Abstract
Today, the never-ending stream of security threats requires new security solutions capable to deal with large data volumes and high speed network connections in real-time. Intrusion Detection Systems are an omnipresent component of most security systems and may offer a viable answer. In this paper we propose a network anomaly IDS which merges the Support Vector Machines classifier with an improved version of the Bat Algorithm (BA). We use the Binary version of the Swarm Intelligence algorithm to construct a wrapper feature selection method and the standard version to elect the input parameters for SVM. Tests with the NSL-KDD dataset empirically prove our proposed model outperforms simple SVM or similar approaches based on PSO and BA, in terms of attack detection rate and false alarm rate generated after fewer number of iterations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. 31(9), 805–822 (1999)
Dua, S., Du, X.: Classical machine-learning paradigmsfor data mining. In: Data Mining and Machine Learning in Cybersecurity, pp. 23–56. Auerbach Publications Taylor and Francis Group (2011)
Enache, A.-C., Patriciu, V.V.: Intrusions detection based on support vector machine optimized with swarm intelligence. In: 9th IEEE International Symposium on Applied Computational Intelligence and Informatics, pp. 153–158 (2014)
Enache, A.-C., Sgarciu, V.: Enhanced intrusion detection system based on bat algorithm-support vector machine. In: 11th International Conference on Security and Cryptography, pp. 184–189. Vienna, Austria (2014)
Gao, H.-H., Yang, H.-H, Wang, X.-Y.: Ant colony optimization based network intrusion feature selection and detection. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, pp. 3871–3875 (2005)
Kukielka, P., Kotulski, Z.: New unknown attack detection with the neural network-based ids. In: The State of the Art in Intrusion Prevention and Detection, pp. 259–284. Auerbach Publications (2014)
Laamari, M.A., Kamel, N.: A hybrid bat based feature selection approach for intrusion detection. In: Pan, L., Păun, G., Pérez-Jiménez, M.J., Song, T. (eds.) BIC-TA 2014. CCIS, vol. 472, pp. 230–238. Springer, Heidelberg (2014)
Ma, J., Liu, X., Liu, S.: A new intrusion detection method based on bpso-svm. Int. Symp. Comput. Intell. Des. 1, 473–477 (2008)
Mark, H., Eibe, F., Geoffrey, H., Bernhard, P., Peter, R., Ian, W.: The weka data mining software: an update. SIGKDD Explor. Newsl. 11, 10–18 (2009)
Nakamura, R., Pereira, L., Costa, K., Rodrigues, D., Papa, J., Yang, X.S.: Bba: a binary bat algorithm for feature selection. In: Proceedings of the 25th Conference on Graphics, Patterns and Images, pp. 291–297 (2012)
Nguyen, H., Franke, K., Petrovic, S.: Improving effectiveness of intrusion detection by correlation feature selection. In: ARES ’10 International Conference on Availability, Reliability, and Security, 2010, pp. 17–24 (2010)
Sammut, C., Webb, G. I.: Feature selection. In: Encyclopedia of Machine Learning, pp. 429–433. Springer, New York (2010)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications, pp. 1–6 (2009)
Wang, J., Hong, X., Ren, R., Li, T.: A real-time intrusion detection system based on pso-svm. In: Proceedings of the International Workshop on Information Security and Application, pp. 319–321. ACADEMY PUBLISHER (2009)
Wang, J., Li, T., Ren, R.: A real time IDSs based on artificial bee colony-support vector machine algorithm. In: Proceedings in the International Workshop on Advanced Computational Intelligence, pp. 91–96. IEEE (2010)
Yang, X.-S.: Firefly algorithms for multimodal optimization. In: Watanabe, O., Zeugmann, T. (eds.) SAGA 2009. LNCS, vol. 5792, pp. 169–178. Springer, Heidelberg (2009)
Yang, X.-S.: A new metaheuristic bat-inspired algorithm. In: González, J.R., Pelta, D.A., Cruz, C., Terrazas, G., Krasnogor, N. (eds.) NICSO 2010. SCI, vol. 284, pp. 65–74. Springer, Heidelberg (2010)
Yang, X.-S., He, X.: Bat algorithm: literature review and applications. Int. J. Bio-Inspired Comput. 5, 141–149 (2013)
Acknowledgments
The work has been funded by the Sectoral Operational Programme Human Resources Development 2007-2013 of the Ministry of European Funds through the Financial Agreement POSDRU/159/1.5/S/132395.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Enache, AC., Sgârciu, V. (2015). An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-19713-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19712-8
Online ISBN: 978-3-319-19713-5
eBook Packages: EngineeringEngineering (R0)