006) 77–99
- K. Badran, P. Rockett, "Multi-class pattern classification using single multi-dimensional feature-space feature extraction evolved by multi-objective genetic programming and its application to network intrusion detection", Genetic Programming and Evolvable Machines, vol. 13, no. 1, pp. 33-63, 2012.
- Thi Anh Le, Thi Huong Chu, Quang Uy Nguyen, Xuan Hoai Nguyen, "Malware detection using genetic programming", Computational Intelligence for Security and Defense Applications (CISDA) 2014 Seventh IEEE Symposium on, pp. 1-6, 2014.
- Jorge Blasco, Agustin Orfila, Arturo Ribagorda “Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming” DOI 10.1109/ARES.2010.53 in IEEE 2010.
- Buitinck et al., “API design for machine learning software: experiences from the scikit-learn project”, 2013.
- KDD data set, 1999; http://kdd.ics.uci.edu/databases/- kddcup99/kddcup99.html
Keywords
Genetic Programming, Feature Extraction, Neural Network, Support Vector Machines, Decision Tress.