Advertisement

A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System

  • Josy Elsa VargheseEmail author
  • Balachandra MuniyalEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)

Abstract

In this internet era, the data are flooded with malicious activities. The role of soft computing techniques to classify highly vulnerable, complex and uncertain network data by devising an intrusion detection system is so significant. The proposed work emphasizes on the classification of normal and anomaly packets in the networks by carrying out the comparative performance evaluation of different soft computing tools including Genetic Programming (GP), Fuzzy logic, Artificial neural network (ANN) and Probabilistic model with Clustering methods using NSL-KDD dataset. Here, Fuzzy logic runs the first place in the performance metrics and the clustering algorithms and Genetic programming deliver the worst performances. Fuzzy Unordered Rule Induction Algorithm (FURIA) in Fuzzy logic gives a high detection rate of accuracy (99.69%) with the low rate of false alarms (0.31%). The computational time of FURIA (78.14 s) is not so expectant. So Fuzzy Rough Nearest Neighbor(FRNN) is recommended as an optimistic model with a sensible accuracy rate of 99.51% and tolerable false alarm rate of 0.49% along with a pretty good computational time of 0.33 s.

Keywords

Soft Computing Techniques (SCT) Artificial Neural Network (ANN) Fuzzy Unordered Rule Induction Algorithm (FURIA) Fuzzy Rough Nearest Neighbour (FRNN) NSL-KDD dataset 

References

  1. 1.
    Sarkar, M.: Fuzzy-rough nearest neighbor algorithms in classification. Fuzzy Sets Syst. 158(19), 2134–2152 (2007)MathSciNetCrossRefGoogle Scholar
  2. 2.
    The NSL KDD dataset (2016). http://nsl.cs.unb.ca/NSL-KDD/. Last Accessed 21 July 2017
  3. 3.
    Weka- data mining machine learning software (2016). http://www.cs.waikato.ac.nz/ml/weka/. Last Accessed 24 Mar 2017
  4. 4.
    Beqiri, E.: Neural networks for intrusion detection systems. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds.) ICGS3 2009. CCIS, vol. 45, pp. 156–165. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-04062-7_17CrossRefGoogle Scholar
  5. 5.
    Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16, 303–336 (2014)CrossRefGoogle Scholar
  6. 6.
    Bonissone, P.P.: Soft computing: the convergence of emerging reasoning technologies. Soft Comput. 1(1), 6–18 (1997)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Cho, S.B.: Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Trans. Syst. Man Cybern. Part C 32, 154–160 (2002)CrossRefGoogle Scholar
  8. 8.
    Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities. Futur. Gener. Comput. Syst. 78, 544–546 (2018).  https://doi.org/10.1016/j.future.2017.07.060. http://www.sciencedirect.com/science/article/pii/S0167739X17316667CrossRefGoogle Scholar
  9. 9.
    Dias, L.P., Cerqueira, J.J.F., Assis, K.D.R., Almeida, R.C.: Using artificial neural network in intrusion detection systems to computer networks. In: 2017 9th Computer Science and Electronic Engineering (CEEC), pp. 145–150 (2017)Google Scholar
  10. 10.
    Gasparovica-Asite, M., Aleksejeva, L.: Using fuzzy unordered rule induction algorithm for cancer data classification. In: Mendel 2011: 17th International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Fuzzy Logic, Rough Sets, Neural Networks, Fractals, Bayesian Methods, pp. 15–17, June 2011Google Scholar
  11. 11.
    Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6 (2016)Google Scholar
  12. 12.
    Hühn, J., Hüllermeier, E.: FURIA: an algorithm for unordered fuzzy rule induction. Data Min. Knowl. Discov. 19(3), 293–319 (2009)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Ibrahim, D.: An overview of soft computing. Procedia Comput. Sci. 102, 34–38 (2016)CrossRefGoogle Scholar
  14. 14.
    Ishitaki, T.: Application of neural networks for intrusion detection in Tor networks. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, Gwangju, South Korea (2015)Google Scholar
  15. 15.
    Mabu, S., Chen, C., Lu, N., Shimada, K., Hirasawa, K.: An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 41(1), 130–139 (2011)CrossRefGoogle Scholar
  16. 16.
    Mishra, N., Mishra, S.: Intrusion detection using IoT (2018)Google Scholar
  17. 17.
    Owais, S.S.J., Snásel, V., Krömer, P., Abraham, A.: Survey: using genetic algorithm approach in intrusion detection systems techniques. In: 2008 7th Computer Information Systems and Industrial Management Applications, pp. 300–307 (2008)Google Scholar
  18. 18.
    Panigrah, A., Patra, M.: Fuzzy rough classification models for network intrusion detection. Trans. Mach. Learn. Artif. Intell. 4(2), 7 (2016)Google Scholar
  19. 19.
    Rao, K.K., SVP Raju, G.: An overview on soft computing techniques. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol. 169, pp. 9–23. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-22577-2_2CrossRefGoogle Scholar
  20. 20.
    Rao, M.V., Damodaram, A., Charyulu, N.C.B.: Algorithm for clustering with intrusion detection using modified and hashed k - means algorithms. In: Wyld, D.C., Zizka, J., Nagamalai, D. (eds.) Advances in Computer Science, Engineering & Applications, vol. 167, pp. 737–744. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-30111-7_70CrossRefGoogle Scholar
  21. 21.
    Subba, B., Biswas, S., Karmakar, S.: A neural network based system for intrusion detection and attack classification. In: 2016 Twenty Second National Conference on Communication (NCC), pp. 1–6 (2016)Google Scholar
  22. 22.
    Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009)Google Scholar
  23. 23.
    Varghese, J.E., Muniyal, B.: An investigation of classification algorithms for intrusion detection system - a quantitative approach. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2045–2051 (2017)Google Scholar
  24. 24.
    Weng, F., Jiang, Q., Shi, L., Wu, N.: An intrusion detection system based on the clustering ensemble. In: 2007 International Workshop on Anti-counterfeiting, Security and Identification (ASID), pp. 121–124 (2007)Google Scholar
  25. 25.
    Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning. CoRR abs/1801.06275 (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Information and Communication TechnologyManipal Institute of Technology, Manipal Academy of Higher EducationManipalIndia

Personalised recommendations