Hybrid Particle Swarm Optimization and Fuzzy C-Means Clustering for Network Intrusion Detection
DOI:
https://doi.org/10.26438/ijcse/v6i9.116122Keywords:
IDS, Fuzzy c-means Algorithm, PSO, Mutual Information, NSL-KDD DatasetAbstract
Intrusion Detection systems (IDS) play an important role in network security and protection. Intrusion detection system uses either misuse or anomaly based techniques to identify malicious activities. To detect malicious activity, misuse detection systems is used to identify signatures or previously known malicious activities. On the other hand, anomaly based systems is used to identify unknown attacks. Intrusion detection system is now an essential tool to protect the networks by monitoring inbound and outbound activities and identifying suspicious patterns that may indicate a system attack. In recent years, some researchers have employed data mining techniques for developing IDS. In this paper, hybrid Particle Swarm Optimization (PSO) and Fuzzy c-means clustering for network Intrusion Detection is proposed to identify intrusion over NSLKDD dataset. An attempt has been made to cluster the dataset into normal and the major attack categories i.e. DoS, R2L, U2R and Probe. The experimental results demonstrate the efficiency of the proposed approach.
References
[1] Roger Storlokken (2007), “Labelling clusters in an anomaly based IDS by means of clustering quality indexes”, Department of Computer Science and Media Technology,Gjovik University College
[2] M.Shivakumar, R.Subalakshmi, S. Shanthakumari and S.John Joseph (2013), “Architecture for Network-Intrusion Detection and Response in open Networks using Analyzer Mobile Agents”, IJSRNSC, Vol.1, Issue 4, pp.3-7
[3] Raghunath ,B. R. and Mahadeo, S. N. (2008), “Network Intrusion Detection System (NIDS)”, International Conference on Emerging Trends in Engineering and Technology”, IEEE, 2008
[4] Benaicha, S. E., Saoudi, L., Guermeche, B., Eddine, S. and Lounis, O. (2014), “Intrusion detection system using genetic algorithm”, Science and Information Conference (SAI), IEEE-2014, pp. 564–568
[5] Manmohan Dagar and Rashmi Popli (2018), “Honeypots: Virtual Network Intrusion Monitoring System”, IJSRNSC, Vol.6, Issue 2, pp.45-49
[6] Zhao, Y. (2016), “Network intrusion detection system model based on data mining”,17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), IEEE, Shanghai, China, pp. 155–160
[7] D Gupta, S Singhai, S Malik and A Singh (2016), “Network intrusion detection system using various data mining techniques”, IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS)
[8] A.K. Siddique and T Farooqui,, (2017), “Improved Ensemble Technique based on Support Vector Machine and Neural Network for Intrusion Detection System”, International Journal Online of Science, 3(11)
[9] Harish, B.S. and Kumar, S.A., (2017), “Anomaly based intrusion detection using modified fuzzy clustering”, International Journal of Interactive Multimedia and Artificial Intelligence, 4(6), pp.54-59
[10] R.K. Das, M Panda, S Dash and S.S Dash (2018) “Application of Artificial Immune System Algorithms in Anomaly Detection”, Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 687-694
[11] A. Panigrahi and M.R. Patra (2018), “A Layered Approach to Network Intrusion Detection Using Rule Learning Classifiers with Nature-Inspired Feature Selection”, In Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 215-223
[12] R Sahani, C Rout, J.C. Badajena, A.K. Jena and H. Das (2018), “Classification of Intrusion Detection Using Data Mining Techniques”, Progress in Computing, Analytics and Networking, Springer, Singapore, pp. 753-764
[13] A Ahmed, Dowlat Elngar, A. El, Mohamed, A. and Fayed, F. M. Ghaleb (2013), “A Real-Time Anomaly Network Intrusion Detection System with High Accuracy”, Inf. Sci. Lett. 2, No. 2, pp.49-56
[14] Lan, Yuan-Dong (2017), "A Hybrid Feature Selection based on Mutual Information and Genetic Algorithm.", Indonesian Journal of Electrical Engineering and Computer Science 7, No. 1, pp. 214-225.
[15] Nojun Kwak, , Choi, Chong-Ho (2002), “Input Feature Selection by Mutual Information Based on Parzen Window”, IEEE transactions on pattern analysis and machine intelligence, Vol. 24, no. 12
[16] Tavallaee, Mahbod, Bagheri, Ebrahim, Lu, Wei and Ali A. Gorbani (2009), “A Detailed Analysis of the KDD CUP 99 Dataset”, In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009, IEEE, pp. 1-6
[17] Revathi, S. and Malathi, A. (2013), “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection”, IJERT, 2013, Vol. 2 Issue 12.
[18] P.S. Bhattacharjee, S. A. Begum, and Md, Fujail Abul Kashim (2017), “A Comparison of Intrusion Detection by K-Means and Fuzzy C-Means Clustering Algorithm over the NSL-KDD Dataset”, IEEE-ICCIC 2017
[19] Cang, Shuang (2011), “A Mutual Information based Feature Selection Algorithm”, 4th International Conference on Biomedical Engineering and Informatics (BMEI), IEEE, pp. 2241-2245
[20] Ren Wuling, Cao, Jinzhu and Wu, Xianjie (2009), “Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm”, In Intelligent Information Technology Application IITA 2009, Third International Symposium , IEEE,Vol. 3, pp. 19-22
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
