Data Preprocessing for Intrusion Detection System using Swarm Intelligence Techniques

نویسنده

  • S. Revathi
چکیده

Due to access of malicious data in internet, Intrusion detection system becomes an important element in system security that controls real time data and leads to huge dimensional problem, so a data pre-processing is necessary to reduce haziness and to clean network data. To reduce false positive rate and to increase efficiency of detection, the paper proposed a new swarm intelligence technique to solve complex optimization problem. The paper work based on hybrid Simplified Swarm Optimization (SSO) algorithm to pre-process the data. SSO is a simplified Particle Swarm Optimization (PSO) that has a self-organizing ability to emerge in highly distributed control problem area, and is versatile, strong and cost effective to resolve complex computing environments. It recognize not only known attacks but also filters noisy and irrelevant data that may result on knowledge Discovery and Data Mining (KDDCup 1999) dataset and compared to a new hybrid Partial Swarm Optimization with Random Forest (PSO-RF) and with other benchmark classifiers. The testing result shows that the proposed method provides competitively high detection rates and produce a near optimal solution. KEYWORD Swarm intelligence, Simplified Swarm Optimization, Partial Swarm Optimization, Random Forest, Intrusion detection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique

--Network security risks grow tremendously in recent past, the attacks on computer networks have enhanced hugely and need economical network intrusion detection mechanisms. Data processing and machine-learning techniques are used for network intrusion detection throughout the past few years and have gained abundant quality. In this paper, we propose an intrusion detection mechanism based on sim...

متن کامل

Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique

Wireless Sensor Network (WSN) is a collection of tiny sensor nodes capable of sensing and processing the data. These sensors are used to collect the information from the environment and pass it on to the base station. A WSN is more vulnerable to various attacks. Among the different types of attacks, sinkhole attack is more vulnerable because it leads to a variety of attacks further in the netwo...

متن کامل

An Empirical Study of Intrusion Detection System Using Feature Reduction Based on Evolutionary Algorithms and Swarm Intelligence Methods

The use of computer more and more need to be increase the security day by day in a real world, the process of monitoring the computer system in a secure way for an unknown and known attack increase the availability and confidentiality of the system, the system provides the solution of such a problem is known as an Intrusion detection system. Intrusion detection systems play a vital role in netw...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Fuzzy Based Detection and Swarm Based Authenticated Routing in Manet

In mobile ad hoc networks (MANET), Artificial Intelligence (AI) based distributed intrusion detection (DIDS) techniques are very rarely available. In general, these techniques are used for either detection or authentication process. In this paper, we propose a combined approach named as fuzzy based intrusion detection and swarm based authenticated routing in MANET. This technique involves the d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013