A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques

  • Khushboo Satpute
  • Shikha Agrawal
  • Jitendra Agrawal
  • Sanjeev Sharma
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 199)

Abstract

The progress in the field of Computer Networks & Internet is increasing with tremendous volume in recent years. This raises important issues with regards to security. Several solutions emerged in the past which provide security at the host or network level. These traditional solutions like antivirus, firewall, spyware & authentication mechanism provide security to some extends but they still face the challenges of inherent system flaws & social engineering attacks. Some interesting solution emerged like Intrusion Detection & Prevention Systems but these too have some problems like detecting & responding in real time & discovering novel attacks. Several Machine Learning techniques like Neural Network, Support Vector Machine, Rough Set etc. Were proposed for making an efficient and Intelligent Network Intrusion Detection System. Also Particle Swarm Optimization is currently attracting considerable interest from the research community, being able to satisfy the growing demand of reliable & intelligent Intrusion Detection System (IDS). Recent development in the field of IDS shows that securing the network with a single technique proves to be insufficient to cater ever increasing threats, as it is very difficult to cope with all vulnerabilities of today’s network. So there is a need to combine all security technologies under a complete secure system that combines the strength of these technologies under a complete secure system that combines the strength of these technologies & thus eventually provide a solid multifaceted well against intrusion attempts. This paper gives an insight into how Particle Swarm Optimization and its variants can be combined with various Machine Learning techniques used for Anomaly Detection in Network Intrusion Detection System by researchers so as to enhance the performance of Intrusion Detection System.

Keywords

Particle Swarm Optimization Anomaly Detection Machine Learning Supervised Learning Intrusion Detection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Denning, D.: An intrusion detection model. IEEE Transactions of Software Engineering 13(2), 222–232 (1987)CrossRefGoogle Scholar
  2. 2.
    Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Managing Cyber Threats: Issues, Approaches, and Challenges, p. 330. Springer (2005)Google Scholar
  3. 3.
    Garcia-Teodoroa, P., Diaz-Verdejoa, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection; technique, systems and challenges. Compuers and Security 28, 18–28 (2009)CrossRefGoogle Scholar
  4. 4.
    Kennedy, J., Eberhart, R.C.: Particle Swarm Optimization. In: Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 1942–1948 (1995)Google Scholar
  5. 5.
    Zainal, A., Maarof, M.A., Shamsuddin, S.M.: Feature Selection Using Rough Set in Intrusion Detection. In: IEEE TENCON 2006, Hongkong, November 14-17 (2006)Google Scholar
  6. 6.
    Zainal, A., Maarof, M.A., Shamsuddin, S.M.: Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part I. LNCS, vol. 4705, pp. 512–524. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Tian, W., Liu, J.: Network Intrusion Detection Analysis with Neural Network and Particle Swarm Optimization Algorithm. In: 2010 Chinese IEEE Control and Decision Conference, CCDC, pp. 1749–1752 (2010)Google Scholar
  8. 8.
    Liu, H., Jian, Y., Liu, S.: A New Intelligent Intrusion Detection Method Based on Attribute Reduction and Parameters Optimization of SVM. In: Proceedings of the Second International Workshop on Education Technology and Computer Science (ETCS), pp. 202–205 (2010)Google Scholar
  9. 9.
    Wang, H.-B., Fu, D.-S.: An Intrusion Detection System Model Based on Particle Swarm Reduction. In: Proceedings of 4th the IEEE International Conference on Genetic and Evolutionary Computing, pp. 383–385 (2010)Google Scholar
  10. 10.
    Liu, L.-L., Liu, Y.: MQPSO based on wavelet neural network for network anomaly detection. In: Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2009), pp. 1–5 (2009)Google Scholar
  11. 11.
    Liu, Y., Ruhui, M.A.: Wavelet Neural Networks Optimized by QPSO for Network Anomaly Detection. Journal of Computational Information Systems 7(7), 2452–2460 (2011)Google Scholar
  12. 12.
    Liu, Y.: Wavelet fuzzy neural network based on modified QPSO for network anomaly detection. Applied Mechanics and Materials 20-23, 1378–1384 (2010)Google Scholar
  13. 13.
    Chen, Z., Qian, P., Chen, Z.: Application of PSO-RBF neural network in network intrusion detection. In: Proceedings of the 3rd International Symposium on Intelligent Information Technology Application, pp. 362–364 (2009)Google Scholar
  14. 14.
    Liu, Y.: QPSO-optimized RBF Neural Network for Network Anomaly Detection. Journal of Information & Computational Science 8(9), 1479–1485 (2011)Google Scholar
  15. 15.
    Xu, R., Rui, A., Xiao, F.: Research Intrusion Detection Based PSO-RBF Classifier. In: Proceeding of IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), pp. 104–107 (2011)Google Scholar
  16. 16.
    Tu, C.-J., Li-Yeh, C., Jun, Y., Cheng, H.: Feature Selection using PSO-SVM. IAENG International Journal of Computer Science 33(1), IJCS_33_1_18 (2007)Google Scholar
  17. 17.
    Ma, J., Liu, X., Liu, S.: A New Intrusion Detection Method Based on BPSO-SVM. In: Proceedings of the International Symposium on Computational Intelligence and Design, pp. 473–477 (2008a)Google Scholar
  18. 18.
    Zhang, H., Gao, H.-H., Wang, X.Y.: Quantum Particle swarm optimization based network Intrusion feature selection and Detection. In: Proceedings of the 17th World Congress The International Federation of Automatic Control, Seoul, Korea (2008)Google Scholar
  19. 19.
    Zhou, T., Li, Y., Li, J.: Research on intrusion detection of SVM based on PSO. In: Proceedings of the International Conference on Machine Learning and Cybernetics, pp. 1205–1209 (2009)Google Scholar
  20. 20.
    Wang, J., Hong, X., Ren, R.-R., Li, T.-H.: A Real-time Intrusion Detection System based on PSO-SVM. In: Proceedings of the International Workshop on Information Security and Application (IWISA 2009), pp. 319–321 (2009)Google Scholar
  21. 21.
    Chen, Y., Abraham, A., Yang, J.: Feature Selection and Classification Using Hybrid Flexible Neural Tree. Journal of Neuro Computing 7, 305–313 (2006)Google Scholar
  22. 22.
    Chen, Y., Zhang, L.: Evolutionary Flexible Neural Networks for Intrusion Detection System. In: Proceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China, pp. 428–433 (2006)Google Scholar
  23. 23.
    Michailidis, E.: Proceedings of the 2008 Panhellenic Conference on Informatics, PCI 2008, pp. 8–12. IEEE Computer Society, Washington, DC (2008)Google Scholar
  24. 24.
    Gong, S.F., Gong, X., Bi, X.: Feature Selection Method for Network Intrusion Based on GQPSO Attribute Reduction. In: 2011 International Conference on Multimedia Technology (ICMT), pp. 6365–6368 (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Khushboo Satpute
    • 1
  • Shikha Agrawal
    • 2
  • Jitendra Agrawal
    • 1
  • Sanjeev Sharma
    • 1
  1. 1.School of Information Technology, Rajiv Gandhi Proudyogiki VishwavidyalayaBhopalIndia
  2. 2.University Institute of Technology, Rajiv Gandhi Proudyogiki VishwavidyalayaBhopalIndia

Personalised recommendations