Abstract
As network security had really become a basic issue, there is been a lot of improvement in designs for past years. Among several designs, IDS is one of the greatest hits. It has all of the stores of being that the presence of inadequacy and the dubious considered the impedances make fuzzy developments sensible for such structures. Fuzzy plans are not regularly versatile and do not have the ability to make models solely subject to the goal structure's model data. So, this paper aims in using Adaptive Neuro-Fuzzy Inference System (ANFIS) as a classifier for classifying the networks as malicious categories (Probe, DoS, U2R, R2L) and normal on DARPA 1999 database and are evaluated with other models like Fuzzy GNP, HHO in which experimental results show that ANFIS show better performance because it joins the upsides of both ANN and fuzzy deduction frameworks including the capacity to catch the nonlinear design of interaction, variation ability, and fast learning limit.
Similar content being viewed by others
Data availability statement
Enquiries about data availability should be directed to the authors.
Abbreviations
- IDS:
-
Intrusion detection system
- ML:
-
Machine learning
- DL:
-
Deep learning
- HHO:
-
Harris hawks optimization
- F-GNP:
-
Fuzzy genetic network programming
- ANFIS:
-
Adaptive neuro fuzzy inference system
- ANN:
-
Artificial neural network
- MF:
-
Member function
- FAR:
-
False alarm rate
- FGCS:
-
Future generation computer system
- DoS:
-
Denial of service
- U2R:
-
User to remote
- R2L:
-
Remote to local
- DIDS:
-
Database intrusion detection system
- RBAC:
-
Rule based access control
- SVM:
-
Support vector machine
- KNN:
-
K-nearest neighbor
- HMM:
-
Hidden Markov model
- RF:
-
Random forest
- KMC:
-
K-mean clustering
References
Amudha P, Abdul Rauf H (2011) Performance analysis of data mining approaches in intrusion detection. IEEE
Azad C, Jha VK (2017) Fuzzy min–max neural network and particle swarm optimization based intrusion detection system. Microsyst Technol 23(4):907–918
Chitrakar R, Huang C (2012) Anomaly based intrusion detection using hybrid learning approach of combining kMedoids clustering and Naïve Bayes classification. IEEE
Chung CY, Gertz M, Levitt K (1999) DEMIDS: a misuse detection system for database systems. Proc Integ Internal Control Inform Syst 159–178.
Di Mauro M, Galatro G, Liotta A (2020) Experimental review of neural-based approaches for network intrusion management. IEEE Trans Netw Serv Manag
Govindarajan M, Chandrasekaran R (2009) Intrusion detection using k-nearest neighbor. ICAC, IEEE, pp 13–20
Huang X (2021) Network intrusion detection based on an improved long-short-term memory model in combination with multiple spatiotemporal structures. Wireless Commun Mobile Comput
Karatas G, Demir O, Sahingoz OK (2020) Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE Access 8:32150–32162
Kim J, Kim J, Kim H, Shim M, Choi E (2020) CNN-based network intrusion detection against denial-of-service attacks. Electronics 9(6):916
Li J, Qu Y, Chao F, Shum HP, Ho ES, Yang L (2019) Machine learning algorithms for network intrusion detection. AI in Cybersecurity. Springer, New York, NY, pp 151–179
Naseer S, Saleem Y, Khalid S, Bashir MK, Han J, Iqbal MM, Han K (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231–48246
Panigrahi S, Sural S, Majumdar AK (2013) Two-stage database intrusion detection by combining multiple evidence and belief update. Inform Syst Front 15(1):35–53
Parampottupadam S, Moldovann AN (2018) Cloud-based real-time network intrusion detection using deep learning. In: Proceedings of the 2018 international conference on cyber security and protection of digital services (cyber security), pp. 1–8. IEEE
Ramprakash P, Sakthivadivel M, Krishnaraj N, Ramprasath J (2014) Host-based intrusion detection system using sequence of system calls. Int J Eng Manag Res 4:2
Reddy KP, Kodati S, Swetha M, Parimala M, Velliangiri S (2021) A hybrid neural network architecture for early detection of DDOS attacks using deep learning models. In: Proceedings of the 2021 2nd international conference on smart electronics and communication (ICOSEC). IEEE, pp. 323–327
Sahani R, Rout C, Chandrakanta Badajena J, Jena AK, Das H (2018) Classification of intrusion detection using data mining techniques. Progress in computing, analytics and networking. Springer, Singapore, pp 753–764
Solanki M, Dhamdhere V (2015) Intrusion detection system using means of data mining by using c 4.5 algorithm. Int J Appl Innov Eng Manag 4(5)
Tan X, Su S, Zuo Z, Guo X, Sun X (2019) Intrusion detection of UAVs based on the deep belief network optimized by PSO. Sensors 19(24):5529
Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550
Wei P, Li Y, Zhang Z, Hu T, Li Z, Liu D (2019) An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7:87593–87605
Xu C, Shen J, Du X, Zhang F (2018) An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6:48697–48707
Yang Y, Zheng K, Wu B, Yang Y, Wang X (2020) Network intrusion detection based on supervised adversarial variational auto-encoder with regularization. IEEE Access 8:42169–42184
Yao H, Fu D, Zhang P, Li M, Liu Y (2018) MSML: a novel multilevel semi-supervised machine learning framework for intrusion detection system. IEEE Internet Things J 6(2):1949–1959
Yin C, Zhu Y, Fei J, He X (2017) A Deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961
Funding
The authors did not receive financial support from any organization for the submitted work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Consent for publication
Authors give consent to Soft Computing Journal to publish their article.
Additional information
Communicated by Meng Joo.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sajith, P.J., Nagarajan, G. Network intrusion detection system using ANFIS classifier. Soft Comput 27, 1629–1638 (2023). https://doi.org/10.1007/s00500-022-06854-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-022-06854-x