CFP last date
20 June 2024
Reseach Article

Intrusion Detection in KDD99 Dataset using SVM-PSO and Feature Reduction with Information Gain

by Harshit Saxena, Vineet Richariya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 6
Year of Publication: 2014
Authors: Harshit Saxena, Vineet Richariya
10.5120/17188-7369

Harshit Saxena, Vineet Richariya . Intrusion Detection in KDD99 Dataset using SVM-PSO and Feature Reduction with Information Gain. International Journal of Computer Applications. 98, 6 ( July 2014), 25-29. DOI=10.5120/17188-7369

@article{ 10.5120/17188-7369,
author = { Harshit Saxena, Vineet Richariya },
title = { Intrusion Detection in KDD99 Dataset using SVM-PSO and Feature Reduction with Information Gain },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 6 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number6/17188-7369/ },
doi = { 10.5120/17188-7369 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:25:31.114320+05:30
%A Harshit Saxena
%A Vineet Richariya
%T Intrusion Detection in KDD99 Dataset using SVM-PSO and Feature Reduction with Information Gain
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 6
%P 25-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion detection is a process of identifying the Attacks in the networks. The main aim of IDS is to identify the Normal and Intrusive activities. In recent years, many researchers are using data mining techniques for building IDS. Due to the non-linearity and quantitative or qualitative network data traffic IDS is complicated. For making the IDS efficient we have to choose the key features. Support Vector Machine (SVM) gives the potential solution for IDS problem. SVM suffers by selecting the suitable SVM parameters. Here we propose a new approach using data mining technique such as SVM and Particle swarm optimization for attaining higher detection rate. PSO is an Optimization method and has a strong global search capability. The SVM-PSO Method is applied to KDD Cup 99 dataset. Free parameters are obtained by standard PSO for support vector machine and the binary PSO is used to obtain the best possible feature subset at building intrusion detection system. The propose technique has major steps: Preprocessing, Feature Reduction using Information Gain, Training using SVM-PSO. Then based on the subsequent training subsets a vector for SVM classification is formed and in the end, classification using PSO is performed to detect Intrusion has happened or not. The experimental result shows that SVM-PSO acquire high detection rate than regular SVM Method algorithm.

References
  1. FengGuorui, ZouXinguo , Wu Jian, "Intrusion Detection Based on the Semi Supervised Fuzzy C-Means clustering Algorithm", Department of information Science and Technology, ShandongUniversity,china , pp. 2667-2670,2012.
  2. Mr. Suresh kashyap ,Ms. Pooja Agrawal, Mr. Vikas Chandra Pandey, Mr. Suraj Prasad Keshri," Soft Computing Based Classification Technique Using KDD 99 Data Set for Intrusion Detection System" in International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering,Vol. 2,Issue4,April2013.
  3. R. Durst, T. champion, B. witten, E. Miller, and L. Spagnuolo, "Testing and valuating computer intrusion detection system" communications of ACM, Vo1. 42, no. 7, pp 53-61, 1999.
  4. Erbacher R F, Walker K L, Frincke D A. Intrusion and Misuse Detection in Large-scale Systems. IEEE Computer Graphics andApplications, 2002, 2(1), pp. 38-47.
  5. A. Sung & S. Mukkamala, "Identifying important features for intrusion detection using SVM and neural networks," in symposium on application and the Internet, pp 209-216, 2003.
  6. A. M Chandrasekhar, K. Raghuveer,"Intrusion detection technique by using K-means, Fuzzy Neural Network and SVM classifiers", proceedings of ICCCI, pp1-7, 2013.
  7. Jirapummin, C. , Wattanapongsakorn, N. , & Kanthamanon, P. "Hybrid neural networks for intrusion detection system". Proceedings of ITCCSCC, pp 928-931, 2002.
  8. Horeis, T "Intrusion detection with neural network – Combination of self-organization maps and radial basis function networks for human expert integration", a Research report 2003.
  9. Han, S J & Cho, S. B. "Evolutionary neural networks for anomaly detection based on the behavior of a program", IEEE Transaction on System, Man and Cybernetics, pp 559-570, 2005.
  10. Chen, Y. H. , Abraham, A. , & Yang, B, "Hybrid flexible neural tree- based intrusion detection systems", International Journal of Intelligent Systems, pp. 337-352,2007.
  11. S. Axelsson, "The base rate fallacy and its implications for the difficulty of Intrusion detection", Proc. Of 6th. ACM conference on computer and communication security 1999.
  12. R. Puttini, Z. marrakchi, and L. Me, "Bayesian classification model for Real time intrusion detection", Proc. of 22nd. International workshop on Bayesian inference and maximum entropy methods in science and engineering, 2002.
  13. A. M Chandrasekhar, K. Raghuveer,"Performance evaluation of data clustering techniques using KDD cup 99 intrusion data set", International journal of information and network security, Vol1(4),pp. 294-305,2012.
  14. Sanjay Kumar Sharma, Pankaj Pandey , Sahel Kumar Tiwari and Mahendra Singh Sisodiya," An Improved Intrusion Detection Based on K-means Clustering via Naïve Bayes Classification", proceedings of ICAESM, pp. 417-422,2012.
  15. Matthew Settles," An Introduction to Particles Swarm Optimization", department of Computer Science, Idaho University.
  16. Jun Wang, XuHong, Rong-rong,Tai-hang Li,"A Real time Intrusion detection system based on PSO-SVM ", proceedings in IWISA Qingdao,China,November 21-22,2009.
  17. MacQueen, Some methods for classification and analysis of Multivariate observations in Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability. University of California Press, 1967, pp. 281-297.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection system Information Gain Support Vector Machine (SVM) Particle Swarm Optimization (PSO)