Skip to main content

An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection

  • Conference paper
  • First Online:
International Joint Conference (CISIS 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 369))

Abstract

Today, the never-ending stream of security threats requires new security solutions capable to deal with large data volumes and high speed network connections in real-time. Intrusion Detection Systems are an omnipresent component of most security systems and may offer a viable answer. In this paper we propose a network anomaly IDS which merges the Support Vector Machines classifier with an improved version of the Bat Algorithm (BA). We use the Binary version of the Swarm Intelligence algorithm to construct a wrapper feature selection method and the standard version to elect the input parameters for SVM. Tests with the NSL-KDD dataset empirically prove our proposed model outperforms simple SVM or similar approaches based on PSO and BA, in terms of attack detection rate and false alarm rate generated after fewer number of iterations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. 31(9), 805–822 (1999)

    Article  Google Scholar 

  2. Dua, S., Du, X.: Classical machine-learning paradigmsfor data mining. In: Data Mining and Machine Learning in Cybersecurity, pp. 23–56. Auerbach Publications Taylor and Francis Group (2011)

    Google Scholar 

  3. Enache, A.-C., Patriciu, V.V.: Intrusions detection based on support vector machine optimized with swarm intelligence. In: 9th IEEE International Symposium on Applied Computational Intelligence and Informatics, pp. 153–158 (2014)

    Google Scholar 

  4. Enache, A.-C., Sgarciu, V.: Enhanced intrusion detection system based on bat algorithm-support vector machine. In: 11th International Conference on Security and Cryptography, pp. 184–189. Vienna, Austria (2014)

    Google Scholar 

  5. Gao, H.-H., Yang, H.-H, Wang, X.-Y.: Ant colony optimization based network intrusion feature selection and detection. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, pp. 3871–3875 (2005)

    Google Scholar 

  6. Kukielka, P., Kotulski, Z.: New unknown attack detection with the neural network-based ids. In: The State of the Art in Intrusion Prevention and Detection, pp. 259–284. Auerbach Publications (2014)

    Google Scholar 

  7. Laamari, M.A., Kamel, N.: A hybrid bat based feature selection approach for intrusion detection. In: Pan, L., Păun, G., Pérez-Jiménez, M.J., Song, T. (eds.) BIC-TA 2014. CCIS, vol. 472, pp. 230–238. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  8. Ma, J., Liu, X., Liu, S.: A new intrusion detection method based on bpso-svm. Int. Symp. Comput. Intell. Des. 1, 473–477 (2008)

    Google Scholar 

  9. Mark, H., Eibe, F., Geoffrey, H., Bernhard, P., Peter, R., Ian, W.: The weka data mining software: an update. SIGKDD Explor. Newsl. 11, 10–18 (2009)

    Article  Google Scholar 

  10. Nakamura, R., Pereira, L., Costa, K., Rodrigues, D., Papa, J., Yang, X.S.: Bba: a binary bat algorithm for feature selection. In: Proceedings of the 25th Conference on Graphics, Patterns and Images, pp. 291–297 (2012)

    Google Scholar 

  11. Nguyen, H., Franke, K., Petrovic, S.: Improving effectiveness of intrusion detection by correlation feature selection. In: ARES ’10 International Conference on Availability, Reliability, and Security, 2010, pp. 17–24 (2010)

    Google Scholar 

  12. Sammut, C., Webb, G. I.: Feature selection. In: Encyclopedia of Machine Learning, pp. 429–433. Springer, New York (2010)

    Google Scholar 

  13. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications, pp. 1–6 (2009)

    Google Scholar 

  14. Wang, J., Hong, X., Ren, R., Li, T.: A real-time intrusion detection system based on pso-svm. In: Proceedings of the International Workshop on Information Security and Application, pp. 319–321. ACADEMY PUBLISHER (2009)

    Google Scholar 

  15. Wang, J., Li, T., Ren, R.: A real time IDSs based on artificial bee colony-support vector machine algorithm. In: Proceedings in the International Workshop on Advanced Computational Intelligence, pp. 91–96. IEEE (2010)

    Google Scholar 

  16. Yang, X.-S.: Firefly algorithms for multimodal optimization. In: Watanabe, O., Zeugmann, T. (eds.) SAGA 2009. LNCS, vol. 5792, pp. 169–178. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Yang, X.-S.: A new metaheuristic bat-inspired algorithm. In: González, J.R., Pelta, D.A., Cruz, C., Terrazas, G., Krasnogor, N. (eds.) NICSO 2010. SCI, vol. 284, pp. 65–74. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  18. Yang, X.-S., He, X.: Bat algorithm: literature review and applications. Int. J. Bio-Inspired Comput. 5, 141–149 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

The work has been funded by the Sectoral Operational Programme Human Resources Development 2007-2013 of the Ministry of European Funds through the Financial Agreement POSDRU/159/1.5/S/132395.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adriana-Cristina Enache .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Enache, AC., Sgârciu, V. (2015). An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics