Abstract
The progress in the field of Computer Networks & Internet is increasing with tremendous volume in recent years. This raises important issues with regards to security. Several solutions emerged in the past which provide security at the host or network level. These traditional solutions like antivirus, firewall, spyware & authentication mechanism provide security to some extends but they still face the challenges of inherent system flaws & social engineering attacks. Some interesting solution emerged like Intrusion Detection & Prevention Systems but these too have some problems like detecting & responding in real time & discovering novel attacks. Several Machine Learning techniques like Neural Network, Support Vector Machine, Rough Set etc. Were proposed for making an efficient and Intelligent Network Intrusion Detection System. Also Particle Swarm Optimization is currently attracting considerable interest from the research community, being able to satisfy the growing demand of reliable & intelligent Intrusion Detection System (IDS). Recent development in the field of IDS shows that securing the network with a single technique proves to be insufficient to cater ever increasing threats, as it is very difficult to cope with all vulnerabilities of today’s network. So there is a need to combine all security technologies under a complete secure system that combines the strength of these technologies under a complete secure system that combines the strength of these technologies & thus eventually provide a solid multifaceted well against intrusion attempts. This paper gives an insight into how Particle Swarm Optimization and its variants can be combined with various Machine Learning techniques used for Anomaly Detection in Network Intrusion Detection System by researchers so as to enhance the performance of Intrusion Detection System.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Denning, D.: An intrusion detection model. IEEE Transactions of Software Engineering 13(2), 222–232 (1987)
Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Managing Cyber Threats: Issues, Approaches, and Challenges, p. 330. Springer (2005)
Garcia-Teodoroa, P., Diaz-Verdejoa, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection; technique, systems and challenges. Compuers and Security 28, 18–28 (2009)
Kennedy, J., Eberhart, R.C.: Particle Swarm Optimization. In: Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 1942–1948 (1995)
Zainal, A., Maarof, M.A., Shamsuddin, S.M.: Feature Selection Using Rough Set in Intrusion Detection. In: IEEE TENCON 2006, Hongkong, November 14-17 (2006)
Zainal, A., Maarof, M.A., Shamsuddin, S.M.: Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part I. LNCS, vol. 4705, pp. 512–524. Springer, Heidelberg (2007)
Tian, W., Liu, J.: Network Intrusion Detection Analysis with Neural Network and Particle Swarm Optimization Algorithm. In: 2010 Chinese IEEE Control and Decision Conference, CCDC, pp. 1749–1752 (2010)
Liu, H., Jian, Y., Liu, S.: A New Intelligent Intrusion Detection Method Based on Attribute Reduction and Parameters Optimization of SVM. In: Proceedings of the Second International Workshop on Education Technology and Computer Science (ETCS), pp. 202–205 (2010)
Wang, H.-B., Fu, D.-S.: An Intrusion Detection System Model Based on Particle Swarm Reduction. In: Proceedings of 4th the IEEE International Conference on Genetic and Evolutionary Computing, pp. 383–385 (2010)
Liu, L.-L., Liu, Y.: MQPSO based on wavelet neural network for network anomaly detection. In: Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2009), pp. 1–5 (2009)
Liu, Y., Ruhui, M.A.: Wavelet Neural Networks Optimized by QPSO for Network Anomaly Detection. Journal of Computational Information Systems 7(7), 2452–2460 (2011)
Liu, Y.: Wavelet fuzzy neural network based on modified QPSO for network anomaly detection. Applied Mechanics and Materials 20-23, 1378–1384 (2010)
Chen, Z., Qian, P., Chen, Z.: Application of PSO-RBF neural network in network intrusion detection. In: Proceedings of the 3rd International Symposium on Intelligent Information Technology Application, pp. 362–364 (2009)
Liu, Y.: QPSO-optimized RBF Neural Network for Network Anomaly Detection. Journal of Information & Computational Science 8(9), 1479–1485 (2011)
Xu, R., Rui, A., Xiao, F.: Research Intrusion Detection Based PSO-RBF Classifier. In: Proceeding of IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), pp. 104–107 (2011)
Tu, C.-J., Li-Yeh, C., Jun, Y., Cheng, H.: Feature Selection using PSO-SVM. IAENG International Journal of Computer Science 33(1), IJCS_33_1_18 (2007)
Ma, J., Liu, X., Liu, S.: A New Intrusion Detection Method Based on BPSO-SVM. In: Proceedings of the International Symposium on Computational Intelligence and Design, pp. 473–477 (2008a)
Zhang, H., Gao, H.-H., Wang, X.Y.: Quantum Particle swarm optimization based network Intrusion feature selection and Detection. In: Proceedings of the 17th World Congress The International Federation of Automatic Control, Seoul, Korea (2008)
Zhou, T., Li, Y., Li, J.: Research on intrusion detection of SVM based on PSO. In: Proceedings of the International Conference on Machine Learning and Cybernetics, pp. 1205–1209 (2009)
Wang, J., Hong, X., Ren, R.-R., Li, T.-H.: A Real-time Intrusion Detection System based on PSO-SVM. In: Proceedings of the International Workshop on Information Security and Application (IWISA 2009), pp. 319–321 (2009)
Chen, Y., Abraham, A., Yang, J.: Feature Selection and Classification Using Hybrid Flexible Neural Tree. Journal of Neuro Computing 7, 305–313 (2006)
Chen, Y., Zhang, L.: Evolutionary Flexible Neural Networks for Intrusion Detection System. In: Proceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China, pp. 428–433 (2006)
Michailidis, E.: Proceedings of the 2008 Panhellenic Conference on Informatics, PCI 2008, pp. 8–12. IEEE Computer Society, Washington, DC (2008)
Gong, S.F., Gong, X., Bi, X.: Feature Selection Method for Network Intrusion Based on GQPSO Attribute Reduction. In: 2011 International Conference on Multimedia Technology (ICMT), pp. 6365–6368 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Satpute, K., Agrawal, S., Agrawal, J., Sharma, S. (2013). A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques. In: Satapathy, S., Udgata, S., Biswal, B. (eds) Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA). Advances in Intelligent Systems and Computing, vol 199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35314-7_50
Download citation
DOI: https://doi.org/10.1007/978-3-642-35314-7_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35313-0
Online ISBN: 978-3-642-35314-7
eBook Packages: EngineeringEngineering (R0)