Skip to main content
Log in

Improved Relevance Vector Machine (IRVM) classifier for Intrusion Detection System

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Intrusion detection is the most significant research area in online applications to avoid intrusion activities. The foremost goal of the present research is to use the Relevance Vector Machine which can recognize extract intrusion activities involved in the Intrusion Detection System. Classification and feature selection are implemented by Improved Relevance Vector Machine and Gaussian Firefly Algorithm, respectively. The proposed work contains three phases such as preprocessing, feature selection and classification, and it would increase the classification accuracy. Preprocessing uses the technique Kalman filtering which focuses on missing values in the given Knowledge discovery in databases. Gaussian Firefly Algorithm selects the most relevant and optimal features, thereby increasing overall execution speed. Then Improved Relevance Vector Machine identifies intrusion attacks efficiently by extracting more relevant vectors and thus classifying maximum likelihood values. The experimental result concludes that Improved Relevance Vector Machine algorithm provides greater performance in terms of precision, recall, specificity and accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • An J-Y et al (2016) Using the relevance vector machine model combined with local phase quantization to predict protein–protein interactions from protein sequences. BioMed Res Int 2016

  • Arai K (2013) Recovering method of missing data based on proposed modified Kalman filter when time series of mean data is known. Int J Adv Res Artif Intell 7(2):18–23

    Google Scholar 

  • Bishop CM, Tipping ME (2000) Variational relevance vector machines. In: Proceedings of the sixteenth conference on uncertainty in artificial intelligence, Morgan Kaufmann Publishers

  • Ektefa M, Memar S, Sidi F, Affendey LS (2010) Intrusion detection using data mining techniques. IEEE, Shah Alam, Selangor, Malaysia, pp 200–203

  • Farahani SM, Abshouri AA, Nasiri B, Meybodi MR (2011) A Gaussian firefly algorithm. Int J Mach Learn Comput 1:448–453

    Article  Google Scholar 

  • Gao J et al (2009) Adaptive distributed intrusion detection using parametric model. In: IEEE/WIC/ACM international joint conferences on web intelligence and intelligent agent technologies, 2009. WI-IAT’09, vol 1. IET

  • Han J, Kamber M (2011) Data mining: concepts and techniques, 3rd edn. Morgan Kufmann, San Mateo (2nd edition 2006)

    MATH  Google Scholar 

  • Hu W, Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. IEEE Trans Syst Man Cybern B Cybern 38(2):577–583

    Article  Google Scholar 

  • Hu W, Gao J, Wang Y, Wu O, Maybank S (2014) Online adaboost-based parameterized methods for dynamic distributed network intrusion detection. IEEE Transactions on Cybernetics 44(1):66–82

    Article  Google Scholar 

  • Li D, Cai Z, Deng L, Yao X, Wang HH (2018a) Information security model of block chain based on intrusion sensing in the IoT environment. Clust Comput 1–18. https://doi.org/10.1007/s10586-018-2516-1

  • Li D, Deng L, Gupta BB, Wang H, Choi C (2018b) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci. https://doi.org/10.1016/j.ins.2018.02.060

  • Mabu S, Chen C, Lu N, Shimada K, Hirasawa K (2011) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans Syst Man Cybern C Appl Rev 41(1):130–139

    Article  Google Scholar 

  • McHugh J (2001) Intrusion and intrusion detection. Int J Inf Secur 1(1):14–35

    Article  MATH  Google Scholar 

  • Medhane DV, Sangaiah AK (2017) Search space-based multi-objective optimization evolutionary algorithm. Comput Electr Eng 58:126–143

    Article  Google Scholar 

  • Nasiri B, Meybodi MR (2016) History-driven firefly algorithm for optimisation in dynamic and uncertain environments. Int J Bio-Inspired Comput 8(5):326–339

    Article  Google Scholar 

  • Nayak J, Naik B, Behera HS (2015) A novel nature inspired firefly algorithm with higher order neural network: performance analysis. Int J Eng Sci Technol 19:197–211

    Article  Google Scholar 

  • Panda M, Patra MR (2008) A comparative study of data mining algorithms for network intrusion detection. In: First international conference on emerging trends in engineering and technology, pp 504–507

  • Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling of intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30:114–132

    Article  Google Scholar 

  • Sangaiah AK, Thangavelu AK, Gao XZ, Anbazhagan N, Durai MS (2015) An ANFIS approach for evaluation of team-level service climate in GSD projects using Taguchi-genetic learning algorithm. Appl Soft Comput 30:628–635

    Article  Google Scholar 

  • Sangaiah AK, Samuel OW, Li X, Abdel-Basset M, Wang H (2018a) Towards an efficient risk assessment in software projects—fuzzy reinforcement paradigm. Comput Electr Eng 71:833–846

    Article  Google Scholar 

  • Sangaiah AK, Fakhry AE, Abdel-Basset M, El-henawy I (2018b) Arabic text clustering using improved clustering algorithms with dimensionality reduction. Clust Comput 1–15. https://doi.org/10.1007/s10586-018-2084-4

  • Stolfo SJ, Lee W, Chan PK, Fan W, Eskin E (2001) Data mining-based intrusion detectors: an overview of the columbia IDS project. ACM SIGMOD Rec 30(4):5–14

    Article  Google Scholar 

  • The UCI KDD Archive (1999) Information and Computer Science, University of California, Irvine. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 2 Feb 2014

  • Upadhyaya D, Jain S (2013) Hybrid approach for network intrusion detection system using k-medoid clustering and Naïve Bayes classification. Int J Comput Sci Issues (IJCSI) 10(3):231–236

    Google Scholar 

  • Xiang MY, Chong, Zhu HL (2004) Design of multiple-level tree classifiers for intrusion detection system. In: IEEE conference on cybernetics and intelligent system

  • Yang X-S (2009) Firefly algorithms for multimodal optimization. Stochastic algorithms: foundations and applications. Springer, Berlin, pp 169–178

    Book  MATH  Google Scholar 

  • Yu H, Yang J, Han J (2003) Classifying large data sets using SVM with hierarchical clusters. In: Proceedings of the SIGKDD 2003, Washington, DC, pp 306–315

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. M. Roopa Devi.

Ethics declarations

Conflict of interest

The author declares that they have no conflict of interest.

Additional information

Communicated by A.K. Sangaiah, H. Pham, M.-Y. Chen, H. Lu, F. Mercaldo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Roopa Devi, E.M., Suganthe, R.C. Improved Relevance Vector Machine (IRVM) classifier for Intrusion Detection System. Soft Comput 23, 9111–9119 (2019). https://doi.org/10.1007/s00500-018-3621-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3621-z

Keywords

Navigation