Analysis of different Hybrid methods for Intrusion Detection System
Durgesh Srivastava1 , Rajeshwar Singh2 , Vikram Singh3
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 757-764, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.757764
Online published on May 31, 2019
Copyright © Durgesh Srivastava, Rajeshwar Singh, Vikram Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Durgesh Srivastava, Rajeshwar Singh, Vikram Singh, “Analysis of different Hybrid methods for Intrusion Detection System,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.757-764, 2019.
MLA Style Citation: Durgesh Srivastava, Rajeshwar Singh, Vikram Singh "Analysis of different Hybrid methods for Intrusion Detection System." International Journal of Computer Sciences and Engineering 7.5 (2019): 757-764.
APA Style Citation: Durgesh Srivastava, Rajeshwar Singh, Vikram Singh, (2019). Analysis of different Hybrid methods for Intrusion Detection System. International Journal of Computer Sciences and Engineering, 7(5), 757-764.
BibTex Style Citation:
@article{Srivastava_2019,
author = {Durgesh Srivastava, Rajeshwar Singh, Vikram Singh},
title = {Analysis of different Hybrid methods for Intrusion Detection System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {757-764},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4310},
doi = {https://doi.org/10.26438/ijcse/v7i5.757764}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.757764}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4310
TI - Analysis of different Hybrid methods for Intrusion Detection System
T2 - International Journal of Computer Sciences and Engineering
AU - Durgesh Srivastava, Rajeshwar Singh, Vikram Singh
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 757-764
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
354 | 234 downloads | 140 downloads |
Abstract
Critical incidents targeting National Critical Infrastructures are happening more and more often. Attacks, that happens to be both more sophisticated and persistent, can even replicate life. As per CERT-In’s data, the number of cyber security incidents reported in the years: 2014-16 are more than 45000 and in 2017 (till June) are approx 27,482. Wannacry, Erebus & Petya are some big cyber-attacks, which crippled more than 10,000 organizations and 200,000 individuals in over 100 countries. From the above data, it’s notable that the number of cyber security incidents has been growing steadily in India. The goal of this examination is to survey the relative performance of some notable hybrid classification techniques. We used KDD CUP 99 data to play out a controlled experiment in which the data characteristics are efficiently changed to present defects, for example, nonlinearity, multi-co-linearity, unequal covariance, and so forth. Our analyses recommend that datasets attributes significantly impact the classification execution of the strategies. Here we created and analyzed the diverse hybrid strategies in soft computing such as GWO-EBG, GWO-KNN, GWO-SVM and GWO-GRNN. The results of the diverse hybrid strategies can help in the structure of classification frameworks in which several classification techniques can be utilized to expand the reliability and consistency of the classification.
Key-Words / Index Term
Intrusion detection systems (IDS), SVM, Gray wolf optimizer (GWO), Entropy Based Graph, KNN etc
References
[1] D.K. Srivastava, K. S. Patnaik and L Bhambhu, “Data Classification: A Rough - SVM Approach”, in Contemporary Engineering Sciences, Vol. 3 no. 2, 2010, pp 77 – 86.
[2] S. Mirjalili, S. M. Mirjalili, A. Lewis, “Grey wolf optimizer”, Advances in Engineering Software, vol. 69, 2014, pp. 46-61.
[3] KDD cup 1999 data, http:// kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html .
[4] Durgesh Srivastava, Nachiket Sainis and Dr. Rajeshwar Singh, “Classification of various Dataset for Intrusion Detection System”, in International Journal of Emerging Technology and Advanced Engineering, Volume 8, Issue 1, January 2018.
[5] H. Günes, Kayacık, A, NurZincir-Heywood, Malcolm I. Heywood, “Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets”, in Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005
[6] Chet Langin, Shahram Rahimi, “Soft computing in intrusion detection: the state of the art”, J ambient Intel Human Compute (2010), 1:133–145, Springer.
[7] Lin, Wei-Chao, Shih-Wen Ke, and Chih-Fong Tsai. "CANN: An intrusion detection system based on combining cluster centers and nearest neighbors", in Knowledge-based systems, 2015.
[8] Donald F. Specht, “A General Regression Neural Network”, in IEEE transactions on neural networks, Vol. 2, No. 6. November 1991.
[9] Benmessahel, Ilyas, Kun Xie, and Mouna Chellal. "A new evolutionary neural networks based on intrusion detection systems using multiverse optimization", Applied Intelligence 2017.
[10] Durgesh Srivastava, L Bhambhu, “Data classification using support vector machine” Journal of Theoretical and Applied Information Technology, 12(1), 2010.
[11] Alaa Tharwat, “Classification assessment methods”, in Applied Computing and informatics, 2018.
[12] Okeh UM and Okoro CN, “Evaluating Measures of Indicators of Diagnostic Test Performance: Fundamental Meanings and Formulars”, in Journal of Biometrics & Biostatistics, Vol.3, Issue 1, 2012
[13] Hossam Faris, Ibrahim Aljarah, “Grey wolf optimizer: a review of recent variants and applications”, in Neural Computing and Applications, 2018.
[14] Jitendra Kumar, Satish Chandra, “Intrusion detection based on key feature selection using Binary GWO”, in International conference on computing for sustainable global development, 2016.
[15] Qiang Li, Huiling Chen, Hui Huang, “An Enhanced Grey Wolf Optimization Based Feature Selection Wrapped Kernel Extreme Learning Machine for Medical Diagnosis” , in Computational and Mathematical Methods in Medicine, Article ID 9512741, 15 pages, 2017.
[16] Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, “Performance Evaluation of Entropy Based Graph Network Intrusion Detection System (E-Ids)”, in Jour of Adv Research in Dynamical & Control Systems, Vol.- 11, 02-Special Issue, 2019
[17] Durgesh Srivastava, Rajeshwar Singh, Vikram Singh, “An Intelligent Gray Wolf Optimizer: A Nature Inspired Technique in Intrusion Detection System (IDS)”, in Journal of Advancements in Robotics. 2019; 6(1): 18–24p
[18] Durgesh Srivastava, L Bhambhu, “Data classification using support vector machine” Journal of Theoretical and Applied Information Technology, 12(1), 2010.
[19] Ebrahim Bagheri, Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani , “A Detailed Analysis of the KDD CUP 99 Data Set”, in IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.