Hybridization of K-Means and Firefly Algorithm for intrusion detection system

被引:22
|
作者
Kaur A. [1 ]
Pal S.K. [2 ]
Singh A.P. [1 ]
机构
[1] USICT, GGSIPU, New Delhi
[2] SAG, DRDO, New Delhi
关键词
Firefly Algorithm; Intrusion detection system; K-Means; NSL-KDD;
D O I
10.1007/s13198-017-0683-8
中图分类号
学科分类号
摘要
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks. Indeed, it is difficult to provide secure information systems and to maintain them in a secure state during their lifetime. An IDS is a device or software application that monitors network or system activities for malicious task or policy violations and produces reports to a management station. A metaheuristic is a high-level problem independent algorithmic framework. These are problem-independent techniques and do not take advantage of any specificity of the problem. The main aim of meta-heuristic algorithms is to quickly find solution to a problem. This solution may not be the best of all possible solutions to the problem but still they stand valid as they do not require excessively long time to be solved. Firefly Algorithm is one of the new metaheuristic algorithms for optimization problems inspired by the flashing behavior of fireflies. In this work, a new algorithm for anomaly detection has been introduced which is a hybridization of K-Means and Firefly Algorithm. The algorithm uses clustering to build the training model and uses classification to evaluate on the test set. The subject algorithm is evaluated on the NSL-KDD dataset, which is quite impressive. Further, a comparison study has been performed between the newly developed algorithm with other clustering algorithms including K-Means + Cuckoo, K-Means + Bat, K-Means, K-Means++, Canopy and Farthest First. The results show that K-Means + Firefly and K-Means + Bat outperforms by a huge margin. © 2017, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:901 / 910
页数:9
相关论文
共 50 条
  • [1] Efficient K-means Algorithm in Intrusion Detection
    Yang, Wenjun
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION AND APPLIED MATHEMATICS (MSAM2017), 2017, 132 : 193 - 195
  • [2] Improved K-means clustering algorithm in intrusion detection
    Xiao, ShiSong
    Li, XiaoXu
    Liu, XueJiao
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 771 - 775
  • [3] Robust Intrusion Detection Algorithm Based on K-means and BP
    Zhong, Yangjun
    Zhang, Shuiping
    [J]. INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 634 - 638
  • [4] Application of An Improved K-means Clustering Algorithm in Intrusion Detection
    Yu, Dongmei
    Zhang, Guoli
    Chen, Hui
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2016), 2016, 56 : 277 - 283
  • [5] Application research of improved K-means algorithm in intrusion detection
    Liu Xiaoguo
    Tian Jing
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 96 - 100
  • [6] The Application on Intrusion Detection Based on K-means Cluster Algorithm
    Meng Jianliang
    Shang Haikun
    Bian Ling
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 150 - 152
  • [7] Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm
    Li Tian
    Wang Jianwen
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 76 - 79
  • [8] Application research of improved K-means algorithm in network intrusion detection
    Zhang, Gongrang
    Hu, Wei
    [J]. EDUCATION AND MANAGEMENT INNOVATION, 2017, : 83 - 94
  • [9] Network Intrusion Detection Using Improved Genetic k-means Algorithm
    Sukumar, Anand J., V
    Pranav, I
    Neetish, M. M.
    Narayanan, Jayasree
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2441 - 2446
  • [10] Intrusion detection based on MLP neural networks and K-means algorithm
    Zheng, HY
    Ni, L
    Xiao, D
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 434 - 438