Feature Selection for Intrusion Detection System Using Ant Colony Optimization

نویسندگان

  • Mehdi Hosseinzadeh Aghdam
  • Peyman Kabiri
چکیده

Intrusion detection is a major research problem in network security. Due to the nonlinear nature of the intrusion attempts, unpredictable behavior of the network traffic and the large number of features in the problem space, intrusion detection systems represent a complicated problem area. Choosing effective and key features for intrusion detection is a very important topic in information security. The purpose of this study is to identify important features in building an intrusion detection system such that they are computationally efficient and effective. To improve the performance of intrusion detection system, this paper proposes an intrusion detection system that its features are optimally selected using ant colony optimization. The proposed method is easily implemented and has a low computational complexity due to use of a simplified feature set for the classification. The extensive experimental results on the KDD Cup 99 and NSL-KDD intrusion detection benchmark data sets demonstrate that the proposed method outperforms previous approaches, providing higher accuracy in detecting intrusion attempts and lower false alarm with reduced number of features.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

Layered Approach For Intrusion Detection Using Multiobjective Particle Swarm Optimization

Intrusion detection is one of the challenging tasks in today’s networked world. It is necessary to formulate a new intrusion detection system, which can monitor the network to detect the malicious activities. The proposed work focuses the issues, namely accuracy and efficiency. One way to improve performance is to use a minimal number of features to define a model in a way that it can be used t...

متن کامل

HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System

Anomaly detection is one approach in intrusion detection systems (IDSs) which aims at capturing any deviation from the profiles of normal network activities. However, it suffers from high false alarm rate since it has impediment to distinguish the boundaries between normal and attack profiles. In this paper, we propose an effective anomaly detection approach by hybridizing three techniques, i.e...

متن کامل

Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection

The current era is known as the age of digital information and general medium of access to this information is computer networks. The uses of network technology also make information insecure. Intrusion Detection System (IDS) has been proven effective against such attacks. The anomaly-based detection method is good to detect new attacks. One of the foremost shortcomings in the anomalybased dete...

متن کامل

Swarm Based Classifier Model Using Ensemble Feature Ranking Methods

Intrusion Detection System (IDS) is a security support mechanism which has become an essential component of security infrastructure to detect attacks, identify and track the intruders. In intrusion detection, the quantity of data is huge that includes thousands of traffic records with number of various features. Selecting a subset of informative features can lead to improved classification accu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016