Skip to main content

Advertisement

Log in

Optimized intrusion detection mechanism using soft computing techniques

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Sun, Z., Bebis, G., & Miller, R. (2004). Object detection using feature subset selection. Pattern Recognition, 37(11), 2165–2176.

    Article  Google Scholar 

  2. Liu, G., Yi, Z., & Yang, S. (2007). A hierarchical intrusion detection model based on the PCA neural networks. Neurocomputing, 70(7–9), 1561–1568. Advances in computational intelligence and learning in 14th European symposium on artificial neural networks, March 2007.

    Article  Google Scholar 

  3. Horng, S.-J., Su, M.-Y., Chen, Y.-H., Kao, T.-W., Chen, R.-J., Lai, J.-L., & Perkasa, C. D. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Systems With Applications, 38(1), 306–313.

    Article  Google Scholar 

  4. Tong, X., Wang, Z., & Yu, H. (2009). A research using hybrid RBF/Elman neural networks for intrusion detection system secure model. Computer Physics Communications, 180(10), 1795–1801.

    Article  Google Scholar 

  5. Zargar, G. R., & Kabiri, P. (2010). Selection of effective network parameters in attacks for intrusion detection, advances in data mining. In Lecture notes in computer science: Vol. 6171. Applications and theoretical aspects (pp. 643–652). doi:10.1007/978-3-642-14400-4_50.

    Chapter  Google Scholar 

  6. Kim, D. S., Nguyen, H.-N., Ohn, S.-Y., & Park, J. S. (2005). Fusions of GA and SVM for anomaly detection in intrusion detection system. In Lecture notes in computer science: Vol. 3498. Advances in neural networks (pp. 415–420).

    Google Scholar 

  7. Ahmad, I., Abdullah, A. B., & Alghamdi, A. S. (2009). Application of artificial neural network in detection of DOS attacks. In Proceedings of the 2nd international conference on security of information and networks (SIN ’09), Famagusta, North Cyprus, October 6–10 (pp. 229–234). New York: ACM.

    Google Scholar 

  8. Ahmad, I., Abdullah, A. B., & Alghamdi, A. S. (2009). Application of artificial neural network in detection of probing attacks. In IEEE symposium on industrial electronics and applications (ISIEA 2009), October 4–6, 2009, Kuala Lumpur, Malaysia.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iftikhar Ahmad.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ahmad, I., Abdullah, A., Alghamdi, A. et al. Optimized intrusion detection mechanism using soft computing techniques. Telecommun Syst 52, 2187–2195 (2013). https://doi.org/10.1007/s11235-011-9541-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9541-1

Keywords

Navigation