Distributed-Intrusion Detection System using combination of Ant Colony Optimization (ACO) and Support Vector Machine (SVM)

被引:9
|
作者
Wankhade, Ajinkya [1 ]
Chandrasekaran, K. [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Comp Sci & Engn, Mangaluru, Karnataka, India
关键词
Intrusion detection system (IDS); Machine learning; Support vector machine (SVM); Ant colony optimization (ACO); Data classification;
D O I
10.1109/ICMETE.2016.94
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion Detection System (IDS) are playing a very substantial role in protecting computer networks. Still conventional IDS finds itself limited when it comes to distribute intrusion detection. An intruder may conceal its origin of attack by moving from node to node in a network. In order to conquer these limitations, alerts are to be exchanged and correlated in distributed intrusion detection system (DIDS) in a cooperative manner. Because of diversity of network behavior and high growth in development of new types of attacks, intrusion detection algorithm based on fast machine learning methods are of great significance to reduce the false alarm rates with high accuracy of detection rate. This work proposes using a DIDS model for data collection across the network and a hybrid method that classifies the network activities collected in the DIDS model as normal and abnormal. This hybrid method is a combination of popular machine learning algorithms Support Vector Machine (SVM) and Ant Colony Optimization (ACO) which is to be used on a model for DIDS. Also it can detect unseen attacks of intrusion with high detection rate with minimal misclassification. Experiments show that usage of hybrid method on the DIDS model is superior to that of SVM alone or ACO alone both in terms of run-time efficiency and detection rate.
引用
收藏
页码:646 / 651
页数:6
相关论文
共 50 条
  • [1] Toward support-vector machine-based ant colony optimization algorithms for intrusion detection
    Alqarni, Ahmed Abdullah
    [J]. SOFT COMPUTING, 2023, 27 (10) : 6297 - 6305
  • [2] Toward support-vector machine-based ant colony optimization algorithms for intrusion detection
    Ahmed Abdullah Alqarni
    [J]. Soft Computing, 2023, 27 : 6297 - 6305
  • [3] A Kind of Network Intrusion Detection Method Using Improved Support Vector Machine Based on Ant Colony Algorithm
    Zhang, Xiaoqin
    Jia, Guojun
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2995 - 2998
  • [4] Power load forecasting using support vector machine and ant colony optimization
    Niu, Dongxiao
    Wang, Yongli
    Wu, Desheng Dash
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (03) : 2531 - 2539
  • [5] Optimizing Support Vector Machine Parameters Using Continuous Ant Colony Optimization
    Alwan, Hiba Basim
    Ku-Mahamud, Ku Ruhana
    [J]. 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 164 - 169
  • [6] Parameter Optimization of Support Vector Machine by Improved Ant Colony Optimization
    Rongali, Srujana
    Yalavarthi, Radhika
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 671 - 678
  • [7] Rolling element bearing fault detection using support vector machine with improved ant colony optimization
    Li, Xu
    Zheng, A'nan
    Zhang, Xunan
    Li, Chenchen
    Zhang, Li
    [J]. MEASUREMENT, 2013, 46 (08) : 2726 - 2734
  • [8] Hybrid Optimization of Support Vector Machine for Intrusion Detection
    席福利
    郁松年
    [J]. Journal of Donghua University(English Edition), 2005, (03) : 51 - 56
  • [9] Ant colony optimization edge selection for support vector machine speed optimization
    Andronicus A. Akinyelu
    Absalom E. Ezugwu
    Aderemi O. Adewumi
    [J]. Neural Computing and Applications, 2020, 32 : 11385 - 11417
  • [10] Distributed Intrusion Detection System Using Cooperative Agent Based on Ant Colony Clustering
    Abdurrazaq, Muhammad N.
    Bambang, Riyanto T.
    Rahardjo, Budi
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (ICEECS), 2014, : 109 - 114