Skip to main content
Log in

Network intrusion detection system using ANFIS classifier

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

As network security had really become a basic issue, there is been a lot of improvement in designs for past years. Among several designs, IDS is one of the greatest hits. It has all of the stores of being that the presence of inadequacy and the dubious considered the impedances make fuzzy developments sensible for such structures. Fuzzy plans are not regularly versatile and do not have the ability to make models solely subject to the goal structure's model data. So, this paper aims in using Adaptive Neuro-Fuzzy Inference System (ANFIS) as a classifier for classifying the networks as malicious categories (Probe, DoS, U2R, R2L) and normal on DARPA 1999 database and are evaluated with other models like Fuzzy GNP, HHO in which experimental results show that ANFIS show better performance because it joins the upsides of both ANN and fuzzy deduction frameworks including the capacity to catch the nonlinear design of interaction, variation ability, and fast learning limit.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability statement

Enquiries about data availability should be directed to the authors.

Abbreviations

IDS:

Intrusion detection system

ML:

Machine learning

DL:

Deep learning

HHO:

Harris hawks optimization

F-GNP:

Fuzzy genetic network programming

ANFIS:

Adaptive neuro fuzzy inference system

ANN:

Artificial neural network

MF:

Member function

FAR:

False alarm rate

FGCS:

Future generation computer system

DoS:

Denial of service

U2R:

User to remote

R2L:

Remote to local

DIDS:

Database intrusion detection system

RBAC:

Rule based access control

SVM:

Support vector machine

KNN:

K-nearest neighbor

HMM:

Hidden Markov model

RF:

Random forest

KMC:

K-mean clustering

References

  • Amudha P, Abdul Rauf H (2011) Performance analysis of data mining approaches in intrusion detection. IEEE

  • Azad C, Jha VK (2017) Fuzzy min–max neural network and particle swarm optimization based intrusion detection system. Microsyst Technol 23(4):907–918

    Article  Google Scholar 

  • Chitrakar R, Huang C (2012) Anomaly based intrusion detection using hybrid learning approach of combining kMedoids clustering and Naïve Bayes classification. IEEE

  • Chung CY, Gertz M, Levitt K (1999) DEMIDS: a misuse detection system for database systems. Proc Integ Internal Control Inform Syst 159–178.

  • Di Mauro M, Galatro G, Liotta A (2020) Experimental review of neural-based approaches for network intrusion management. IEEE Trans Netw Serv Manag

  • Govindarajan M, Chandrasekaran R (2009) Intrusion detection using k-nearest neighbor. ICAC, IEEE, pp 13–20

  • Huang X (2021) Network intrusion detection based on an improved long-short-term memory model in combination with multiple spatiotemporal structures. Wireless Commun Mobile Comput

  • Karatas G, Demir O, Sahingoz OK (2020) Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE Access 8:32150–32162

    Article  Google Scholar 

  • Kim J, Kim J, Kim H, Shim M, Choi E (2020) CNN-based network intrusion detection against denial-of-service attacks. Electronics 9(6):916

    Article  Google Scholar 

  • Li J, Qu Y, Chao F, Shum HP, Ho ES, Yang L (2019) Machine learning algorithms for network intrusion detection. AI in Cybersecurity. Springer, New York, NY, pp 151–179

    Google Scholar 

  • Naseer S, Saleem Y, Khalid S, Bashir MK, Han J, Iqbal MM, Han K (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231–48246

    Article  Google Scholar 

  • Panigrahi S, Sural S, Majumdar AK (2013) Two-stage database intrusion detection by combining multiple evidence and belief update. Inform Syst Front 15(1):35–53

    Article  Google Scholar 

  • Parampottupadam S, Moldovann AN (2018) Cloud-based real-time network intrusion detection using deep learning. In: Proceedings of the 2018 international conference on cyber security and protection of digital services (cyber security), pp. 1–8. IEEE

  • Ramprakash P, Sakthivadivel M, Krishnaraj N, Ramprasath J (2014) Host-based intrusion detection system using sequence of system calls. Int J Eng Manag Res 4:2

    Google Scholar 

  • Reddy KP, Kodati S, Swetha M, Parimala M, Velliangiri S (2021) A hybrid neural network architecture for early detection of DDOS attacks using deep learning models. In: Proceedings of the 2021 2nd international conference on smart electronics and communication (ICOSEC). IEEE, pp. 323–327

  • Sahani R, Rout C, Chandrakanta Badajena J, Jena AK, Das H (2018) Classification of intrusion detection using data mining techniques. Progress in computing, analytics and networking. Springer, Singapore, pp 753–764

    Chapter  Google Scholar 

  • Solanki M, Dhamdhere V (2015) Intrusion detection system using means of data mining by using c 4.5 algorithm. Int J Appl Innov Eng Manag 4(5)

  • Tan X, Su S, Zuo Z, Guo X, Sun X (2019) Intrusion detection of UAVs based on the deep belief network optimized by PSO. Sensors 19(24):5529

    Article  Google Scholar 

  • Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550

    Article  Google Scholar 

  • Wei P, Li Y, Zhang Z, Hu T, Li Z, Liu D (2019) An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7:87593–87605

    Article  Google Scholar 

  • Xu C, Shen J, Du X, Zhang F (2018) An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6:48697–48707

    Article  Google Scholar 

  • Yang Y, Zheng K, Wu B, Yang Y, Wang X (2020) Network intrusion detection based on supervised adversarial variational auto-encoder with regularization. IEEE Access 8:42169–42184

    Article  Google Scholar 

  • Yao H, Fu D, Zhang P, Li M, Liu Y (2018) MSML: a novel multilevel semi-supervised machine learning framework for intrusion detection system. IEEE Internet Things J 6(2):1949–1959

    Article  Google Scholar 

  • Yin C, Zhu Y, Fei J, He X (2017) A Deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961

    Article  Google Scholar 

Download references

Funding

The authors did not receive financial support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Nagarajan.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Consent for publication

Authors give consent to Soft Computing Journal to publish their article.

Additional information

Communicated by Meng Joo.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sajith, P.J., Nagarajan, G. Network intrusion detection system using ANFIS classifier. Soft Comput 27, 1629–1638 (2023). https://doi.org/10.1007/s00500-022-06854-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-06854-x

Keywords

Navigation