Skip to main content

Ant Colony Optimization and Feature Selection for Intrusion Detection

  • Conference paper
  • First Online:
Advances in Machine Learning and Signal Processing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 387))

Abstract

Network intrusion detection gained a lot of attention from the security expert. Intrusion detection system has been designed for the purpose detecting attack and comprises of detection method that can be anomaly based or it can be signature based. These detection method, however, highly depends on the quality of the input features. Supervised learning approach for the detection method finds the relationship between the feature and its class. Therefore, irrelevant, redundant, and noisy features must be eliminated before applying supervised algorithm. This can be done by feature selection method. In this paper ant colony optimization has been applied for feature selection on KDD99 dataset. The reduced dataset is validated using support vector machine. Results show that accuracy of the SVM is significantly improved with reduced feature set.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kenkre PS, Pai A, Colaco L (2015) Real time intrusion detection and prevention system. In: Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA) 2014, pp 405–411

    Google Scholar 

  2. Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutorials 16(1):303–336

    Article  Google Scholar 

  3. Othman ZA, Muda Z, Theng LM, Othman MR (2014) Record to record feature selection algorithm for network intrusion detection. Int J Adv Comput Technol 6(2):163

    Google Scholar 

  4. García-Teodoro P, Díaz-Verdejo J, Maciá-Fernández G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1–2):18–28

    Google Scholar 

  5. Hämäläinen T (2014) Artificial immune system based intrusion detection: innate immunity using an unsupervised learning approach

    Google Scholar 

  6. Friedberg I, Skopik F, Fiedler R (2015) Cyber situational awareness through network anomaly detection: state of the art and new approaches. e i Elektrotechnik und Informationstechnik 132(2):101–105

    Article  Google Scholar 

  7. García S, Luengo J, Herrera F (2015) Feature selection. In: Data preprocessing in data mining SE—7, vol 72. Springer, pp 163–193

    Google Scholar 

  8. Düntsch I, Gediga G (2000) Rough set data analysis–a road to non-invasive knowledge discovery

    Google Scholar 

  9. Liu H, Yu L (2005) Toward integrating feature selection algorithms for classification and clustering. Knowl Data Eng IEEE Trans 17(4):491–502

    Article  Google Scholar 

  10. Zhang F, Chan PPK, Biggio B, Yeung DS, Roli F (2015) Adversarial feature selection against evasion attacks

    Google Scholar 

  11. Pitt E, Nayak R (2007) The use of various data mining and feature selection methods in the analysis of a population survey dataset. In: Proceedings of the 2nd international workshop on Integrating artificial intelligence and data mining, vol 84, pp 83–93

    Google Scholar 

  12. Wang A, An N, Chen G, Li L, Alterovitz G (2015) Accelerating wrapper-based feature selection with K-nearest-neighbor. Knowl-Based Syst 83:81–91

    Article  Google Scholar 

  13. Rais HM, Othman ZA, Hamdan AR (2007) Improved dynamic ant colony system (DACS) on symmetric traveling salesman problem (TSP). Int Conf Intell Adv Syst ICIAS 2007, pp 43–48

    Google Scholar 

  14. George A (2012) Anomaly detection based on machine learning: dimensionality reduction using PCA and classification using SVM. Int J Comput Appl Vol

    Google Scholar 

  15. Tsang C-H, Kwong S (2005) Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In: IEEE international conference on industrial technology ICIT 2005, pp 51–56

    Google Scholar 

  16. Gao H, Yang H, Wang X (2005) Ant colony optimization based network intrusion feature selection and detection, pp 18–21

    Google Scholar 

  17. Abd-Alsabour N, Randall M (2010) Feature selection for classification using an ant colony system. In: 2010 Sixth IEEE international conference on e-Science work, pp 86–91

    Google Scholar 

  18. Hiba Basim Alwan KRK-M (2013) Mixed variable ant colony optimization technique for feature subset selection and model selection, no 025, pp 24–31

    Google Scholar 

  19. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explor Newsl 11:10–18

    Article  Google Scholar 

  20. Tavallaee M, Bagheri E, Lu W, Ghorbani A-A (2009) A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the second IEEE symposium on computational intelligence for security and defence applications 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tahir Mehmod .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Mehmod, T., Rais, H.B.M. (2016). Ant Colony Optimization and Feature Selection for Intrusion Detection. In: Soh, P., Woo, W., Sulaiman, H., Othman, M., Saat, M. (eds) Advances in Machine Learning and Signal Processing. Lecture Notes in Electrical Engineering, vol 387. Springer, Cham. https://doi.org/10.1007/978-3-319-32213-1_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32213-1_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32212-4

  • Online ISBN: 978-3-319-32213-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics