A proposed hybrid framework for improving supervised classifiers detection aecuraev over intrusion trace

作者: Vidhya Sathish , P. Sheik Abdul Khader

DOI: 10.1109/ICEEOT.2016.7755037

关键词: Ant colony optimization algorithmsComputer securityTRACE (psycholinguistics)Intrusion detection systemAnomaly-based intrusion detection systemMachine learningArtificial intelligenceStatistical classificationAirfield traffic patternAlgorithm designEngineeringExploit

摘要: The presence of intrusion attack traces in network traffic pattern seems to be major threatening cyber community. During a decade, many preventive and detection measures have had been developed overcome these illicit activities but the evolution zero-day exploits which has common behavior as find difficult resolve critics patterns. other faced by are majority resembles normal analysis. Contemporary or detective evolved either neither one-hand approach nor hybrid approaches. Objective this paper is elaborate discuss still their flaws incurred Also, suggesting new meta-heuristics algorithm called 'Grey Wolf Optimizer its working attitude towards fittest solution resolved from critics. effectiveness utilizing designing efficient model extensively compare with methodologies an intent prominent will effectively used Researchers future.

参考文章(25)
Gilles Paiva M. de Farias, Adriano L. I. de Oliveira, George G. Cabral, Extreme learning machines for intrusion detection systems international conference on neural information processing. pp. 535- 543 ,(2012) , 10.1007/978-3-642-34478-7_65
Vinod Yegneswaran, Guofei Gu, Wenke Lee, Martin Fong, Phillip Porras, BotHunter: detecting malware infection through IDS-driven dialog correlation usenix security symposium. pp. 12- ,(2007)
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Sokratis Katsikas, Georgios Spathoulas, Methods for post-processing of alerts in intrusion detection: A survey International Journal of Information Security Science. ,vol. 2, pp. 64- 80 ,(2013)
Muhammad Raza Fraz, Muhammad Saad Iftikhar, A Survey on Application of Swarm Intelligence in Network Security Transactions on Machine Learning and Artificial Intelligence. ,vol. 1, ,(2013) , 10.14738/TMLAI.V1I1.24
Mohd Nadhir Ab Wahab, Samia Nefti-Meziani, Adham Atyabi, A Comprehensive Review of Swarm Optimization Algorithms PLOS ONE. ,vol. 10, pp. e0122827- ,(2015) , 10.1371/JOURNAL.PONE.0122827
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis IEEE Transactions on Parallel and Distributed Systems. ,vol. 25, pp. 447- 456 ,(2014) , 10.1109/TPDS.2013.146
Mohammad Sazzadul Hoque, An Implementation of Intrusion Detection System Using Genetic Algorithm arXiv: Cryptography and Security. ,(2012) , 10.5121/IJNSA.2012.4208
C. Kolias, G. Kambourakis, M. Maragoudakis, Swarm intelligence in intrusion detection: A survey Computers & Security. ,vol. 30, pp. 625- 642 ,(2011) , 10.1016/J.COSE.2011.08.009
Vipin Das, Vijaya Pathak, Sattvik Sharma, R Sreevathsan, MVVNS Srikanth, G Kumar, Network Intrusion Detection System Based On Machine Learning Algorithms International Journal of Computer Science and Information Technology. ,vol. 2, pp. 138- 151 ,(2010) , 10.5121/IJCSIT.2010.2613