Quantum Particle swarm optimization based network Intrusion feature selection and Detection

作者: Xing-Yu Wang , Hong-mei Zhang , Hai-Hua Gao

DOI: 10.3182/20080706-5-KR-1001.02084

关键词: Artificial intelligenceProbabilistic logicMulti-swarm optimizationFeature selectionSupport vector machineQuantum superpositionSwarm behaviourFilter (signal processing)MathematicsPattern recognitionParticle swarm optimization

摘要: Abstract Considering the relevance among features, which filter-based feature selection method fails to deal with, a kind of hybrid quantum particle swarm optimization and support vector machines based network intrusion wrapper algorithm is put forward. The subset features represented using superposition characteristic probability representation, can make single represent several states, thus potentially increases population diversity. Every in stands for selected features. A probabilistic mutation adopted avoid local optimal taboo search table used enlarge swarm's space repeated computation. fitness defined as correct classification percentage by SVM training set whose patterns are only results experiments demonstrate that proposed be an effective efficient way detection via data sets KDD cup 99.

参考文章(11)
Yong Wang, Huihua Yang, Xingyu Wang, Ruixia Zhang, Distributed intrusion detection system based on data fusion method world congress on intelligent control and automation. ,vol. 5, pp. 4331- 4334 ,(2004) , 10.1109/WCICA.2004.1342330
Richard Lippmann, Joshua W Haines, David J Fried, Jonathan Korba, Kumar Das, The 1999 DARPA off-line intrusion detection evaluation recent advances in intrusion detection. ,vol. 34, pp. 579- 595 ,(2000) , 10.1016/S1389-1286(00)00139-0
Sang Hyun Oh, Won Suk Lee, Refereed papers: An anomaly intrusion detection method by clustering normal user behavior Computers & Security. ,vol. 22, pp. 596- 612 ,(2003) , 10.1016/S0167-4048(03)00710-7
Sanghyun Cho, Sungdeok Cha, SAD: web session anomaly detection based on parameter estimation Computers & Security. ,vol. 23, pp. 312- 319 ,(2004) , 10.1016/J.COSE.2004.01.006
Srilatha Chebrolu, Ajith Abraham, Johnson P Thomas, None, Feature deduction and ensemble design of intrusion detection systems Computers & Security. ,vol. 24, pp. 295- 307 ,(2005) , 10.1016/J.COSE.2004.09.008
Xiang-Rong Yang, Jun-Yi Shen, Rui Wang, Artificial immune theory based network intrusion detection system and the algorithms design international conference on machine learning and cybernetics. ,vol. 1, pp. 73- 77 ,(2002) , 10.1109/ICMLC.2002.1176712
Xiaohui Bao, Tianqi Xu, Hui Hou, Network Intrusion Detection Based on Support Vector Machine 2009 International Conference on Management and Service Science. pp. 1- 4 ,(2009) , 10.1109/ICMSS.2009.5304051
A.H. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks symposium on applications and the internet. pp. 209- 216 ,(2003) , 10.1109/SAINT.2003.1183050
J. Kennedy, R. Eberhart, Particle swarm optimization international conference on networks. ,vol. 4, pp. 1942- 1948 ,(2002) , 10.1109/ICNN.1995.488968