Abstract
Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates.
Similar content being viewed by others
References
Sun, Z., Bebis, G., & Miller, R. (2004). Object detection using feature subset selection. Pattern Recognition, 37(11), 2165–2176.
Liu, G., Yi, Z., & Yang, S. (2007). A hierarchical intrusion detection model based on the PCA neural networks. Neurocomputing, 70(7–9), 1561–1568. Advances in computational intelligence and learning in 14th European symposium on artificial neural networks, March 2007.
Horng, S.-J., Su, M.-Y., Chen, Y.-H., Kao, T.-W., Chen, R.-J., Lai, J.-L., & Perkasa, C. D. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Systems With Applications, 38(1), 306–313.
Tong, X., Wang, Z., & Yu, H. (2009). A research using hybrid RBF/Elman neural networks for intrusion detection system secure model. Computer Physics Communications, 180(10), 1795–1801.
Zargar, G. R., & Kabiri, P. (2010). Selection of effective network parameters in attacks for intrusion detection, advances in data mining. In Lecture notes in computer science: Vol. 6171. Applications and theoretical aspects (pp. 643–652). doi:10.1007/978-3-642-14400-4_50.
Kim, D. S., Nguyen, H.-N., Ohn, S.-Y., & Park, J. S. (2005). Fusions of GA and SVM for anomaly detection in intrusion detection system. In Lecture notes in computer science: Vol. 3498. Advances in neural networks (pp. 415–420).
Ahmad, I., Abdullah, A. B., & Alghamdi, A. S. (2009). Application of artificial neural network in detection of DOS attacks. In Proceedings of the 2nd international conference on security of information and networks (SIN ’09), Famagusta, North Cyprus, October 6–10 (pp. 229–234). New York: ACM.
Ahmad, I., Abdullah, A. B., & Alghamdi, A. S. (2009). Application of artificial neural network in detection of probing attacks. In IEEE symposium on industrial electronics and applications (ISIEA 2009), October 4–6, 2009, Kuala Lumpur, Malaysia.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ahmad, I., Abdullah, A., Alghamdi, A. et al. Optimized intrusion detection mechanism using soft computing techniques. Telecommun Syst 52, 2187–2195 (2013). https://doi.org/10.1007/s11235-011-9541-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9541-1