Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine

Adriana-Cristina Enache, Valentin Sgârciu

2014

Abstract

As new security intrusions arise so does the demand for viable intrusion detection systems. These solutions must deal with huge data volumes, high speed network traffics and countervail new and various types of security threats. In this paper we combine existing technologies to construct an Anomaly based Intrusion Detection System. Our approach improves the Support Vector Machine classifier by exploiting the advantages of a new swarm intelligence algorithm inspired by the environment of microbats (Bat Algorithm). The main contribution of our paper is the novel feature selection model based on Binary Bat Algorithm with Lévy flights. To test our model we use the NSL-KDD data set and empirically prove that Lévy flights can upgrade the exploration of standard Binary Bat Algorithm. Furthermore, our approach succeeds to enhance the default SVMclassifier and we obtain good performance measures in terms of accuracy (90.06%), attack detection rate (95.05%) and false alarm rate (4.4%) for unknown attacks.

References

  1. Dua, S. and Du, X. (2011a). Classical machine-learning paradigmsfor data mining. In Data Mining and Machine Learning in Cybersecurity, pages 23-56. Auerbach Publications Taylor and Francis Group.
  2. Dua, S. and Du, X. (2011b). Machine learning for anomaly detection. In Data Mining and Machine Learning in Cybersecurity, pages 85-114. Auerbach Publications Taylor and Francis Group.
  3. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. (2009). The weka data mining software: an update. SIGKDD Explor. Newsl., 11:10- 18.
  4. Kukielka, P. and Kotulski, Z. (2014). New unknown attack detection with the neural network-based ids. In The State of the Art in Intrusion Prevention and Detection, pages 259-284. Auerbach Publications.
  5. Mirjalili, S., Mirjalili, S., and Yang, X.-S. (2013). Binary bat algorithm. Neural Computing and Applications, pages 1-19.
  6. Pu, J., Xiao, L., Li, Y., and Dong, X. (2012). A detection method of network intrusion based on svm and ant colony algorithm. In Proceedings of the National Conference on Information Technology and Computer Science, pages 153-156. Atlantis Press.
  7. Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications, pages 1-6. IEEE.
  8. Wang, J., Hong, X., and R. Ren, T. L. (2009). A realtime intrusion detection system based on pso-svm. In Proceedings of the International Workshop on Information Security and Application, pages 319-321. ACADEMY PUBLISHER.
  9. Wang, J., Li, T., and Ren, R. (2010). A real time IDSs based on artificial bee colony-support vector machine algorithm. In Proceedings in the International Workshop on Advanced Computational Intelligence, pages 91-96. IEEE.
  10. Xie, J., Zhou, Y., and Chen, H. (2013). A novel bat algorithm based on differential operator and lévy flights trajectory. Computational Intelligence and Neuroscience, 2013.
  11. Yang, X.-S. (2009). Firefly algorithm, lévy flights and global optimization. In Proceedings of the SGAI International Conference on Artificial Intelligence, pages 209-218.
  12. Yang, X.-S. (2010a). A new metaheuristic bat-inspired algorithm. In Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), volume 284 of Studies in Computational Intelligence, pages 65-74. Springer Berlin Heidelberg.
  13. Yang, X.-S. (2010b). Random walks and lévy flights. In Nature-Inspired Metaheuristic Algorithms Second Edition, pages 11-20. Luniver Press.
  14. Yang, X.-S. (2012). Swarm-based metaheuristic algorithms and no-free-lunch theorems. In Theory and New Applications of Swarm Intelligence. InTech.
  15. Yang, X.-S. and Deb, S. (2009). Cuckoo search via lévy flights. In Proceedings of the World Congress on Nature & Biologically Inspired Computing, pages 210- 214. IEEE.
  16. Yang, X.-S. and He, X. (2013). Bat algorithm: Literature review and applications. International Journal of BioInspired Computation, 5(3):141-149.
Download


Paper Citation


in Harvard Style

Enache A. and Sgârciu V. (2014). Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 184-189. DOI: 10.5220/0005015501840189


in Bibtex Style

@conference{secrypt14,
author={Adriana-Cristina Enache and Valentin Sgârciu},
title={Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={184-189},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005015501840189},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine
SN - 978-989-758-045-1
AU - Enache A.
AU - Sgârciu V.
PY - 2014
SP - 184
EP - 189
DO - 10.5220/0005015501840189